Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1542259
MD5:17f5a1ae03a0ff4eb038527de02e8860
SHA1:66e04a8d2fbe629115cad3f39bedc33256a8f35a
SHA256:6a8f94da45c0b3b791bbfb71b2e9a7cc6bd5dd777da0655ebc3137ad4070c72f
Tags:exeuser-Bitsight
Infos:

Detection

NetSupport RAT
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Contains functionalty to change the wallpaper
Delayed program exit found
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara detected NetSupport remote tool

Classification

  • System is w10x64
  • file.exe (PID: 6916 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 17F5A1AE03A0FF4EB038527DE02E8860)
    • bild.exe (PID: 6096 cmdline: "C:\Users\Public\Pictures\bild.exe" MD5: 8D9709FF7D9C83BD376E01912C734F0A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\Public\Pictures\PCICHEK.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
    C:\Users\Public\Pictures\bild.exeJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
      C:\Users\Public\Pictures\pcicapi.dllJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
        C:\Users\Public\Pictures\TCCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
          C:\Users\Public\Pictures\HTCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
              00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                00000001.00000000.1725583277.0000000000DB2000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                  00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                    00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                      Click to see the 7 entries
                      SourceRuleDescriptionAuthorStrings
                      1.0.bild.exe.db0000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                        1.2.bild.exe.6d0b0000.5.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                          1.2.bild.exe.73af0000.6.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                            1.2.bild.exe.db0000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                              1.2.bild.exe.111b79e0.2.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                                Click to see the 6 entries

                                System Summary

                                barindex
                                Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Users\Public\Pictures\bild.exe" , CommandLine: "C:\Users\Public\Pictures\bild.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\Pictures\bild.exe, NewProcessName: C:\Users\Public\Pictures\bild.exe, OriginalFileName: C:\Users\Public\Pictures\bild.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 6916, ParentProcessName: file.exe, ProcessCommandLine: "C:\Users\Public\Pictures\bild.exe" , ProcessId: 6096, ProcessName: bild.exe
                                Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 185.215.113.67, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Users\Public\Pictures\bild.exe, Initiated: true, ProcessId: 6096, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-10-25T18:15:26.602287+020028277451Malware Command and Control Activity Detected192.168.2.449730185.215.113.67443TCP

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: C:\Users\Public\Pictures\bild.exeReversingLabs: Detection: 28%
                                Source: C:\Users\Public\Pictures\remcmdstub.exeReversingLabs: Detection: 13%
                                Source: file.exeReversingLabs: Detection: 50%
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110AD570 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,_malloc,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary,1_2_110AD570
                                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\Public\Pictures\msvcr100.dllJump to behavior
                                Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: file.exe
                                Source: Binary string: msvcr100.i386.pdb source: bild.exe, bild.exe, 00000001.00000002.3580855632.000000006C931000.00000020.00000001.01000000.0000000D.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000001.00000002.3581100241.0000000073AF2000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: bild.exe, 00000001.00000000.1725583277.0000000000DB2000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000001.00000002.3579428842.0000000000DB2000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000001.00000002.3581007157.000000006D0B5000.00000002.00000001.01000000.0000000C.sdmp, pcicapi.dll.0.dr
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B9A273 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00B9A273
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAA537 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00BAA537
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,1_2_1102D330
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,1_2_11065890
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,1_2_1106A0A0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,1_2_111266E0

                                Networking

                                barindex
                                Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.4:49730 -> 185.215.113.67:443
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: Joe Sandbox ViewIP Address: 185.215.113.67 185.215.113.67
                                Source: Joe Sandbox ViewIP Address: 185.215.113.67 185.215.113.67
                                Source: Joe Sandbox ViewIP Address: 172.67.68.212 172.67.68.212
                                Source: Joe Sandbox ViewASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.67
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.67
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.67
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficDNS traffic detected: DNS query: geo.netsupportsoftware.com
                                Source: unknownHTTP traffic detected: POST http://185.215.113.67/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 185.215.113.67Connection: Keep-AliveCMD=POLLINFO=1ACK=1Data Raw: Data Ascii:
                                Source: bild.exe, bild.exe, 00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/fakeurl.htm
                                Source: bild.exe, bild.exe, 00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htm
                                Source: bild.exe, 00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htmwininet.dll
                                Source: bild.exe, bild.exe, 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1RESUMEPRINTING
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0$
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                                Source: bild.exe, 00000001.00000003.2028861623.0000000000A67000.00000004.00000020.00020000.00000000.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp
                                Source: bild.exe, 00000001.00000002.3578941427.0000000000A49000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000003.1737861075.0000000000A49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp%X/
                                Source: bild.exe, 00000001.00000002.3578941427.0000000000A00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp2=K
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)
                                Source: bild.exe, 00000001.00000002.3578941427.0000000000A49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspY_
                                Source: bild.exe, 00000001.00000002.3578941427.0000000000A00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp_B
                                Source: bild.exe, 00000001.00000002.3578941427.0000000000A49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspwS
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/rootr30;
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1723009665.000000000371F000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1723009665.000000000371F000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s2.symcb.com0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1723009665.000000000371F000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1723009665.000000000371F000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1723009665.000000000371F000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcd.com0&
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp11(
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/support
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/supportsupport
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1723009665.000000000371F000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/cps0(
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1723009665.000000000371F000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/rpa00
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1723009665.000000000371F000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/cps0%
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1723009665.000000000371F000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/rpa0
                                Source: remcmdstub.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,1_2_1101F6B0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,1_2_1101F6B0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110321E0 GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalFree,1_2_110321E0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110076F0 LoadCursorA,SetCursor,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,CreateDCA,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,SelectClipRgn,BitBlt,SelectClipRgn,DeleteObject,DeleteDC,BitBlt,ReleaseDC,CreatePen,CreateSolidBrush,GetSysColor,LoadBitmapA,_memset,_swscanf,CreateFontIndirectA,_memset,GetStockObject,GetObjectA,CreateFontIndirectA,GetWindowRect,SetWindowTextA,GetSystemMetrics,GetSystemMetrics,SetWindowPos,UpdateWindow,SetCursor,1_2_110076F0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11113880 PeekMessageA,GetKeyState,GetKeyState,GetKeyState,Sleep,GetKeyState,1_2_11113880
                                Source: Yara matchFile source: 1.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.file.exe.3548800.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 6916, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 6096, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Pictures\PCICL32.DLL, type: DROPPED

                                Spam, unwanted Advertisements and Ransom Demands

                                barindex
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111158B0 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,1_2_111158B0
                                Source: C:\Users\Public\Pictures\bild.exeProcess Stats: CPU usage > 49%
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B97070: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_00B97070
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1115DB40 FindWindowA,_memset,CreateProcessAsUserA,GetLastError,WinExec,CloseHandle,CloseHandle,CloseHandle,WinExec,1_2_1115DB40
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,1_2_1102D330
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA59840_2_00BA5984
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B984090_2_00B98409
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA30E60_2_00BA30E6
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BBE8D40_2_00BBE8D4
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B9E0450_2_00B9E045
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B9D1D20_2_00B9D1D2
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAE94A0_2_00BAE94A
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAFAC80_2_00BAFAC8
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B9BA1A0_2_00B9BA1A
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B932030_2_00B93203
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAF25E0_2_00BAF25E
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA63F20_2_00BA63F2
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B9DBE20_2_00B9DBE2
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA2B3A0_2_00BA2B3A
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB2B780_2_00BB2B78
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BBA35E0_2_00BBA35E
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B9EC970_2_00B9EC97
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA5DB90_2_00BA5DB9
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA2DB50_2_00BA2DB5
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B9D5E40_2_00B9D5E4
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB9EB00_2_00BB9EB0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAF6930_2_00BAF693
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B95E960_2_00B95E96
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAEE460_2_00BAEE46
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA4FB50_2_00BA4FB5
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B93FC50_2_00B93FC5
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B9276C0_2_00B9276C
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110733B01_2_110733B0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110295901_2_11029590
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11061C901_2_11061C90
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110330101_2_11033010
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111632201_2_11163220
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111674851_2_11167485
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110454F01_2_110454F0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1101B7601_2_1101B760
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111258B01_2_111258B0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1101BBA01_2_1101BBA0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11087C601_2_11087C60
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110804801_2_11080480
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1115E9801_2_1115E980
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1101C9C01_2_1101C9C0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110088AB1_2_110088AB
                                Source: C:\Users\Public\Pictures\bild.exeProcess token adjusted: SecurityJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 11146450 appears 538 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 110278E0 appears 47 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 1116F010 appears 34 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 11029450 appears 861 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 111603E3 appears 35 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 1105DD10 appears 278 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 11081BB0 appears 39 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 11164010 appears 32 times
                                Source: C:\Users\user\Desktop\file.exeCode function: String function: 00BACDF0 appears 37 times
                                Source: C:\Users\user\Desktop\file.exeCode function: String function: 00BACEC0 appears 53 times
                                Source: C:\Users\user\Desktop\file.exeCode function: String function: 00BAD870 appears 31 times
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenametcctl32.dll2 vs file.exe
                                Source: file.exe, 00000000.00000003.1723009665.00000000036B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepcicl32.dll2 vs file.exe
                                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: classification engineClassification label: mal80.rans.evad.winEXE@3/12@1/2
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11059C50 GetLastError,FormatMessageA,LocalFree,1_2_11059C50
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1109D440 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,1_2_1109D440
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1109D4D0 AdjustTokenPrivileges,CloseHandle,1_2_1109D4D0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11115B70 CoInitialize,CoCreateInstance,LoadLibraryA,GetProcAddress,SHGetSettings,FreeLibrary,CoUninitialize,1_2_11115B70
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BA8BD0 FindResourceW,DeleteObject,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00BA8BD0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,1_2_11127E10
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\__tmp_rar_sfx_access_check_6164421Jump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeMutant created: NULL
                                Source: C:\Users\user\Desktop\file.exeCommand line argument: sfxname0_2_00BAC131
                                Source: C:\Users\user\Desktop\file.exeCommand line argument: sfxstime0_2_00BAC131
                                Source: C:\Users\user\Desktop\file.exeCommand line argument: STARTDLG0_2_00BAC131
                                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\win.iniJump to behavior
                                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: file.exeReversingLabs: Detection: 50%
                                Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                                Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Pictures\bild.exe "C:\Users\Public\Pictures\bild.exe"
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Pictures\bild.exe "C:\Users\Public\Pictures\bild.exe" Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: dxgidebug.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sfc_os.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: dwmapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windowscodecs.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: pcacli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: dbghelp.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: dbgcore.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: pcihooks.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: winsta.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: wbemcomn.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: amsi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: riched32.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: pciinv.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: dhcpcsvc.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: firewallapi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: fwbase.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeFile written: C:\Users\Public\Pictures\client32.iniJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeFile opened: C:\Windows\SysWOW64\riched32.dllJump to behavior
                                Source: Window RecorderWindow detected: More than 3 window changes detected
                                Source: file.exeStatic file information: File size 2137944 > 1048576
                                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\Public\Pictures\msvcr100.dllJump to behavior
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: file.exe
                                Source: Binary string: msvcr100.i386.pdb source: bild.exe, bild.exe, 00000001.00000002.3580855632.000000006C931000.00000020.00000001.01000000.0000000D.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000001.00000002.3581100241.0000000073AF2000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: bild.exe, 00000001.00000000.1725583277.0000000000DB2000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000001.00000002.3579428842.0000000000DB2000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000001.00000002.3581007157.000000006D0B5000.00000002.00000001.01000000.0000000C.sdmp, pcicapi.dll.0.dr
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,1_2_11029590
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\__tmp_rar_sfx_access_check_6164421Jump to behavior
                                Source: PCICL32.DLL.0.drStatic PE information: section name: .hhshare
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAD8B6 push ecx; ret 0_2_00BAD8C9
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BACDF0 push eax; ret 0_2_00BACE0E
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1116F055 push ecx; ret 1_2_1116F068
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11169F49 push ecx; ret 1_2_11169F5C
                                Source: msvcr100.dll.0.drStatic PE information: section name: .text entropy: 6.909044922675825
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\pcicapi.dllJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\msvcr100.dllJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\bild.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\PCICHEK.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\PCICL32.DLLJump to dropped file
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,1_2_11127E10
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11139090 GetCurrentThreadId,IsWindowVisible,IsWindow,IsWindowVisible,IsWindowVisible,GetForegroundWindow,EnableWindow,EnableWindow,EnableWindow,SetForegroundWindow,FindWindowA,IsWindowVisible,IsWindowVisible,IsIconic,GetForegroundWindow,SetForegroundWindow,EnableWindow,GetLastError,GetLastError,GetLastError,GetTickCount,GetTickCount,FreeLibrary,1_2_11139090
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1115B1D0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows,1_2_1115B1D0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11113290 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt,1_2_11113290
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,1_2_110CB2B0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,1_2_110CB2B0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110254A0 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer,1_2_110254A0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110258F0 IsIconic,BringWindowToTop,GetCurrentThreadId,1_2_110258F0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11023BA0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer,1_2_11023BA0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11024280 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId,1_2_11024280
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11112670 IsIconic,GetTickCount,1_2_11112670
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,1_2_111229D0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,1_2_111229D0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110C0BB0 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId,1_2_110C0BB0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11143570 GetTickCount,GetModuleFileNameA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_11143570
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                Malware Analysis System Evasion

                                barindex
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110B8200 Sleep,ExitProcess,1_2_110B8200
                                Source: C:\Users\Public\Pictures\bild.exeWindow / User API: threadDelayed 417Jump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeWindow / User API: threadDelayed 8063Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Pictures\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Pictures\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Pictures\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\Public\Pictures\bild.exeEvaded block: after key decisiongraph_1-59618
                                Source: C:\Users\Public\Pictures\bild.exeEvaded block: after key decisiongraph_1-63474
                                Source: C:\Users\Public\Pictures\bild.exeEvaded block: after key decisiongraph_1-63785
                                Source: C:\Users\Public\Pictures\bild.exeEvaded block: after key decisiongraph_1-63743
                                Source: C:\Users\Public\Pictures\bild.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_1-63875
                                Source: C:\Users\Public\Pictures\bild.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-63675
                                Source: C:\Users\Public\Pictures\bild.exeAPI coverage: 6.3 %
                                Source: C:\Users\Public\Pictures\bild.exe TID: 6344Thread sleep time: -56250s >= -30000sJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exe TID: 6368Thread sleep time: -41700s >= -30000sJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exe TID: 6344Thread sleep time: -2015750s >= -30000sJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                Source: C:\Users\Public\Pictures\bild.exeLast function: Thread delayed
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B9A273 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00B9A273
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAA537 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00BAA537
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,1_2_1102D330
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,1_2_11065890
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,1_2_1106A0A0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,1_2_111266E0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAC8D5 VirtualQuery,GetSystemInfo,0_2_00BAC8D5
                                Source: HTCTL32.DLL.0.drBinary or memory string: VMware
                                Source: file.exe, 00000000.00000003.1726619171.000000000107F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                Source: bild.exe, 00000001.00000002.3578941427.0000000000A28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWLMEM
                                Source: bild.exe, 00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.claxl*
                                Source: HTCTL32.DLL.0.drBinary or memory string: hbuf->datahttputil.c%5d000000000002004C4F4F50VirtualVMwareVIRTNETGetAdaptersInfoiphlpapi.dllcbMacAddress == MAX_ADAPTER_ADDRESS_LENGTHmacaddr.cpp,%02x%02x%02x%02x%02x%02x* Netbiosnetapi32.dll01234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZwhoa nelly, says Sherman, the Sharkhellooo nurse!kernel32.dllProcessIdToSessionId%s_L%d_%xNOT copied to diskcopied to %sAssert failed - Unhandled Exception (GPF) -
                                Source: TCCTL32.DLL.0.drBinary or memory string: skt%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllGetAdaptersInfoIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlTCREMOTETCBRIDGE%s=%s
                                Source: bild.exe, 00000001.00000002.3578941427.00000000009AE000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3578941427.0000000000A28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                Source: HTCTL32.DLL.0.drBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.cla
                                Source: TCCTL32.DLL.0.drBinary or memory string: VMWare
                                Source: file.exe, 00000000.00000003.1726619171.000000000107F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Hm
                                Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-22629
                                Source: C:\Users\Public\Pictures\bild.exeAPI call chain: ExitProcess graph end nodegraph_1-59680
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BADA75 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BADA75
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11147750 GetLastError,wsprintfA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,SetLastError,GetKeyState,1_2_11147750
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,1_2_11029590
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB4A5A mov eax, dword ptr fs:[00000030h]0_2_00BB4A5A
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB8AAA GetProcessHeap,0_2_00BB8AAA
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BADA75 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BADA75
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BADBC3 SetUnhandledExceptionFilter,0_2_00BADBC3
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB5B53 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BB5B53
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BADD7C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00BADD7C
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11093080 _NSMFindClass@12,SetUnhandledExceptionFilter,OpenEventA,FindWindowA,SetForegroundWindow,CreateEventA,CloseHandle,1_2_11093080
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110310C0 _NSMClient32@8,SetUnhandledExceptionFilter,1_2_110310C0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11161D01 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_11161D01
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1116DD89 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_1116DD89
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110F4560 GetTickCount,LogonUserA,GetTickCount,GetLastError,1_2_110F4560
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1111FCA0 GetForegroundWindow,GetClassNameA,GetWindowTextA,keybd_event,keybd_event,keybd_event,1_2_1111FCA0
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Pictures\bild.exe "C:\Users\Public\Pictures\bild.exe" Jump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1109E190 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetVersionExA,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,FreeLibrary,CreateFileMappingA,GetLastError,LocalFree,LocalFree,LocalFree,GetLastError,MapViewOfFile,LocalFree,LocalFree,LocalFree,GetModuleFileNameA,GetModuleFileNameA,LocalFree,LocalFree,LocalFree,_memset,GetTickCount,GetCurrentProcessId,GetModuleFileNameA,CreateEventA,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,GetCurrentThreadId,CreateThread,ResetEvent,ResetEvent,ResetEvent,ResetEvent,SetEvent,1_2_1109E190
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1109E910 GetTokenInformation,GetTokenInformation,GetTokenInformation,AllocateAndInitializeSid,EqualSid,1_2_1109E910
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Shell_TrayWndunhandled plugin data, id=%d
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Shell_TrayWnd
                                Source: file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Progman
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAD8CB cpuid 0_2_00BAD8CB
                                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00BA932F
                                Source: C:\Users\Public\Pictures\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,1_2_11173A35
                                Source: C:\Users\Public\Pictures\bild.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,1_2_11173D69
                                Source: C:\Users\Public\Pictures\bild.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,1_2_11173CC6
                                Source: C:\Users\Public\Pictures\bild.exeCode function: GetLocaleInfoA,1_2_1116B38E
                                Source: C:\Users\Public\Pictures\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,1_2_11173933
                                Source: C:\Users\Public\Pictures\bild.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,1_2_111739DA
                                Source: C:\Users\Public\Pictures\bild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_1117383E
                                Source: C:\Users\Public\Pictures\bild.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,1_2_11173D2D
                                Source: C:\Users\Public\Pictures\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,1_2_11173C06
                                Source: C:\Users\Public\Pictures\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110F33F0 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeA,GetLastError,Sleep,CreateNamedPipeA,LocalFree,1_2_110F33F0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BAC131 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,DeleteObject,CloseHandle,0_2_00BAC131
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1103B160 SHGetFolderPathA,GetUserNameA,DeleteFileA,_sprintf,_fputs,_free,GetFileAttributesA,SetFileAttributesA,1_2_1103B160
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B9A8E0 GetVersionExW,0_2_00B9A8E0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110D8200 __CxxThrowException@8,gethostbyname,WSAGetLastError,_memmove,htons,socket,WSAGetLastError,#21,bind,WSAGetLastError,listen,WSAGetLastError,accept,WSAGetLastError,1_2_110D8200
                                Source: Yara matchFile source: 1.0.bild.exe.db0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.6d0b0000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.73af0000.6.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.db0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.file.exe.3548800.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.6c740000.3.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000000.1725583277.0000000000DB2000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.3579428842.0000000000DB2000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 6916, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 6096, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Pictures\PCICHEK.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Pictures\bild.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Pictures\pcicapi.dll, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Pictures\TCCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Pictures\HTCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Pictures\PCICL32.DLL, type: DROPPED
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity InformationAcquire Infrastructure2
                                Valid Accounts
                                1
                                Windows Management Instrumentation
                                1
                                DLL Side-Loading
                                1
                                DLL Side-Loading
                                1
                                Deobfuscate/Decode Files or Information
                                1
                                Input Capture
                                1
                                System Time Discovery
                                Remote Services1
                                Archive Collected Data
                                1
                                Ingress Tool Transfer
                                Exfiltration Over Other Network Medium1
                                System Shutdown/Reboot
                                CredentialsDomainsDefault Accounts4
                                Native API
                                2
                                Valid Accounts
                                2
                                Valid Accounts
                                3
                                Obfuscated Files or Information
                                LSASS Memory1
                                Account Discovery
                                Remote Desktop Protocol1
                                Screen Capture
                                22
                                Encrypted Channel
                                Exfiltration Over Bluetooth1
                                Defacement
                                Email AddressesDNS ServerDomain Accounts2
                                Command and Scripting Interpreter
                                1
                                Windows Service
                                21
                                Access Token Manipulation
                                2
                                Software Packing
                                Security Account Manager3
                                File and Directory Discovery
                                SMB/Windows Admin Shares1
                                Input Capture
                                3
                                Non-Application Layer Protocol
                                Automated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal Accounts2
                                Service Execution
                                Login Hook1
                                Windows Service
                                1
                                DLL Side-Loading
                                NTDS44
                                System Information Discovery
                                Distributed Component Object Model3
                                Clipboard Data
                                4
                                Application Layer Protocol
                                Traffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script13
                                Process Injection
                                1
                                Masquerading
                                LSA Secrets141
                                Security Software Discovery
                                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                                Valid Accounts
                                Cached Domain Credentials2
                                Virtualization/Sandbox Evasion
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                                Virtualization/Sandbox Evasion
                                DCSync1
                                Process Discovery
                                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                                Access Token Manipulation
                                Proc Filesystem11
                                Application Window Discovery
                                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt13
                                Process Injection
                                /etc/passwd and /etc/shadow1
                                System Owner/User Discovery
                                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                file.exe50%ReversingLabsWin32.Trojan.NetSupport
                                SourceDetectionScannerLabelLink
                                C:\Users\Public\Pictures\HTCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Pictures\PCICHEK.DLL3%ReversingLabs
                                C:\Users\Public\Pictures\PCICL32.DLL12%ReversingLabs
                                C:\Users\Public\Pictures\TCCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Pictures\bild.exe29%ReversingLabsWin32.Trojan.NetSupport
                                C:\Users\Public\Pictures\msvcr100.dll0%ReversingLabs
                                C:\Users\Public\Pictures\pcicapi.dll3%ReversingLabs
                                C:\Users\Public\Pictures\remcmdstub.exe13%ReversingLabs
                                No Antivirus matches
                                No Antivirus matches
                                SourceDetectionScannerLabelLink
                                http://www.symauth.com/rpa000%URL Reputationsafe
                                http://www.symauth.com/cps0(0%URL Reputationsafe
                                NameIPActiveMaliciousAntivirus DetectionReputation
                                geo.netsupportsoftware.com
                                172.67.68.212
                                truefalse
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  http://geo.netsupportsoftware.com/location/loca.aspfalse
                                    unknown
                                    http://185.215.113.67/fakeurl.htmtrue
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      http://geo.netsupportsoftware.com/location/loca.asp2=Kbild.exe, 00000001.00000002.3578941427.0000000000A00000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://geo.netsupportsoftware.com/location/loca.aspY_bild.exe, 00000001.00000002.3578941427.0000000000A49000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://www.pci.co.uk/supportfile.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                            unknown
                                            http://%s/testpage.htmwininet.dllbild.exe, 00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                              unknown
                                              http://geo.netsupportsoftware.com/location/loca.asp_Bbild.exe, 00000001.00000002.3578941427.0000000000A00000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                  unknown
                                                  http://www.pci.co.uk/supportsupportfile.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                    unknown
                                                    http://www.symauth.com/rpa00file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1723009665.000000000371F000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://geo.netsupportsoftware.com/location/loca.asp%X/bild.exe, 00000001.00000002.3578941427.0000000000A49000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000003.1737861075.0000000000A49000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://geo.netsupportsoftware.com/location/loca.aspwSbild.exe, 00000001.00000002.3578941427.0000000000A49000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://127.0.0.1RESUMEPRINTINGfile.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                          unknown
                                                          http://%s/testpage.htmbild.exe, bild.exe, 00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                                            unknown
                                                            http://www.netsupportschool.com/tutor-assistant.asp11(file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                              unknown
                                                              http://127.0.0.1bild.exe, bild.exe, 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                                unknown
                                                                http://www.symauth.com/cps0(file.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1723009665.000000000371F000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.netsupportschool.com/tutor-assistant.aspfile.exe, 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                                  unknown
                                                                  http://%s/fakeurl.htmbild.exe, bild.exe, 00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                                                    unknown
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    185.215.113.67
                                                                    unknownPortugal
                                                                    206894WHOLESALECONNECTIONSNLtrue
                                                                    172.67.68.212
                                                                    geo.netsupportsoftware.comUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                    Analysis ID:1542259
                                                                    Start date and time:2024-10-25 18:14:28 +02:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 8m 12s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Run name:Run with higher sleep bypass
                                                                    Number of analysed new started processes analysed:6
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:file.exe
                                                                    Detection:MAL
                                                                    Classification:mal80.rans.evad.winEXE@3/12@1/2
                                                                    EGA Information:
                                                                    • Successful, ratio: 100%
                                                                    HCA Information:
                                                                    • Successful, ratio: 81%
                                                                    • Number of executed functions: 187
                                                                    • Number of non-executed functions: 186
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • VT rate limit hit for: file.exe
                                                                    TimeTypeDescription
                                                                    12:15:57API Interceptor13666754x Sleep call for process: bild.exe modified
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    185.215.113.67oMHveSc3hh.exeGet hashmaliciousAmadey RaccoonBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    0KuDEDABFO.exeGet hashmaliciousAmadey RaccoonBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    miOnrvnXK0.exeGet hashmaliciousAmadey RaccoonBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    Rh74sODsWE.exeGet hashmaliciousAmadey RaccoonBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    dSQUdo6EjO.exeGet hashmaliciousAmadey RaccoonBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    usVhwck8lN.exeGet hashmaliciousAmadey RaccoonBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    SecuriteInfo.com.W32.AIDetect.malware1.20102.exeGet hashmaliciousAmadeyBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    MR98F1zzeo.exeGet hashmaliciousAmadey Raccoon VidarBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    8f5718a6042061b23a4e42ee5cd8112946c135dc9d0c2.exeGet hashmaliciousAmadeyBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    172.67.68.212SecuriteInfo.com.Win32.DropperX-gen.16193.30488.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    SecuriteInfo.com.Win32.DropperX-gen.16193.30488.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    SecuriteInfo.com.Win32.PWSX-gen.10211.1601.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    8hN4C25a0O.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    FakturaPDF.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    JbZaDxFXF3.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    file.exeGet hashmaliciousNetSupport RAT, LummaC Stealer, NetSupport DownloaderBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    MDE_File_Sample_fb7baecc9f46e01492b4e3e6409d6c73f83a1169.zipGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    XCIlhzFXdplpXdhQXCyywBkGlU.ps1Get hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    tOUKLPvSz.ps1Get hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    geo.netsupportsoftware.comhttp://holidaybunch.comGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.1.231
                                                                    NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.1.231
                                                                    NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.1.231
                                                                    Update.jsGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.1.231
                                                                    update.jsGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.1.231
                                                                    qvoLvRpRbr.msiGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.0.231
                                                                    EMX97rT0GX.msiGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.0.231
                                                                    Support_auto.msiGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.0.231
                                                                    SecuriteInfo.com.Win32.DropperX-gen.16193.30488.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.0.231
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    WHOLESALECONNECTIONSNLfile.exeGet hashmaliciousStealcBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealcBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealcBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealcBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                                                    • 185.215.113.37
                                                                    CLOUDFLARENETUScabbage.exeGet hashmaliciousAtlantida StealerBrowse
                                                                    • 104.26.4.30
                                                                    https://8i.eryonficket.com/g60ff/#aGVzc2dyb3VwaW52QGhlc3MuY29tGet hashmaliciousUnknownBrowse
                                                                    • 104.18.1.150
                                                                    https://8i.eryonficket.com/g60ff/#aGVzc2dyb3VwaW52QGhlc3MuY29tGet hashmaliciousUnknownBrowse
                                                                    • 104.17.25.14
                                                                    https://caraccidentdefencelawyer.com/LBKQgs7C#3l3f816z5y810bbd3w5muypm6py7liz04w39Get hashmaliciousGRQ ScamBrowse
                                                                    • 172.67.12.83
                                                                    https://forlongreasoncomingbad.top/comcast/bdon/?911comGet hashmaliciousHTMLPhisherBrowse
                                                                    • 104.21.12.201
                                                                    https://email.email.pandadoc.net/c/eJxUkMtu2zoQhp9G3NngTeRowYVzfBggLgr0jnYTDMmRw1imFIm2ET99YaDpZTcYzDf4_j-5YFTogaUxno5U6mNO7vBpPu8_Qjtn233vjPaHL2UbGDlhZQdGA3D25CwqECHxQCRtUKDBEqYowFBHIAzLTnKpBZet0FyIbh36NsUUZbSRWq6o0ZyOmIf1hCVhGuO6UGV5eawzRsIwkKvzidjgnmqdlkZtGukb6XGa_iBxPDbSv-k30p9lo3wdD1QatTUJJEohlFBchxhBckADPJi-N1FZ3iloNeeN8qyMNfc5Ys1judUQjU1gwK5EC2qllcEVWuSrLoChCMIK0bJx3mPJ19_Q6xTN6_Zu96Pc7y6XXfCBdt0HNrv0PBZaGs3DaTjQy2mYbupspnNefrFYvM3J35vc35X37_6zGK5f_2fVvaX7a1xVnPf0z2a5XZydZJdxPiwTRro9fX4wlOTmAb-lz_0effAv103-GQAA__9hXKLJGet hashmaliciousUnknownBrowse
                                                                    • 104.18.86.42
                                                                    [EXT] [ #ENCRYPT ] WSRB 401k, Trustee to Trustee Transfer form.emlGet hashmaliciousUnknownBrowse
                                                                    • 1.1.1.1
                                                                    https://coinbase-team.net-s07.live/Zendesk/invite/ca2fd752-4355?rid=Ztd9NzCGet hashmaliciousUnknownBrowse
                                                                    • 188.114.96.3
                                                                    https://atpscan.global.hornetsecurity.com/?d=NnVkJrcOtS6jUcSOl6gFYT9DOTvhRx9_0n2vBuK3wGL4RfM1M4gwz-cei5V3Dmlh&f=VRGvOaKnOixCQPnN5E8Zd55sAVwpSzujOffY4RbLuwaxI18GkkIlhnlDIOqXjYsl&i=&k=IMq7&m=Eg31PQDiRU2Qx94y2dnGUum54tAMBzZzPaQN8QexaGJVzCG-OVPo4Om5V2lRlns7wwMWrL4CnmlsokgWfWk2TbD2kmpRAVDDTYG9PjUhZhfW-BwkapmD9W6_zQVWXFVN&n=KNtSaiODbNsJQEbSEZDwh34xn1itEQQfP1UznpoGI5WaWwC1dWtBevnqXGm5H-f7&r=2Ow9cKZ98a-5wptqW8Y-zAwN-MJuNt25fcQbqzqwDypDZl3_sT7dioYpzt-h-3hX&s=1f78a40d69089fa0743a8630bc133d18afc652a160161afdf52202844b072b54&u=https%3A%2F%2Ft.ly%2Fe_R6vGet hashmaliciousUnknownBrowse
                                                                    • 104.20.7.133
                                                                    No context
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    C:\Users\Public\Pictures\HTCTL32.DLLhttp://holidaybunch.comGet hashmaliciousNetSupport RATBrowse
                                                                      upd_8707558.msixGet hashmaliciousNetSupport RATBrowse
                                                                        information_package.exeGet hashmaliciousNetSupport RAT, NetSupport Downloader, Stealc, VidarBrowse
                                                                          Update_2762895.msixGet hashmaliciousNetSupport RATBrowse
                                                                            Update_9025289.msixGet hashmaliciousNetSupport RATBrowse
                                                                              JbZaDxFXF3.exeGet hashmaliciousNetSupport RATBrowse
                                                                                Update_6529495.msixGet hashmaliciousNetSupport RATBrowse
                                                                                  Update_7053228.msixGet hashmaliciousNetSupport RATBrowse
                                                                                    Update_5289856.msixGet hashmaliciousNetSupport RATBrowse
                                                                                      C:\Users\Public\Pictures\PCICHEK.DLLhttp://holidaybunch.comGet hashmaliciousNetSupport RATBrowse
                                                                                        upd_8707558.msixGet hashmaliciousNetSupport RATBrowse
                                                                                          information_package.exeGet hashmaliciousNetSupport RAT, NetSupport Downloader, Stealc, VidarBrowse
                                                                                            Update_2762895.msixGet hashmaliciousNetSupport RATBrowse
                                                                                              Update_9025289.msixGet hashmaliciousNetSupport RATBrowse
                                                                                                JbZaDxFXF3.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                  Update_6529495.msixGet hashmaliciousNetSupport RATBrowse
                                                                                                    Update_7053228.msixGet hashmaliciousNetSupport RATBrowse
                                                                                                      Update_5289856.msixGet hashmaliciousNetSupport RATBrowse
                                                                                                        Process:C:\Users\user\Desktop\file.exe
                                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                        Category:dropped
                                                                                                        Size (bytes):328056
                                                                                                        Entropy (8bit):6.754723001562745
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:6144:2ib5YbsXPKXd6ppGpwpbGf30IVFpSzyaHx3/4aY5dUilQpAf84lH0JYBAnM1OK/Y:2ib5YbsXioEgULFpSzya9/lY5SilQCfg
                                                                                                        MD5:2D3B207C8A48148296156E5725426C7F
                                                                                                        SHA1:AD464EB7CF5C19C8A443AB5B590440B32DBC618F
                                                                                                        SHA-256:EDFE2B923BFB5D1088DE1611401F5C35ECE91581E71503A5631647AC51F7D796
                                                                                                        SHA-512:55C791705993B83C9B26A8DBD545D7E149C42EE358ECECE638128EE271E85B4FDBFD6FBAE61D13533BF39AE752144E2CC2C5EDCDA955F18C37A785084DB0860C
                                                                                                        Malicious:false
                                                                                                        Yara Hits:
                                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\HTCTL32.DLL, Author: Joe Security
                                                                                                        Antivirus:
                                                                                                        • Antivirus: ReversingLabs, Detection: 3%
                                                                                                        Joe Sandbox View:
                                                                                                        • Filename: , Detection: malicious, Browse
                                                                                                        • Filename: upd_8707558.msix, Detection: malicious, Browse
                                                                                                        • Filename: information_package.exe, Detection: malicious, Browse
                                                                                                        • Filename: Update_2762895.msix, Detection: malicious, Browse
                                                                                                        • Filename: Update_9025289.msix, Detection: malicious, Browse
                                                                                                        • Filename: JbZaDxFXF3.exe, Detection: malicious, Browse
                                                                                                        • Filename: Update_6529495.msix, Detection: malicious, Browse
                                                                                                        • Filename: Update_7053228.msix, Detection: malicious, Browse
                                                                                                        • Filename: Update_5289856.msix, Detection: malicious, Browse
                                                                                                        Reputation:moderate, very likely benign file
                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A...A...A.......A...9...A...A..gA....1..A....0.A.......A.......A.......A..Rich.A..........PE..L.....V...........!.................Z.......................................P......=G....@......................... ...k....y..x.......@...............x).......0..................................._..@............................................text............................... ..`.rdata..............................@..@.data....f.......(...v..............@....rsrc...@...........................@..@.reloc..b1.......2..................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                                        Process:C:\Users\user\Desktop\file.exe
                                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):257
                                                                                                        Entropy (8bit):5.119720931145611
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:6:O/oPn4xRPjwx1lDKHMoEEjLgpW2MezvLdNWYpPM/ioVLa8l6i7s:XeR7wx6JjjqW2MePBPM/ioU8l6J
                                                                                                        MD5:7067AF414215EE4C50BFCD3EA43C84F0
                                                                                                        SHA1:C331D410672477844A4CA87F43A14E643C863AF9
                                                                                                        SHA-256:2050CC232710A2EA6A207BC78D1EAC66A4042F2EE701CDFEEE5DE3DDCDC31D12
                                                                                                        SHA-512:17B888087192BCEA9F56128D0950423B1807E294D1C4F953D1BF0F5BD08E5F8E35AFEEE584EBF9233BFC44E0723DB3661911415798159AC118C8A42AAF0B902F
                                                                                                        Malicious:false
                                                                                                        Preview:1200..0x3bcb348e....; NetSupport License File...; Generated on 11:54 - 21/03/2018........[[Enforce]]....[_License]..control_only=0..expiry=..inactive=0..licensee=EVALUSION..maxslaves=5000..os2=1..product=10..serial_no=NSM165348..shrink_wrap=0..transport=0..
                                                                                                        Process:C:\Users\user\Desktop\file.exe
                                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                        Category:dropped
                                                                                                        Size (bytes):18808
                                                                                                        Entropy (8bit):6.22028391196942
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:192:1ANeiOT8Z2b6SoVF6RRHaPrpF3o47jtd3hfwHjvud3hfwx7bjuh:1ANt+E2exrpxTSDuTuih
                                                                                                        MD5:A0B9388C5F18E27266A31F8C5765B263
                                                                                                        SHA1:906F7E94F841D464D4DA144F7C858FA2160E36DB
                                                                                                        SHA-256:313117E723DDA6EA3911FAACD23F4405003FB651C73DE8DEFF10B9EB5B4A058A
                                                                                                        SHA-512:6051A0B22AF135B4433474DC7C6F53FB1C06844D0A30ED596A3C6C80644DF511B023E140C4878867FA2578C79695FAC2EB303AEA87C0ECFC15A4AD264BD0B3CD
                                                                                                        Malicious:false
                                                                                                        Yara Hits:
                                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\PCICHEK.DLL, Author: Joe Security
                                                                                                        Antivirus:
                                                                                                        • Antivirus: ReversingLabs, Detection: 3%
                                                                                                        Joe Sandbox View:
                                                                                                        • Filename: , Detection: malicious, Browse
                                                                                                        • Filename: upd_8707558.msix, Detection: malicious, Browse
                                                                                                        • Filename: information_package.exe, Detection: malicious, Browse
                                                                                                        • Filename: Update_2762895.msix, Detection: malicious, Browse
                                                                                                        • Filename: Update_9025289.msix, Detection: malicious, Browse
                                                                                                        • Filename: JbZaDxFXF3.exe, Detection: malicious, Browse
                                                                                                        • Filename: Update_6529495.msix, Detection: malicious, Browse
                                                                                                        • Filename: Update_7053228.msix, Detection: malicious, Browse
                                                                                                        • Filename: Update_5289856.msix, Detection: malicious, Browse
                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......sv..7.d.7.d.7.d.,...5.d.,...4.d.>o..0.d.7.e...d.,...3.d.,...6.d.,...6.d.,...6.d.Rich7.d.........PE..L...f..U...........!......................... ...............................`............@.........................p"..a.... ..P....@............... ..x)...P......@ ............................................... ..@............................text...$........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                                        Process:C:\Users\user\Desktop\file.exe
                                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                        Category:dropped
                                                                                                        Size (bytes):3735416
                                                                                                        Entropy (8bit):6.525042992590476
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:49152:cTXNZ+0ci2aYNT8wstdAukudJ1xTvIZamclSp+73mPu:cTXNo0cpKwstTJIkS43mm
                                                                                                        MD5:00587238D16012152C2E951A087F2CC9
                                                                                                        SHA1:C4E27A43075CE993FF6BB033360AF386B2FC58FF
                                                                                                        SHA-256:63AA18C32AF7144156E7EE2D5BA0FA4F5872A7DEB56894F6F96505CBC9AFE6F8
                                                                                                        SHA-512:637950A1F78D3F3D02C30A49A16E91CF3DFCCC59104041876789BD7FDF9224D187209547766B91404C67319E13D1606DA7CEC397315495962CBF3E2CCD5F1226
                                                                                                        Malicious:true
                                                                                                        Yara Hits:
                                                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\Public\Pictures\PCICL32.DLL, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\PCICL32.DLL, Author: Joe Security
                                                                                                        Antivirus:
                                                                                                        • Antivirus: ReversingLabs, Detection: 12%
                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(.t.I.'.I.'.I.'A..'.I.'...'.I.'.?#'.I.'...'.I.'.1.'.I.'.I.'.J.'.1.'.I.'.1.'.I.'..#',I.'.."'.I.'...'.I.'...'.I.'...'.I.'Rich.I.'................PE..L......V...........!......... ..............0................................9.....f-9.....................................4........`................8.x)...P7.p....@.......................P.......P..@............0..........`....................text............................... ..`.rdata.......0......................@..@.data....%..........................@....tls.........@......................@....hhshare.....P......................@....rsrc........`......................@..@.reloc..(2...P7..4....6.............@..B........................................................................................................................................................................................................
                                                                                                        Process:C:\Users\user\Desktop\file.exe
                                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                        Category:dropped
                                                                                                        Size (bytes):396664
                                                                                                        Entropy (8bit):6.809064783360712
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:12288:OpwbUb48Ju0LIFZB4Qaza4yFaMHAZtJ4Yew2j/bJa+neNQ:epq7BaGIn4BbLneNQ
                                                                                                        MD5:EAB603D12705752E3D268D86DFF74ED4
                                                                                                        SHA1:01873977C871D3346D795CF7E3888685DE9F0B16
                                                                                                        SHA-256:6795D760CE7A955DF6C2F5A062E296128EFDB8C908908EDA4D666926980447EA
                                                                                                        SHA-512:77DE0D9C93CCBA967DB70B280A85A770B3D8BEA3B707B1ABB037B2826B48898FEC87924E1A6CCE218C43478E5209E9EB9781051B4C3B450BEA3CD27DBD32C7F3
                                                                                                        Malicious:true
                                                                                                        Yara Hits:
                                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\TCCTL32.DLL, Author: Joe Security
                                                                                                        Antivirus:
                                                                                                        • Antivirus: ReversingLabs, Detection: 3%
                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............z..z..z.....z.....z.....z..{.Y.z....K.z......z.....z......z.....z.Rich.z.........PE..L...Y?XV...........!................................................................'.....@.............................o...T...x....0..@...............x)...@..\E..................................`d..@...............h............................text............................... ..`.rdata../...........................@..@.data...h............|..............@....rsrc...@....0......................@..@.reloc.. F...@...H..................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                                        Process:C:\Users\user\Desktop\file.exe
                                                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                        Category:dropped
                                                                                                        Size (bytes):105848
                                                                                                        Entropy (8bit):4.68250265552195
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:384:qTjV5+6j6Qa86Fkv2Wr120hZIqeTSGRp2TkFimMP:qHVZl6FhWr80/heT8TkFiH
                                                                                                        MD5:8D9709FF7D9C83BD376E01912C734F0A
                                                                                                        SHA1:E3C92713CE1D7EAA5E2B1FABEB06CDC0BB499294
                                                                                                        SHA-256:49A568F8AC11173E3A0D76CFF6BC1D4B9BDF2C35C6D8570177422F142DCFDBE3
                                                                                                        SHA-512:042AD89ED2E15671F5DF67766D11E1FA7ADA8241D4513E7C8F0D77B983505D63EBFB39FEFA590A2712B77D7024C04445390A8BF4999648F83DBAB6B0F04EB2EE
                                                                                                        Malicious:true
                                                                                                        Yara Hits:
                                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\bild.exe, Author: Joe Security
                                                                                                        Antivirus:
                                                                                                        • Antivirus: ReversingLabs, Detection: 29%
                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............i...i...i.......i..6....i...h...i..6...i..6..i..6....i.Rich..i.........................PE..L...T..U.....................n...... ........ ....@..................................K....@.................................< ..<....0...i...........t..x).......... ............................................... ...............................text............................... ..`.rdata..V.... ......................@..@.rsrc....i...0...j..................@..@.reloc..l............r..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                        Process:C:\Users\user\Desktop\file.exe
                                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):702
                                                                                                        Entropy (8bit):5.533600243545568
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:12:Yrqzd+mPZGS/py6z8BlsVTXuZ7+DP981E7GXXfDWQClnmSu3vbIAlkz6:cqzEmPZly6YBlLoG1fXXfDievbIAaz6
                                                                                                        MD5:4D273ADEC8E85615509D57EF7DA5A6DA
                                                                                                        SHA1:601CA5C56475C09DAA007DC843E3042B504C1096
                                                                                                        SHA-256:7780AC164E450F9E87D7BC3F80DFBE4BFF742D347FAA69C86FAF3161699E2C6C
                                                                                                        SHA-512:6AAD722A9B0E8F02970BF05FEFDE7387973CFADD4BBFC8A09B8F342F621317810A7480AAF85A15F511E333B61599C79B1D3B4EAB13907CBE968A0416681AD9BC
                                                                                                        Malicious:false
                                                                                                        Preview:0x58091b6b....[Client].._present=1..DisableChatMenu=1..DisableClientConnect=1..DisableDisconnect=1..DisableLocalInventory=1..DisableReplayMenu=1..DisableRequestHelp=1..HideWhenIdle=1..Protocols=3..RADIUSSecret=dgAAAOeJWid73S6SvOyjjiTDVewA..RoomSpec=Eval..ShowUIOnConnect=0..silent=1..SKMode=1..SOS_Alt=0..SOS_LShift=0..SOS_RShift=0..SysTray=0..UnloadMirrorOnDisconnect=1..Usernames=*....[_Info]..Filename=C:\Program Files (x86)\NetSupport\NetSupport Manager\client32u.ini....[_License]..quiet=1....[Audio]..DisableAudioFilter=1....[General]..BeepUsingSpeaker=0......[HTTP]..GatewayAddress=185.215.113.67:443..gsk=EFHH;K>OBDEJ9A<I@BCB..gskmode=0..gsku=EFHH;K>OBDEJ9A<I@BCB..GSKX=EFHH;K>OBDEJ9A<I@BCB....
                                                                                                        Process:C:\Users\user\Desktop\file.exe
                                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                        Category:dropped
                                                                                                        Size (bytes):773968
                                                                                                        Entropy (8bit):6.901559811406837
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
                                                                                                        MD5:0E37FBFA79D349D672456923EC5FBBE3
                                                                                                        SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
                                                                                                        SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
                                                                                                        SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
                                                                                                        Malicious:false
                                                                                                        Antivirus:
                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                        Process:C:\Users\user\Desktop\file.exe
                                                                                                        File Type:Windows setup INFormation
                                                                                                        Category:dropped
                                                                                                        Size (bytes):328
                                                                                                        Entropy (8bit):4.93007757242403
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:6:a0S880EeLL6sWqYFcf8KYFEAy1JoHBIr2M2OIAXFYJKRLIkg/LH2yi9vyifjBLWh:JShNvPG1JoHBx2XFhILH4Burn
                                                                                                        MD5:26E28C01461F7E65C402BDF09923D435
                                                                                                        SHA1:1D9B5CFCC30436112A7E31D5E4624F52E845C573
                                                                                                        SHA-256:D96856CD944A9F1587907CACEF974C0248B7F4210F1689C1E6BCAC5FED289368
                                                                                                        SHA-512:C30EC66FECB0A41E91A31804BE3A8B6047FC3789306ADC106C723B3E5B166127766670C7DA38D77D3694D99A8CDDB26BC266EE21DBA60A148CDF4D6EE10D27D7
                                                                                                        Malicious:false
                                                                                                        Preview:; nskbfltr.inf..;..; NS Keyboard Filter..; ..;..; This inf file installs the WDF Framework binaries....[Version]..Signature="$Windows NT$"..Provider=NSL......;..;--- nskbfltr Coinstaller installation ------..;......[nskbfltr.NT.Wdf]..KmdfService = nskbfltr, nskbfltr_wdfsect....[nskbfltr_wdfsect]..KmdfLibraryVersion = 1.5......
                                                                                                        Process:C:\Users\user\Desktop\file.exe
                                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                        Category:dropped
                                                                                                        Size (bytes):33144
                                                                                                        Entropy (8bit):6.737780491933496
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:768:FFvNhAyi5hHA448qZkSn+EgT8To1iTYiu:FCyoHA448qSSzgI2GQ
                                                                                                        MD5:DCDE2248D19C778A41AA165866DD52D0
                                                                                                        SHA1:7EC84BE84FE23F0B0093B647538737E1F19EBB03
                                                                                                        SHA-256:9074FD40EA6A0CAA892E6361A6A4E834C2E51E6E98D1FFCDA7A9A537594A6917
                                                                                                        SHA-512:C5D170D420F1AEB9BCD606A282AF6E8DA04AE45C83D07FAAACB73FF2E27F4188B09446CE508620124F6D9B447A40A23620CFB39B79F02B04BB9E513866352166
                                                                                                        Malicious:true
                                                                                                        Yara Hits:
                                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\pcicapi.dll, Author: Joe Security
                                                                                                        Antivirus:
                                                                                                        • Antivirus: ReversingLabs, Detection: 3%
                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+-..E~..E~..E~.\.~..E~.\.~..E~...~..E~..D~..E~.\.~..E~.\.~..E~.\.~..E~.\.~..E~...~..E~.\.~..E~Rich..E~........PE..L......U...........!.....2...........<.......P...............................`............@..........................^.......W..d....@..x............X..x)...P......`Q...............................V..@............P..@............................text....1.......2.................. ..`.rdata.......P.......6..............@..@.data...,....`.......F..............@....rsrc...x....@.......H..............@..@.reloc.......P.......P..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                        Process:C:\Users\user\Desktop\file.exe
                                                                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                        Category:dropped
                                                                                                        Size (bytes):77224
                                                                                                        Entropy (8bit):6.793971095882093
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:1536:zfafvTuNOwphKuyUHTqYXHhrXH4+LIyrxomee/+5IrAee/DIr3:jafLSpAFUzt0+LIyr7eR5IUeCIz
                                                                                                        MD5:325B65F171513086438952A152A747C4
                                                                                                        SHA1:A1D1C397902FF15C4929A03D582B09B35AA70FC0
                                                                                                        SHA-256:26DBB528C270C812423C3359FC54D13C52D459CC0E8BC9B0D192725EDA34E534
                                                                                                        SHA-512:6829555AB3851064C3AAD2D0C121077DB0260790B95BF087B77990A040FEBD35B8B286F1593DCCAA81B24395BD437F5ADD02037418FD5C9C8C78DC0989A9A10D
                                                                                                        Malicious:true
                                                                                                        Antivirus:
                                                                                                        • Antivirus: ReversingLabs, Detection: 13%
                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g.V#...#...#...L...2...*.r.&...#...t...L.K.u...L.J.>...L.{."...L.|."...Rich#...........PE..L...c..c.....................J.......!............@.......................... ............@....................................<.......T................]..............................................@...............@............................text.............................. ..`.rdata..,%.......&..................@..@.data....-..........................@....rsrc...T...........................@..@.reloc..p...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                                        Process:C:\Users\Public\Pictures\bild.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:modified
                                                                                                        Size (bytes):15
                                                                                                        Entropy (8bit):2.7329145639793984
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:QJgTG:QkG
                                                                                                        MD5:8AB0D91EF06123198FFAC30AD08A14C7
                                                                                                        SHA1:46D83BB84F74D8F28427314C6084CC9AFE9D1533
                                                                                                        SHA-256:DB50064FEE42FB57DCFD9C4269A682331246224D6108A18DB83ABD400CCECA12
                                                                                                        SHA-512:1AA8560708AD663C4D5D0C2199E2CE472D11748EDA18848AAA3430C6F333BB04DA65DFFF4144BFEEA3860CA30F7F832EC64FF6D5B0731AC8878050601AC7A3A3
                                                                                                        Malicious:false
                                                                                                        Preview:32.7767,-96.797
                                                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                        Entropy (8bit):7.940357211110643
                                                                                                        TrID:
                                                                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                        File name:file.exe
                                                                                                        File size:2'137'944 bytes
                                                                                                        MD5:17f5a1ae03a0ff4eb038527de02e8860
                                                                                                        SHA1:66e04a8d2fbe629115cad3f39bedc33256a8f35a
                                                                                                        SHA256:6a8f94da45c0b3b791bbfb71b2e9a7cc6bd5dd777da0655ebc3137ad4070c72f
                                                                                                        SHA512:4a70492bfc1c65e58631628c7edfe0f993bb155a63596f611bdfcc131509c9f92e204289690f83648d099fc6afee3a6d828e8cc506b1a50836b3396a9651b2d9
                                                                                                        SSDEEP:49152:VIfX6Rm0EkHbG+tw6NbHHBp7k5hhelN6YawnqzKwgVRD:VI/PYwYt5ShAiYawvw2
                                                                                                        TLSH:20A52302F9C6C5B2D53308360A68AB55797DBF342F28D96FA78D5E1ACA301917338A53
                                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........~..............b.......b..<....b......)^...................................................... ....... .......%....... ......
                                                                                                        Icon Hash:1515d4d4442f2d2d
                                                                                                        Entrypoint:0x41d779
                                                                                                        Entrypoint Section:.text
                                                                                                        Digitally signed:false
                                                                                                        Imagebase:0x400000
                                                                                                        Subsystem:windows gui
                                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                        Time Stamp:0x5C72EA7E [Sun Feb 24 19:03:26 2019 UTC]
                                                                                                        TLS Callbacks:
                                                                                                        CLR (.Net) Version:
                                                                                                        OS Version Major:5
                                                                                                        OS Version Minor:1
                                                                                                        File Version Major:5
                                                                                                        File Version Minor:1
                                                                                                        Subsystem Version Major:5
                                                                                                        Subsystem Version Minor:1
                                                                                                        Import Hash:00be6e6c4f9e287672c8301b72bdabf3
                                                                                                        Instruction
                                                                                                        call 00007F8E8CAF406Fh
                                                                                                        jmp 00007F8E8CAF3A63h
                                                                                                        cmp ecx, dword ptr [0043A1C8h]
                                                                                                        jne 00007F8E8CAF3BD5h
                                                                                                        ret
                                                                                                        jmp 00007F8E8CAF41E6h
                                                                                                        and dword ptr [ecx+04h], 00000000h
                                                                                                        mov eax, ecx
                                                                                                        and dword ptr [ecx+08h], 00000000h
                                                                                                        mov dword ptr [ecx+04h], 00430FE8h
                                                                                                        mov dword ptr [ecx], 00431994h
                                                                                                        ret
                                                                                                        push ebp
                                                                                                        mov ebp, esp
                                                                                                        push esi
                                                                                                        push dword ptr [ebp+08h]
                                                                                                        mov esi, ecx
                                                                                                        call 00007F8E8CAE716Dh
                                                                                                        mov dword ptr [esi], 004319A0h
                                                                                                        mov eax, esi
                                                                                                        pop esi
                                                                                                        pop ebp
                                                                                                        retn 0004h
                                                                                                        and dword ptr [ecx+04h], 00000000h
                                                                                                        mov eax, ecx
                                                                                                        and dword ptr [ecx+08h], 00000000h
                                                                                                        mov dword ptr [ecx+04h], 004319A8h
                                                                                                        mov dword ptr [ecx], 004319A0h
                                                                                                        ret
                                                                                                        lea eax, dword ptr [ecx+04h]
                                                                                                        mov dword ptr [ecx], 00431988h
                                                                                                        push eax
                                                                                                        call 00007F8E8CAF6D7Eh
                                                                                                        pop ecx
                                                                                                        ret
                                                                                                        push ebp
                                                                                                        mov ebp, esp
                                                                                                        push esi
                                                                                                        mov esi, ecx
                                                                                                        lea eax, dword ptr [esi+04h]
                                                                                                        mov dword ptr [esi], 00431988h
                                                                                                        push eax
                                                                                                        call 00007F8E8CAF6D67h
                                                                                                        test byte ptr [ebp+08h], 00000001h
                                                                                                        pop ecx
                                                                                                        je 00007F8E8CAF3BDCh
                                                                                                        push 0000000Ch
                                                                                                        push esi
                                                                                                        call 00007F8E8CAF31A2h
                                                                                                        pop ecx
                                                                                                        pop ecx
                                                                                                        mov eax, esi
                                                                                                        pop esi
                                                                                                        pop ebp
                                                                                                        retn 0004h
                                                                                                        push ebp
                                                                                                        mov ebp, esp
                                                                                                        sub esp, 0Ch
                                                                                                        lea ecx, dword ptr [ebp-0Ch]
                                                                                                        call 00007F8E8CAF3B3Eh
                                                                                                        push 00437B58h
                                                                                                        lea eax, dword ptr [ebp-0Ch]
                                                                                                        push eax
                                                                                                        call 00007F8E8CAF6466h
                                                                                                        int3
                                                                                                        push ebp
                                                                                                        mov ebp, esp
                                                                                                        sub esp, 0Ch
                                                                                                        Programming Language:
                                                                                                        • [ C ] VS2008 SP1 build 30729
                                                                                                        • [IMP] VS2008 SP1 build 30729
                                                                                                        • [C++] VS2015 UPD3.1 build 24215
                                                                                                        • [EXP] VS2015 UPD3.1 build 24215
                                                                                                        • [RES] VS2015 UPD3 build 24213
                                                                                                        • [LNK] VS2015 UPD3.1 build 24215
                                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x38cd00x34.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x38d040x3c.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000xe034.rsrc
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x6c0000x1fd0.reloc
                                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x36ee00x54.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x319280x40.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x300000x25c.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x382540x120.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                        .text0x10000x2e8640x2ea008c2dd3ebce78edeed565107466ae1d3eFalse0.5908595844504021data6.693477406609911IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                        .rdata0x300000x9aac0x9c00b8d3a709e8e2861298e51f270be0f883False0.45718149038461536data5.133828516884417IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .data0x3a0000x213d00xc007a066b052b7178cd1388c71d17dec570False0.2789713541666667data3.2428863859698565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                        .gfids0x5c0000xe80x2000a8129f1f5d2e8ddcb61343ecd6f891aFalse0.33984375data2.0959167744603624IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .rsrc0x5d0000xe0340xe200d62594e063ef25acc085c21831d77a75False0.6341779590707964data6.802287495720703IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .reloc0x6c0000x1fd00x2000983e78af74da826d9233ebaa3055869aFalse0.8060302734375data6.687357530503152IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                        PNG0x5d6440xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlaced1.0027729636048528
                                                                                                        PNG0x5e18c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced0.9363390441839495
                                                                                                        RT_ICON0x5f7380x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colors0.47832369942196534
                                                                                                        RT_ICON0x5fca00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colors0.5410649819494585
                                                                                                        RT_ICON0x605480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colors0.4933368869936034
                                                                                                        RT_ICON0x613f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/m0.5390070921985816
                                                                                                        RT_ICON0x618580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/m0.41393058161350843
                                                                                                        RT_ICON0x629000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/m0.3479253112033195
                                                                                                        RT_ICON0x64ea80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9809269502193401
                                                                                                        RT_DIALOG0x68c1c0x2a2data0.5296735905044511
                                                                                                        RT_DIALOG0x68ec00x13adata0.6624203821656051
                                                                                                        RT_DIALOG0x68ffc0xf2data0.71900826446281
                                                                                                        RT_DIALOG0x690f00x14edata0.5868263473053892
                                                                                                        RT_DIALOG0x692400x318data0.476010101010101
                                                                                                        RT_DIALOG0x695580x24adata0.6262798634812287
                                                                                                        RT_STRING0x697a40x1fcdata0.421259842519685
                                                                                                        RT_STRING0x699a00x246data0.41924398625429554
                                                                                                        RT_STRING0x69be80x1dcdata0.5105042016806722
                                                                                                        RT_STRING0x69dc40xdcdata0.65
                                                                                                        RT_STRING0x69ea00x468data0.375
                                                                                                        RT_STRING0x6a3080x164data0.5056179775280899
                                                                                                        RT_STRING0x6a46c0xe4data0.6359649122807017
                                                                                                        RT_STRING0x6a5500x158data0.4563953488372093
                                                                                                        RT_STRING0x6a6a80xe8data0.5948275862068966
                                                                                                        RT_STRING0x6a7900xe6data0.5695652173913044
                                                                                                        RT_GROUP_ICON0x6a8780x68data0.7019230769230769
                                                                                                        RT_MANIFEST0x6a8e00x753XML 1.0 document, ASCII text, with CRLF line terminators0.3957333333333333
                                                                                                        DLLImport
                                                                                                        KERNEL32.dllGetLastError, SetLastError, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, GetTickCount, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, DecodePointer
                                                                                                        gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
                                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                        2024-10-25T18:15:26.602287+02002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.449730185.215.113.67443TCP
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Oct 25, 2024 18:15:26.602287054 CEST49730443192.168.2.4185.215.113.67
                                                                                                        Oct 25, 2024 18:15:26.602329016 CEST44349730185.215.113.67192.168.2.4
                                                                                                        Oct 25, 2024 18:15:26.603372097 CEST49730443192.168.2.4185.215.113.67
                                                                                                        Oct 25, 2024 18:15:26.889214993 CEST49730443192.168.2.4185.215.113.67
                                                                                                        Oct 25, 2024 18:15:26.889249086 CEST44349730185.215.113.67192.168.2.4
                                                                                                        Oct 25, 2024 18:15:26.889317989 CEST44349730185.215.113.67192.168.2.4
                                                                                                        Oct 25, 2024 18:15:27.569559097 CEST4973180192.168.2.4172.67.68.212
                                                                                                        Oct 25, 2024 18:15:27.575170040 CEST8049731172.67.68.212192.168.2.4
                                                                                                        Oct 25, 2024 18:15:27.575294018 CEST4973180192.168.2.4172.67.68.212
                                                                                                        Oct 25, 2024 18:15:27.575520992 CEST4973180192.168.2.4172.67.68.212
                                                                                                        Oct 25, 2024 18:15:27.581377029 CEST8049731172.67.68.212192.168.2.4
                                                                                                        Oct 25, 2024 18:15:28.385013103 CEST8049731172.67.68.212192.168.2.4
                                                                                                        Oct 25, 2024 18:15:28.385202885 CEST4973180192.168.2.4172.67.68.212
                                                                                                        Oct 25, 2024 18:17:17.129236937 CEST4973180192.168.2.4172.67.68.212
                                                                                                        Oct 25, 2024 18:17:17.136758089 CEST8049731172.67.68.212192.168.2.4
                                                                                                        Oct 25, 2024 18:17:17.141108036 CEST4973180192.168.2.4172.67.68.212
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Oct 25, 2024 18:15:27.476547003 CEST6140853192.168.2.41.1.1.1
                                                                                                        Oct 25, 2024 18:15:27.487157106 CEST53614081.1.1.1192.168.2.4
                                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                        Oct 25, 2024 18:15:27.476547003 CEST192.168.2.41.1.1.10x2b86Standard query (0)geo.netsupportsoftware.comA (IP address)IN (0x0001)false
                                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                        Oct 25, 2024 18:15:27.487157106 CEST1.1.1.1192.168.2.40x2b86No error (0)geo.netsupportsoftware.com172.67.68.212A (IP address)IN (0x0001)false
                                                                                                        Oct 25, 2024 18:15:27.487157106 CEST1.1.1.1192.168.2.40x2b86No error (0)geo.netsupportsoftware.com104.26.0.231A (IP address)IN (0x0001)false
                                                                                                        Oct 25, 2024 18:15:27.487157106 CEST1.1.1.1192.168.2.40x2b86No error (0)geo.netsupportsoftware.com104.26.1.231A (IP address)IN (0x0001)false
                                                                                                        • 185.215.113.67connection: keep-alivecmd=pollinfo=1ack=1
                                                                                                        • geo.netsupportsoftware.com
                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        0192.168.2.449730185.215.113.674436096C:\Users\Public\Pictures\bild.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Oct 25, 2024 18:15:26.889214993 CEST220OUTPOST http://185.215.113.67/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 185.215.113.67Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                                        Data Raw:
                                                                                                        Data Ascii:


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        1192.168.2.449731172.67.68.212806096C:\Users\Public\Pictures\bild.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Oct 25, 2024 18:15:27.575520992 CEST118OUTGET /location/loca.asp HTTP/1.1
                                                                                                        Host: geo.netsupportsoftware.com
                                                                                                        Connection: Keep-Alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Oct 25, 2024 18:15:28.385013103 CEST931INHTTP/1.1 200 OK
                                                                                                        Date: Fri, 25 Oct 2024 16:15:28 GMT
                                                                                                        Content-Type: text/html; Charset=utf-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: keep-alive
                                                                                                        CF-Ray: 8d838168de9ee712-DFW
                                                                                                        CF-Cache-Status: DYNAMIC
                                                                                                        Access-Control-Allow-Origin: *
                                                                                                        Cache-Control: private
                                                                                                        Set-Cookie: ASPSESSIONIDQSBRCBDR=DIFHAPLBJGHLHHEDELKAOBDJ; path=/
                                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains
                                                                                                        Vary: Accept-Encoding
                                                                                                        cf-apo-via: origin,host
                                                                                                        Referrer-Policy: strict-origin-when-cross-origin
                                                                                                        X-Content-Type-Options: nosniff
                                                                                                        X-Frame-Options: SAMEORIGIN
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2L94Thqeq1ztlbpGZACEK%2BwZYdBO3n4pKwdcOm55SjXbcwufrYgWYQseflmuWjA2xVidcn9xiO6mSG26P62sLyue%2BFYHChiUI6guLAcKQSmXWV2HkTtfKwBMahSEp%2FI1y4DUbXunpotpkR2O"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        Data Raw: 66 0d 0a 33 32 2e 37 37 36 37 2c 2d 39 36 2e 37 39 37 0d 0a 30 0d 0a 0d 0a
                                                                                                        Data Ascii: f32.7767,-96.7970


                                                                                                        Click to jump to process

                                                                                                        Click to jump to process

                                                                                                        Click to dive into process behavior distribution

                                                                                                        Click to jump to process

                                                                                                        Target ID:0
                                                                                                        Start time:12:15:24
                                                                                                        Start date:25/10/2024
                                                                                                        Path:C:\Users\user\Desktop\file.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                        Imagebase:0xb90000
                                                                                                        File size:2'137'944 bytes
                                                                                                        MD5 hash:17F5A1AE03A0FF4EB038527DE02E8860
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000000.00000003.1723009665.0000000003392000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        Reputation:low
                                                                                                        Has exited:true

                                                                                                        Target ID:1
                                                                                                        Start time:12:15:25
                                                                                                        Start date:25/10/2024
                                                                                                        Path:C:\Users\Public\Pictures\bild.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Users\Public\Pictures\bild.exe"
                                                                                                        Imagebase:0xdb0000
                                                                                                        File size:105'848 bytes
                                                                                                        MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.3580744810.000000006C780000.00000002.00000001.01000000.0000000E.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000000.1725583277.0000000000DB2000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.3579428842.0000000000DB2000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\bild.exe, Author: Joe Security
                                                                                                        Antivirus matches:
                                                                                                        • Detection: 29%, ReversingLabs
                                                                                                        Reputation:moderate
                                                                                                        Has exited:false

                                                                                                        Reset < >

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:10.4%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:9.8%
                                                                                                          Total number of Nodes:1490
                                                                                                          Total number of Limit Nodes:26
                                                                                                          execution_graph 21900 bb8abc 31 API calls DloadUnlock 23890 bae7b0 51 API calls 2 library calls 23891 ba4fb5 120 API calls __vswprintf_c_l 22106 b910a9 22111 b95b35 22106->22111 22112 b95b3f __EH_prolog 22111->22112 22118 b9ac66 22112->22118 22114 b95b4b 22124 b95d2a GetCurrentProcess GetProcessAffinityMask 22114->22124 22119 b9ac70 __EH_prolog 22118->22119 22125 b9ddc2 73 API calls 22119->22125 22121 b9ac82 22126 b9ad7e 22121->22126 22125->22121 22127 b9ad90 ___scrt_get_show_window_mode 22126->22127 22130 b9fce6 22127->22130 22133 b9fca6 GetCurrentProcess GetProcessAffinityMask 22130->22133 22134 b9acf8 22133->22134 22134->22114 23892 baaa99 91 API calls 3 library calls 23856 bb8aaa GetProcessHeap 23835 ba899a GdipCloneImage GdipAlloc 23858 b97a9b GetCurrentProcess GetLastError CloseHandle 23859 bb0e9d 48 API calls 22893 bb7695 22895 bb76a0 22893->22895 22894 bb79a7 11 API calls 22894->22895 22895->22894 22896 bb76c9 22895->22896 22897 bb76c5 22895->22897 22899 bb76ed DeleteCriticalSection 22896->22899 22899->22897 23774 bac782 23775 bac730 23774->23775 23775->23774 23776 bacabc ___delayLoadHelper2@8 19 API calls 23775->23776 23776->23775 23790 b99481 72 API calls 23777 b91383 75 API calls 3 library calls 23836 ba9584 GetDlgItem EnableWindow ShowWindow SendMessageW 23793 bb88fb GetCommandLineA GetCommandLineW 21898 b918fb 127 API calls __EH_prolog 23837 bad5ff 27 API calls pre_c_initialization 23898 bac3ea 19 API calls ___delayLoadHelper2@8 23865 b916e3 79 API calls 23797 bbc0e4 51 API calls 23902 bb4bda 52 API calls 2 library calls 23799 baaa99 96 API calls 4 library calls 23840 b9ddda FreeLibrary 22221 bac0d0 22222 bac0dd 22221->22222 22229 b9d142 22222->22229 22225 b93f5b _swprintf 51 API calls 22226 bac103 SetDlgItemTextW 22225->22226 22236 ba991e PeekMessageW 22226->22236 22230 b9d172 22229->22230 22231 b9d17b LoadStringW 22230->22231 22232 b9d191 LoadStringW 22230->22232 22231->22232 22233 b9d1a3 22231->22233 22232->22233 22239 b9c91f 22233->22239 22235 b9d1b1 22235->22225 22237 ba995a 22236->22237 22238 ba9939 GetMessageW TranslateMessage DispatchMessageW 22236->22238 22238->22237 22240 b9c929 22239->22240 22241 b9c99d _strlen 22240->22241 22246 b9c9fb _wcschr _wcsrchr 22240->22246 22247 ba0905 WideCharToMultiByte 22240->22247 22248 ba0905 WideCharToMultiByte 22241->22248 22244 b9c9c8 _strlen 22245 b93f5b _swprintf 51 API calls 22244->22245 22245->22246 22246->22235 22247->22241 22248->22244 23803 ba7cd5 GetClientRect 23867 bb4ed4 55 API calls _free 23903 bb6fcb 71 API calls _free 22900 b99bc8 22901 b99bdb 22900->22901 22906 b99bd4 22900->22906 22902 b99be1 GetStdHandle 22901->22902 22907 b99bec 22901->22907 22902->22907 22903 b99c41 WriteFile 22903->22907 22904 b99c0c 22905 b99c11 WriteFile 22904->22905 22904->22907 22905->22904 22905->22907 22907->22903 22907->22904 22907->22905 22907->22906 22909 b99cb4 22907->22909 22911 b96d5a 56 API calls 22907->22911 22912 b96f67 68 API calls 22909->22912 22911->22907 22912->22906 23868 ba86cb 22 API calls 23869 baaa99 101 API calls 4 library calls 23870 bb7ecd 6 API calls DloadUnlock 23905 ba63c3 115 API calls 23778 bac7c0 23779 bac791 23778->23779 23780 bacabc ___delayLoadHelper2@8 19 API calls 23779->23780 23780->23779 23841 ba0d3a 26 API calls std::bad_exception::bad_exception 23806 bbf830 DeleteCriticalSection 23906 bad736 20 API calls 23843 baa537 93 API calls _swprintf 23844 bb5536 8 API calls ___vcrt_uninitialize 22135 bb6428 22143 bb784c 22135->22143 22138 bb643c 22140 bb6444 22141 bb6451 22140->22141 22151 bb6454 11 API calls 22140->22151 22152 bb7735 22143->22152 22146 bb788b TlsAlloc 22147 bb787c 22146->22147 22148 bad783 DloadUnlock 5 API calls 22147->22148 22149 bb6432 22148->22149 22149->22138 22150 bb63a3 20 API calls _free 22149->22150 22150->22140 22151->22138 22153 bb7765 22152->22153 22155 bb7761 22152->22155 22153->22146 22153->22147 22155->22153 22157 bb7785 22155->22157 22159 bb77d1 22155->22159 22156 bb7791 GetProcAddress 22158 bb77a1 __crt_fast_encode_pointer 22156->22158 22157->22153 22157->22156 22158->22153 22160 bb77f2 LoadLibraryExW 22159->22160 22165 bb77e7 22159->22165 22161 bb780f GetLastError 22160->22161 22164 bb7827 22160->22164 22162 bb781a LoadLibraryExW 22161->22162 22161->22164 22162->22164 22163 bb783e FreeLibrary 22163->22165 22164->22163 22164->22165 22165->22155 23845 ba9123 73 API calls 23811 bab820 72 API calls 22167 bac726 19 API calls ___delayLoadHelper2@8 23812 b91019 29 API calls pre_c_initialization 22250 bad611 22251 bad61d ___FrameUnwindToState 22250->22251 22276 bad126 22251->22276 22253 bad624 22255 bad64d 22253->22255 22353 bada75 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 22253->22353 22263 bad68c ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 22255->22263 22287 bb572c 22255->22287 22259 bad66c ___FrameUnwindToState 22260 bad6ec 22295 badb90 22260->22295 22263->22260 22354 bb4760 38 API calls 4 library calls 22263->22354 22271 bad718 22273 bad721 22271->22273 22355 bb4b67 28 API calls _abort 22271->22355 22356 bad29d 13 API calls 2 library calls 22273->22356 22277 bad12f 22276->22277 22357 bad8cb IsProcessorFeaturePresent 22277->22357 22279 bad13b 22358 bb0b66 22279->22358 22281 bad140 22286 bad144 22281->22286 22367 bb55b9 22281->22367 22284 bad15b 22284->22253 22286->22253 22290 bb5743 22287->22290 22288 bad783 DloadUnlock 5 API calls 22289 bad666 22288->22289 22289->22259 22291 bb56d0 22289->22291 22290->22288 22292 bb56ff 22291->22292 22293 bad783 DloadUnlock 5 API calls 22292->22293 22294 bb5728 22293->22294 22294->22263 22466 badea0 22295->22466 22298 bad6f2 22299 bb567d 22298->22299 22468 bb8558 22299->22468 22301 bad6fb 22304 bac131 22301->22304 22302 bb5686 22302->22301 22472 bb88e3 38 API calls 22302->22472 22593 b9f353 22304->22593 22308 bac150 22642 ba9036 22308->22642 22310 bac159 22646 ba0722 GetCPInfo 22310->22646 22312 bac163 ___scrt_get_show_window_mode 22313 bac176 GetCommandLineW 22312->22313 22314 bac203 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 22313->22314 22315 bac185 22313->22315 22316 b93f5b _swprintf 51 API calls 22314->22316 22649 baa8d4 22315->22649 22318 bac26c SetEnvironmentVariableW GetModuleHandleW LoadIconW 22316->22318 22662 ba9a76 LoadBitmapW 22318->22662 22321 bac1fd 22656 babe0a 22321->22656 22322 bac193 OpenFileMappingW 22325 bac1ac MapViewOfFile 22322->22325 22326 bac1f3 CloseHandle 22322->22326 22328 bac1ea UnmapViewOfFile 22325->22328 22329 bac1bd __vswprintf_c_l 22325->22329 22326->22314 22328->22326 22330 babe0a 2 API calls 22329->22330 22332 bac1d9 22330->22332 22331 bac2b3 22333 bac2c5 DialogBoxParamW 22331->22333 22332->22328 22334 bac2ff 22333->22334 22335 bac318 22334->22335 22336 bac311 Sleep 22334->22336 22337 bac326 22335->22337 22687 ba9237 CompareStringW SetCurrentDirectoryW ___scrt_get_show_window_mode 22335->22687 22336->22335 22339 bac345 DeleteObject 22337->22339 22340 bac35c DeleteObject 22339->22340 22341 bac35f 22339->22341 22340->22341 22342 bac3a2 22341->22342 22343 bac390 22341->22343 22685 ba909e 22342->22685 22688 babe69 WaitForSingleObject PeekMessageW WaitForSingleObject 22343->22688 22346 bac396 CloseHandle 22346->22342 22347 bac3dc 22348 bb4a9b GetModuleHandleW 22347->22348 22349 bad70e 22348->22349 22349->22271 22350 bb4bc4 22349->22350 22842 bb4941 22350->22842 22353->22253 22354->22260 22355->22273 22356->22259 22357->22279 22359 bb0b6b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 22358->22359 22371 bb1c0e 22359->22371 22363 bb0b81 22364 bb0b8c 22363->22364 22385 bb1c4a DeleteCriticalSection 22363->22385 22364->22281 22366 bb0b79 22366->22281 22413 bb8ac5 22367->22413 22370 bb0b8f 8 API calls 3 library calls 22370->22286 22372 bb1c17 22371->22372 22374 bb1c40 22372->22374 22375 bb0b75 22372->22375 22386 bb1e85 22372->22386 22391 bb1c4a DeleteCriticalSection 22374->22391 22375->22366 22377 bb0ca6 22375->22377 22406 bb1d9a 22377->22406 22379 bb0cb0 22380 bb0cbb 22379->22380 22411 bb1e48 6 API calls try_get_function 22379->22411 22380->22363 22382 bb0cc9 22383 bb0cd6 22382->22383 22412 bb0cd9 6 API calls ___vcrt_FlsFree 22382->22412 22383->22363 22385->22366 22392 bb1c79 22386->22392 22389 bb1ebc InitializeCriticalSectionAndSpinCount 22390 bb1ea8 22389->22390 22390->22372 22391->22375 22393 bb1cad 22392->22393 22396 bb1ca9 22392->22396 22393->22389 22393->22390 22394 bb1ccd 22394->22393 22397 bb1cd9 GetProcAddress 22394->22397 22396->22393 22396->22394 22399 bb1d19 22396->22399 22398 bb1ce9 __crt_fast_encode_pointer 22397->22398 22398->22393 22400 bb1d41 LoadLibraryExW 22399->22400 22405 bb1d36 22399->22405 22401 bb1d5d GetLastError 22400->22401 22402 bb1d75 22400->22402 22401->22402 22403 bb1d68 LoadLibraryExW 22401->22403 22404 bb1d8c FreeLibrary 22402->22404 22402->22405 22403->22402 22404->22405 22405->22396 22407 bb1c79 try_get_function 5 API calls 22406->22407 22408 bb1db4 22407->22408 22409 bb1dcc TlsAlloc 22408->22409 22410 bb1dbd 22408->22410 22410->22379 22411->22382 22412->22380 22416 bb8ae2 22413->22416 22417 bb8ade 22413->22417 22414 bad783 DloadUnlock 5 API calls 22415 bad14d 22414->22415 22415->22284 22415->22370 22416->22417 22419 bb71c0 22416->22419 22417->22414 22420 bb71cc ___FrameUnwindToState 22419->22420 22431 bb76d6 EnterCriticalSection 22420->22431 22422 bb71d3 22432 bb8f93 22422->22432 22424 bb71e2 22425 bb71f1 22424->22425 22445 bb7054 29 API calls 22424->22445 22447 bb720d LeaveCriticalSection _abort 22425->22447 22428 bb71ec 22446 bb710a GetStdHandle GetFileType 22428->22446 22429 bb7202 ___FrameUnwindToState 22429->22416 22431->22422 22433 bb8f9f ___FrameUnwindToState 22432->22433 22434 bb8fac 22433->22434 22435 bb8fc3 22433->22435 22456 bb5e3e 20 API calls _free 22434->22456 22448 bb76d6 EnterCriticalSection 22435->22448 22438 bb8fb1 22457 bb5d1d 26 API calls pre_c_initialization 22438->22457 22439 bb8fcf 22444 bb8ffb 22439->22444 22449 bb8ee4 22439->22449 22441 bb8fbb ___FrameUnwindToState 22441->22424 22458 bb9022 LeaveCriticalSection _abort 22444->22458 22445->22428 22446->22425 22447->22429 22448->22439 22450 bb5a8d _free 20 API calls 22449->22450 22451 bb8ef6 22450->22451 22455 bb8f03 22451->22455 22459 bb79a7 22451->22459 22452 bb59c2 _free 20 API calls 22454 bb8f55 22452->22454 22454->22439 22455->22452 22456->22438 22457->22441 22458->22441 22460 bb7735 _free 5 API calls 22459->22460 22461 bb79ce 22460->22461 22462 bb79ec InitializeCriticalSectionAndSpinCount 22461->22462 22463 bb79d7 22461->22463 22462->22463 22464 bad783 DloadUnlock 5 API calls 22463->22464 22465 bb7a03 22464->22465 22465->22451 22467 badba3 GetStartupInfoW 22466->22467 22467->22298 22469 bb856a 22468->22469 22470 bb8561 22468->22470 22469->22302 22473 bb8457 22470->22473 22472->22302 22474 bb631f pre_c_initialization 38 API calls 22473->22474 22475 bb8464 22474->22475 22493 bb8576 22475->22493 22477 bb846c 22502 bb81eb 22477->22502 22480 bb8483 22480->22469 22481 bb59fc __vswprintf_c_l 21 API calls 22482 bb8494 22481->22482 22492 bb84c6 22482->22492 22509 bb8618 22482->22509 22484 bb59c2 _free 20 API calls 22484->22480 22486 bb84c1 22519 bb5e3e 20 API calls _free 22486->22519 22488 bb84de 22489 bb850a 22488->22489 22490 bb59c2 _free 20 API calls 22488->22490 22489->22492 22520 bb80c1 26 API calls 22489->22520 22490->22489 22492->22484 22494 bb8582 ___FrameUnwindToState 22493->22494 22495 bb631f pre_c_initialization 38 API calls 22494->22495 22500 bb858c 22495->22500 22497 bb8610 ___FrameUnwindToState 22497->22477 22500->22497 22501 bb59c2 _free 20 API calls 22500->22501 22521 bb5a4a 38 API calls _abort 22500->22521 22522 bb76d6 EnterCriticalSection 22500->22522 22523 bb8607 LeaveCriticalSection _abort 22500->22523 22501->22500 22503 bb2636 __fassign 38 API calls 22502->22503 22504 bb81fd 22503->22504 22505 bb821e 22504->22505 22506 bb820c GetOEMCP 22504->22506 22507 bb8223 GetACP 22505->22507 22508 bb8235 22505->22508 22506->22508 22507->22508 22508->22480 22508->22481 22510 bb81eb 40 API calls 22509->22510 22512 bb8637 22510->22512 22511 bb86ad ___scrt_get_show_window_mode 22524 bb82c3 GetCPInfo 22511->22524 22512->22511 22513 bb863e 22512->22513 22516 bb8688 IsValidCodePage 22512->22516 22514 bad783 DloadUnlock 5 API calls 22513->22514 22515 bb84b9 22514->22515 22515->22486 22515->22488 22516->22513 22517 bb869a GetCPInfo 22516->22517 22517->22511 22517->22513 22519->22492 22520->22492 22522->22500 22523->22500 22525 bb83a7 22524->22525 22531 bb82fd 22524->22531 22528 bad783 DloadUnlock 5 API calls 22525->22528 22530 bb8453 22528->22530 22530->22513 22534 bb93f3 22531->22534 22533 bb75cb __vswprintf_c_l 43 API calls 22533->22525 22535 bb2636 __fassign 38 API calls 22534->22535 22536 bb9413 MultiByteToWideChar 22535->22536 22538 bb9451 22536->22538 22546 bb94e9 22536->22546 22540 bb9472 __vswprintf_c_l ___scrt_get_show_window_mode 22538->22540 22541 bb59fc __vswprintf_c_l 21 API calls 22538->22541 22539 bad783 DloadUnlock 5 API calls 22542 bb835e 22539->22542 22543 bb94e3 22540->22543 22545 bb94b7 MultiByteToWideChar 22540->22545 22541->22540 22548 bb75cb 22542->22548 22553 bb7616 20 API calls _free 22543->22553 22545->22543 22547 bb94d3 GetStringTypeW 22545->22547 22546->22539 22547->22543 22549 bb2636 __fassign 38 API calls 22548->22549 22550 bb75de 22549->22550 22554 bb73ae 22550->22554 22553->22546 22556 bb73c9 __vswprintf_c_l 22554->22556 22555 bb73ef MultiByteToWideChar 22557 bb7419 22555->22557 22558 bb75a3 22555->22558 22556->22555 22563 bb59fc __vswprintf_c_l 21 API calls 22557->22563 22565 bb743a __vswprintf_c_l 22557->22565 22559 bad783 DloadUnlock 5 API calls 22558->22559 22560 bb75b6 22559->22560 22560->22533 22561 bb74ef 22590 bb7616 20 API calls _free 22561->22590 22562 bb7483 MultiByteToWideChar 22562->22561 22564 bb749c 22562->22564 22563->22565 22581 bb7a09 22564->22581 22565->22561 22565->22562 22569 bb74fe 22571 bb59fc __vswprintf_c_l 21 API calls 22569->22571 22574 bb751f __vswprintf_c_l 22569->22574 22570 bb74c6 22570->22561 22572 bb7a09 __vswprintf_c_l 11 API calls 22570->22572 22571->22574 22572->22561 22573 bb7594 22589 bb7616 20 API calls _free 22573->22589 22574->22573 22575 bb7a09 __vswprintf_c_l 11 API calls 22574->22575 22577 bb7573 22575->22577 22577->22573 22578 bb7582 WideCharToMultiByte 22577->22578 22578->22573 22579 bb75c2 22578->22579 22591 bb7616 20 API calls _free 22579->22591 22582 bb7735 _free 5 API calls 22581->22582 22583 bb7a30 22582->22583 22586 bb7a39 22583->22586 22592 bb7a91 10 API calls 3 library calls 22583->22592 22585 bb7a79 LCMapStringW 22585->22586 22587 bad783 DloadUnlock 5 API calls 22586->22587 22588 bb74b3 22587->22588 22588->22561 22588->22569 22588->22570 22589->22561 22590->22558 22591->22561 22592->22585 22594 bacec0 22593->22594 22595 b9f35d GetModuleHandleW 22594->22595 22596 b9f3c8 22595->22596 22597 b9f377 GetProcAddress 22595->22597 22598 b9f6fd GetModuleFileNameW 22596->22598 22698 bb462a 42 API calls __vswprintf_c_l 22596->22698 22599 b9f3a0 GetProcAddress 22597->22599 22600 b9f390 22597->22600 22609 b9f718 22598->22609 22599->22596 22601 b9f3ac 22599->22601 22600->22599 22601->22596 22603 b9f63b 22603->22598 22604 b9f646 GetModuleFileNameW CreateFileW 22603->22604 22605 b9f6f1 CloseHandle 22604->22605 22606 b9f675 SetFilePointer 22604->22606 22605->22598 22606->22605 22607 b9f685 ReadFile 22606->22607 22607->22605 22615 b9f6a4 22607->22615 22611 b9f74d CompareStringW 22609->22611 22613 b9f783 GetFileAttributesW 22609->22613 22614 b9f797 22609->22614 22689 b9a8e0 22609->22689 22692 b9f309 22609->22692 22611->22609 22612 b9f309 2 API calls 22612->22615 22613->22609 22613->22614 22616 b9f7a4 22614->22616 22618 b9f7d6 22614->22618 22615->22605 22615->22612 22619 b9f7bc GetFileAttributesW 22616->22619 22621 b9f7d0 22616->22621 22617 b9f8e5 22641 ba8b8e GetCurrentDirectoryW 22617->22641 22618->22617 22620 b9a8e0 GetVersionExW 22618->22620 22619->22616 22619->22621 22622 b9f7f0 22620->22622 22621->22618 22623 b9f85d 22622->22623 22624 b9f7f7 22622->22624 22625 b93f5b _swprintf 51 API calls 22623->22625 22626 b9f309 2 API calls 22624->22626 22627 b9f885 AllocConsole 22625->22627 22628 b9f801 22626->22628 22629 b9f8dd ExitProcess 22627->22629 22630 b9f892 GetCurrentProcessId AttachConsole 22627->22630 22631 b9f309 2 API calls 22628->22631 22699 bb20b3 22630->22699 22633 b9f80b 22631->22633 22635 b9d142 54 API calls 22633->22635 22634 b9f8b3 GetStdHandle WriteConsoleW Sleep FreeConsole 22634->22629 22636 b9f826 22635->22636 22637 b93f5b _swprintf 51 API calls 22636->22637 22638 b9f839 22637->22638 22639 b9d142 54 API calls 22638->22639 22640 b9f848 22639->22640 22640->22629 22641->22308 22643 b9f309 2 API calls 22642->22643 22644 ba904a OleInitialize 22643->22644 22645 ba906d GdiplusStartup SHGetMalloc 22644->22645 22645->22310 22647 ba0746 IsDBCSLeadByte 22646->22647 22647->22647 22648 ba075e 22647->22648 22648->22312 22650 baa8de 22649->22650 22651 baa926 CharUpperW 22650->22651 22652 baa9a9 CharUpperW 22650->22652 22653 baa9f4 22650->22653 22654 baa94d CharUpperW 22650->22654 22701 b9dfde 73 API calls ___scrt_get_show_window_mode 22650->22701 22651->22650 22652->22650 22653->22321 22653->22322 22654->22650 22657 bacec0 22656->22657 22658 babe17 SetEnvironmentVariableW 22657->22658 22660 babe3a 22658->22660 22659 babe62 22659->22314 22660->22659 22661 babe56 SetEnvironmentVariableW 22660->22661 22661->22659 22663 ba9aa0 GetObjectW 22662->22663 22664 ba9a97 22662->22664 22702 ba8ac0 22663->22702 22707 ba8bd0 FindResourceW 22664->22707 22669 ba9af3 22680 b9caa7 22669->22680 22670 ba9ad3 22723 ba8b22 GetDC GetDeviceCaps ReleaseDC 22670->22723 22671 ba8bd0 13 API calls 22673 ba9ac8 22671->22673 22673->22670 22675 ba9ace DeleteObject 22673->22675 22674 ba9adb 22724 ba8adf GetDC GetDeviceCaps ReleaseDC 22674->22724 22675->22670 22677 ba9ae4 22725 ba8cf3 8 API calls ___scrt_get_show_window_mode 22677->22725 22679 ba9aeb DeleteObject 22679->22669 22736 b9cacc 22680->22736 22684 b9caba 22684->22331 22686 ba90c4 GdiplusShutdown CoUninitialize 22685->22686 22686->22347 22687->22337 22688->22346 22690 b9a930 22689->22690 22691 b9a8f4 GetVersionExW 22689->22691 22690->22609 22691->22690 22693 bacec0 22692->22693 22694 b9f316 GetSystemDirectoryW 22693->22694 22695 b9f34c 22694->22695 22696 b9f32e 22694->22696 22695->22609 22697 b9f33f LoadLibraryW 22696->22697 22697->22695 22698->22603 22700 bb20bb 22699->22700 22700->22634 22700->22700 22701->22650 22726 ba8adf GetDC GetDeviceCaps ReleaseDC 22702->22726 22704 ba8ac7 22705 ba8ad3 22704->22705 22727 ba8b22 GetDC GetDeviceCaps ReleaseDC 22704->22727 22705->22669 22705->22670 22705->22671 22708 ba8bf1 SizeofResource 22707->22708 22711 ba8c23 22707->22711 22709 ba8c05 LoadResource 22708->22709 22708->22711 22710 ba8c16 LockResource 22709->22710 22709->22711 22710->22711 22712 ba8c2a GlobalAlloc 22710->22712 22711->22663 22712->22711 22713 ba8c41 GlobalLock 22712->22713 22714 ba8cb8 GlobalFree 22713->22714 22715 ba8c4c __vswprintf_c_l 22713->22715 22714->22711 22716 ba8c54 CreateStreamOnHGlobal 22715->22716 22717 ba8c6c 22716->22717 22718 ba8cb1 GlobalUnlock 22716->22718 22728 ba8b65 GdipAlloc 22717->22728 22718->22714 22721 ba8c90 GdipCreateHBITMAPFromBitmap 22722 ba8ca6 22721->22722 22722->22718 22723->22674 22724->22677 22725->22679 22726->22704 22727->22705 22729 ba8b84 22728->22729 22730 ba8b77 22728->22730 22729->22718 22729->22721 22729->22722 22732 ba8924 22730->22732 22733 ba894c GdipCreateBitmapFromStream 22732->22733 22734 ba8945 GdipCreateBitmapFromStreamICM 22732->22734 22735 ba8951 22733->22735 22734->22735 22735->22729 22737 b9cad6 _wcschr __EH_prolog 22736->22737 22738 b9cb02 GetModuleFileNameW 22737->22738 22739 b9cb33 22737->22739 22740 b9cb1c 22738->22740 22759 b9973d 22739->22759 22740->22739 22742 b9cce9 22776 b99437 22742->22776 22745 b9cc9f 22745->22742 22746 b999e0 70 API calls 22745->22746 22749 b9ccb9 ___std_exception_copy 22746->22749 22749->22742 22750 b9990d 73 API calls 22749->22750 22753 b9ccdf ___std_exception_copy 22750->22753 22752 b9cb63 22752->22742 22752->22745 22768 b99aeb 22752->22768 22783 b9990d 22752->22783 22791 b999e0 22752->22791 22753->22742 22796 ba06e9 MultiByteToWideChar 22753->22796 22755 b9ce48 GetModuleHandleW FindResourceW 22756 b9ce76 22755->22756 22758 b9ce70 22755->22758 22757 b9c91f 52 API calls 22756->22757 22757->22758 22758->22684 22760 b99747 22759->22760 22761 b9979d CreateFileW 22760->22761 22762 b997ca GetLastError 22761->22762 22763 b9981b 22761->22763 22764 b9b275 2 API calls 22762->22764 22763->22752 22765 b997ea 22764->22765 22765->22763 22766 b997ee CreateFileW GetLastError 22765->22766 22767 b99812 22766->22767 22767->22763 22769 b99b0f SetFilePointer 22768->22769 22770 b99afe 22768->22770 22771 b99b48 22769->22771 22772 b99b2d GetLastError 22769->22772 22770->22771 22797 b96eae 68 API calls 22770->22797 22771->22752 22772->22771 22774 b99b37 22772->22774 22774->22771 22798 b96eae 68 API calls 22774->22798 22777 b9945b 22776->22777 22782 b9946c 22776->22782 22778 b9946e 22777->22778 22779 b99467 22777->22779 22777->22782 22804 b994a3 22778->22804 22799 b995ea 22779->22799 22782->22755 22786 b99924 22783->22786 22785 b99985 22785->22752 22786->22785 22787 b99977 22786->22787 22789 b99987 22786->22789 22819 b99613 22786->22819 22831 b96e74 68 API calls 22787->22831 22789->22785 22790 b99613 5 API calls 22789->22790 22790->22789 22836 b99897 22791->22836 22794 b99a0b 22794->22752 22796->22742 22797->22769 22798->22771 22800 b995f3 22799->22800 22801 b995f7 22799->22801 22800->22782 22801->22800 22810 b99dac 22801->22810 22805 b994af 22804->22805 22806 b994cd 22804->22806 22805->22806 22808 b994bb CloseHandle 22805->22808 22807 b994ec 22806->22807 22818 b96d80 67 API calls 22806->22818 22807->22782 22808->22806 22811 bacec0 22810->22811 22812 b99db9 DeleteFileW 22811->22812 22813 b99dcc 22812->22813 22814 b99611 22812->22814 22815 b9b275 2 API calls 22813->22815 22814->22782 22816 b99de0 22815->22816 22816->22814 22817 b99de4 DeleteFileW 22816->22817 22817->22814 22818->22807 22820 b9962c ReadFile 22819->22820 22821 b99621 GetStdHandle 22819->22821 22822 b99665 22820->22822 22823 b99645 22820->22823 22821->22820 22822->22786 22832 b9971a 22823->22832 22825 b9964c 22826 b9965a 22825->22826 22827 b9966d GetLastError 22825->22827 22828 b9967c 22825->22828 22829 b99613 GetFileType 22826->22829 22827->22822 22827->22828 22828->22822 22830 b9968c GetLastError 22828->22830 22829->22822 22830->22822 22830->22826 22831->22785 22833 b99720 22832->22833 22834 b99723 GetFileType 22832->22834 22833->22825 22835 b99731 22834->22835 22835->22825 22837 b998a3 22836->22837 22840 b99902 22836->22840 22838 b998da SetFilePointer 22837->22838 22839 b998f8 GetLastError 22838->22839 22838->22840 22839->22840 22840->22794 22841 b96eae 68 API calls 22840->22841 22841->22794 22843 bb494d _abort 22842->22843 22844 bb4965 22843->22844 22846 bb4a9b _abort GetModuleHandleW 22843->22846 22864 bb76d6 EnterCriticalSection 22844->22864 22847 bb4959 22846->22847 22847->22844 22876 bb4adf GetModuleHandleExW 22847->22876 22850 bb496d 22861 bb4a0b 22850->22861 22863 bb49e2 22850->22863 22884 bb5447 20 API calls _abort 22850->22884 22852 bb4a28 22868 bb4a5a 22852->22868 22853 bb4a54 22885 bbf149 5 API calls DloadUnlock 22853->22885 22854 bb56d0 _abort 5 API calls 22860 bb49fa 22854->22860 22855 bb56d0 _abort 5 API calls 22855->22861 22860->22855 22865 bb4a4b 22861->22865 22863->22854 22863->22860 22864->22850 22886 bb771e LeaveCriticalSection 22865->22886 22867 bb4a24 22867->22852 22867->22853 22887 bb7b13 22868->22887 22871 bb4a88 22874 bb4adf _abort 8 API calls 22871->22874 22872 bb4a68 GetPEB 22872->22871 22873 bb4a78 GetCurrentProcess TerminateProcess 22872->22873 22873->22871 22875 bb4a90 ExitProcess 22874->22875 22877 bb4b09 GetProcAddress 22876->22877 22878 bb4b2c 22876->22878 22882 bb4b1e 22877->22882 22879 bb4b3b 22878->22879 22880 bb4b32 FreeLibrary 22878->22880 22881 bad783 DloadUnlock 5 API calls 22879->22881 22880->22879 22883 bb4b45 22881->22883 22882->22878 22883->22844 22884->22863 22886->22867 22888 bb7b38 22887->22888 22891 bb7b2e 22887->22891 22889 bb7735 _free 5 API calls 22888->22889 22889->22891 22890 bad783 DloadUnlock 5 API calls 22892 bb4a64 22890->22892 22891->22890 22892->22871 22892->22872 23875 bb7216 21 API calls 23876 bbee16 CloseHandle 23815 bad002 38 API calls ___FrameUnwindToState 23907 bb6f03 21 API calls _free 23847 bb3501 QueryPerformanceFrequency QueryPerformanceCounter 23908 bbc301 21 API calls __vswprintf_c_l 23879 bb0a00 6 API calls 3 library calls 23909 bad779 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 21903 bab077 21905 bab07c 21903->21905 21917 baaa99 _wcsrchr 21903->21917 21905->21917 21929 bab9aa 21905->21929 21907 bab642 21909 baad86 SetWindowTextW 21909->21917 21914 baab77 SetFileAttributesW 21916 baac32 GetFileAttributesW 21914->21916 21925 baab6a ___scrt_get_show_window_mode 21914->21925 21919 baac40 DeleteFileW 21916->21919 21916->21925 21917->21907 21917->21909 21921 baaf50 GetDlgItem SetWindowTextW SendMessageW 21917->21921 21923 baaf92 SendMessageW 21917->21923 21917->21925 21928 ba0b12 CompareStringW 21917->21928 21952 ba96ec 21917->21952 21956 ba8b8e GetCurrentDirectoryW 21917->21956 21957 b9a1a9 7 API calls 21917->21957 21963 b9a132 FindClose 21917->21963 21964 ba9844 69 API calls ___std_exception_copy 21917->21964 21965 bb20de 21917->21965 21919->21925 21921->21917 21923->21917 21925->21914 21925->21916 21925->21917 21958 b9b100 52 API calls 2 library calls 21925->21958 21959 b93f5b 21925->21959 21962 b9a1a9 7 API calls 21925->21962 21926 baac86 MoveFileW 21926->21925 21927 baac9e MoveFileExW 21926->21927 21927->21925 21928->21917 21932 bab9b4 ___scrt_get_show_window_mode 21929->21932 21930 babc0c 21930->21917 21931 baba9f 21978 b99dff 21931->21978 21932->21930 21932->21931 21981 ba0b12 CompareStringW 21932->21981 21936 babad3 ShellExecuteExW 21936->21930 21943 babae6 21936->21943 21938 babacb 21938->21936 21939 babb21 21983 babe69 WaitForSingleObject PeekMessageW WaitForSingleObject 21939->21983 21940 babb77 CloseHandle 21941 babb90 21940->21941 21942 babb85 21940->21942 21941->21930 21948 babc07 ShowWindow 21941->21948 21984 ba0b12 CompareStringW 21942->21984 21943->21939 21943->21940 21946 babb1b ShowWindow 21943->21946 21946->21939 21947 babb39 21947->21940 21949 babb4c GetExitCodeProcess 21947->21949 21948->21930 21949->21940 21950 babb5f 21949->21950 21950->21940 21953 ba96f6 21952->21953 21954 ba97cc 21953->21954 21955 ba97a9 ExpandEnvironmentStringsW 21953->21955 21954->21917 21955->21954 21956->21917 21957->21917 21958->21925 22008 b93f2e 21959->22008 21962->21925 21963->21917 21964->21917 21966 bb5aea 21965->21966 21967 bb5b02 21966->21967 21968 bb5af7 21966->21968 21970 bb5b0a 21967->21970 21976 bb5b13 _free 21967->21976 22095 bb59fc 21968->22095 21971 bb59c2 _free 20 API calls 21970->21971 21974 bb5aff 21971->21974 21972 bb5b18 22102 bb5e3e 20 API calls _free 21972->22102 21973 bb5b3d RtlReAllocateHeap 21973->21974 21973->21976 21974->21917 21976->21972 21976->21973 22103 bb46ca 7 API calls 2 library calls 21976->22103 21985 b99e13 21978->21985 21981->21931 21982 b9ae20 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 21982->21938 21983->21947 21984->21941 21993 bacec0 21985->21993 21988 b99e08 21988->21936 21988->21982 21989 b99e31 21995 b9b275 21989->21995 21991 b99e45 21991->21988 21992 b99e49 GetFileAttributesW 21991->21992 21992->21988 21994 b99e20 GetFileAttributesW 21993->21994 21994->21988 21994->21989 21996 b9b282 21995->21996 22004 b9b28c 21996->22004 22005 b9b40f CharUpperW 21996->22005 21998 b9b29b 22006 b9b43b CharUpperW 21998->22006 22000 b9b2aa 22001 b9b2ae 22000->22001 22002 b9b325 GetCurrentDirectoryW 22000->22002 22007 b9b40f CharUpperW 22001->22007 22002->22004 22004->21991 22005->21998 22006->22000 22007->22004 22009 b93f45 __vswprintf_c_l 22008->22009 22012 bb34dd 22009->22012 22015 bb21bb 22012->22015 22016 bb21fb 22015->22016 22017 bb21e3 22015->22017 22016->22017 22019 bb2203 22016->22019 22032 bb5e3e 20 API calls _free 22017->22032 22034 bb2636 22019->22034 22020 bb21e8 22033 bb5d1d 26 API calls pre_c_initialization 22020->22033 22026 bb228b 22043 bb283c 51 API calls 3 library calls 22026->22043 22027 b93f4f GetFileAttributesW 22027->21925 22027->21926 22030 bb21f3 22045 bad783 22030->22045 22031 bb2296 22044 bb26b9 20 API calls _free 22031->22044 22032->22020 22033->22030 22035 bb2213 22034->22035 22036 bb2653 22034->22036 22042 bb2601 20 API calls 2 library calls 22035->22042 22036->22035 22052 bb631f GetLastError 22036->22052 22038 bb2674 22072 bb646e 38 API calls __fassign 22038->22072 22040 bb268d 22073 bb649b 38 API calls __fassign 22040->22073 22042->22026 22043->22031 22044->22030 22046 bad78e IsProcessorFeaturePresent 22045->22046 22047 bad78c 22045->22047 22049 baddb8 22046->22049 22047->22027 22094 badd7c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 22049->22094 22051 bade9b 22051->22027 22053 bb633b 22052->22053 22054 bb6335 22052->22054 22058 bb638a SetLastError 22053->22058 22075 bb5a8d 22053->22075 22074 bb78f8 11 API calls 2 library calls 22054->22074 22058->22038 22061 bb636a 22063 bb6355 22061->22063 22064 bb6371 22061->22064 22062 bb635b 22066 bb6396 SetLastError 22062->22066 22082 bb59c2 22063->22082 22089 bb6191 20 API calls _free 22064->22089 22090 bb5a4a 38 API calls _abort 22066->22090 22067 bb637c 22069 bb59c2 _free 20 API calls 22067->22069 22071 bb6383 22069->22071 22071->22058 22071->22066 22072->22040 22073->22035 22074->22053 22081 bb5a9a _free 22075->22081 22076 bb5ada 22092 bb5e3e 20 API calls _free 22076->22092 22077 bb5ac5 RtlAllocateHeap 22079 bb5ad8 22077->22079 22077->22081 22079->22063 22088 bb794e 11 API calls 2 library calls 22079->22088 22081->22076 22081->22077 22091 bb46ca 7 API calls 2 library calls 22081->22091 22083 bb59cd RtlFreeHeap 22082->22083 22087 bb59f6 _free 22082->22087 22084 bb59e2 22083->22084 22083->22087 22093 bb5e3e 20 API calls _free 22084->22093 22086 bb59e8 GetLastError 22086->22087 22087->22062 22088->22061 22089->22067 22091->22081 22092->22079 22093->22086 22094->22051 22096 bb5a3a 22095->22096 22100 bb5a0a _free 22095->22100 22105 bb5e3e 20 API calls _free 22096->22105 22098 bb5a25 RtlAllocateHeap 22099 bb5a38 22098->22099 22098->22100 22099->21974 22100->22096 22100->22098 22104 bb46ca 7 API calls 2 library calls 22100->22104 22102->21974 22103->21976 22104->22100 22105->22099 23910 bbd774 IsProcessorFeaturePresent 23848 ba8963 GdipDisposeImage GdipFree __except_handler4 23911 bb1f60 RtlUnwind 23825 b91067 75 API calls pre_c_initialization 23850 ba995f 104 API calls 23851 ba955f 71 API calls 22171 bacd5c 22172 bacd66 22171->22172 22175 bacabc 22172->22175 22203 bac7ca 22175->22203 22177 bacad6 22178 bacb33 22177->22178 22182 bacb57 22177->22182 22214 baca3a 11 API calls 3 library calls 22178->22214 22180 bacb3e RaiseException 22198 bacd2c 22180->22198 22181 bad783 DloadUnlock 5 API calls 22184 bacd3b 22181->22184 22183 bacbcf LoadLibraryExA 22182->22183 22186 bacc30 22182->22186 22187 baccfe 22182->22187 22191 bacc42 22182->22191 22185 bacbe2 GetLastError 22183->22185 22183->22186 22188 bacc0b 22185->22188 22194 bacbf5 22185->22194 22190 bacc3b FreeLibrary 22186->22190 22186->22191 22217 baca3a 11 API calls 3 library calls 22187->22217 22215 baca3a 11 API calls 3 library calls 22188->22215 22189 bacca0 GetProcAddress 22189->22187 22193 baccb0 GetLastError 22189->22193 22190->22191 22191->22187 22191->22189 22196 baccc3 22193->22196 22194->22186 22194->22188 22195 bacc16 RaiseException 22195->22198 22196->22187 22216 baca3a 11 API calls 3 library calls 22196->22216 22198->22181 22200 bacce4 RaiseException 22201 bac7ca ___delayLoadHelper2@8 11 API calls 22200->22201 22202 baccfb 22201->22202 22202->22187 22204 bac7fc 22203->22204 22205 bac7d6 22203->22205 22204->22177 22218 bac878 8 API calls DloadUnlock 22205->22218 22207 bac7db 22208 bac7f7 22207->22208 22219 bac9ca VirtualQuery GetSystemInfo VirtualProtect DloadObtainSection DloadMakePermanentImageCommit 22207->22219 22220 bac7fd GetModuleHandleW GetProcAddress GetProcAddress 22208->22220 22211 bad783 DloadUnlock 5 API calls 22212 bacab8 22211->22212 22212->22177 22213 baca87 22213->22211 22214->22180 22215->22195 22216->22200 22217->22198 22218->22207 22219->22208 22220->22213 23827 b9605e 73 API calls 23829 bb0052 RaiseException 23852 bad553 46 API calls 6 library calls 23912 bb7ede 27 API calls DloadUnlock 23913 bad74a 28 API calls 2 library calls 22914 ba9b4f 22915 ba9b59 __EH_prolog 22914->22915 23074 b912e7 22915->23074 22918 ba9b9b 22922 ba9ba8 22918->22922 22923 ba9c11 22918->22923 22977 ba9b87 22918->22977 22919 baa230 23147 bab8bc 22919->23147 22927 ba9bad 22922->22927 22928 ba9be4 22922->22928 22926 ba9cb0 GetDlgItemTextW 22923->22926 22932 ba9c2b 22923->22932 22924 baa24e SendMessageW 22925 baa25c 22924->22925 22930 baa276 GetDlgItem SendMessageW 22925->22930 22931 baa265 SendDlgItemMessageW 22925->22931 22926->22928 22929 ba9ce7 22926->22929 22933 b9d142 54 API calls 22927->22933 22927->22977 22934 ba9c05 KiUserCallbackDispatcher 22928->22934 22928->22977 22936 ba9cff GetDlgItem 22929->22936 23072 ba9cf0 22929->23072 23165 ba8b8e GetCurrentDirectoryW 22930->23165 22931->22930 22937 b9d142 54 API calls 22932->22937 22938 ba9bc7 22933->22938 22934->22977 22940 ba9d39 SetFocus 22936->22940 22941 ba9d13 SendMessageW SendMessageW 22936->22941 22942 ba9c4d SetDlgItemTextW 22937->22942 23187 b91227 SHGetMalloc 22938->23187 22939 baa2a8 GetDlgItem 22944 baa2c1 22939->22944 22945 baa2c7 SetWindowTextW 22939->22945 22947 ba9d49 22940->22947 22958 ba9d55 22940->22958 22941->22940 22946 ba9c5b 22942->22946 22944->22945 23166 ba8fc8 GetClassNameW 22945->23166 22955 ba9c68 GetMessageW 22946->22955 22965 ba9c8e TranslateMessage DispatchMessageW 22946->22965 22946->22977 22948 b9d142 54 API calls 22947->22948 22952 ba9d53 22948->22952 22949 ba9bce 22953 ba9bd2 SetDlgItemTextW 22949->22953 22949->22977 22950 baa1d0 22954 b9d142 54 API calls 22950->22954 23084 bab70e GetDlgItem 22952->23084 22953->22977 22959 baa1e0 SetDlgItemTextW 22954->22959 22955->22946 22955->22977 22963 b9d142 54 API calls 22958->22963 22961 baa1f4 22959->22961 22968 b9d142 54 API calls 22961->22968 22967 ba9d87 22963->22967 22964 ba9daa 23092 b99cce 22964->23092 22965->22946 22966 baa312 22971 baa342 22966->22971 22975 b9d142 54 API calls 22966->22975 22972 b93f5b _swprintf 51 API calls 22967->22972 22973 baa21d 22968->22973 22970 baaa45 91 API calls 22970->22966 22982 baaa45 91 API calls 22971->22982 23006 baa3fa 22971->23006 22972->22952 22976 b9d142 54 API calls 22973->22976 22981 baa325 SetDlgItemTextW 22975->22981 22976->22977 22978 baa4aa 22983 baa4bc 22978->22983 22984 baa4b3 EnableWindow 22978->22984 22979 ba9ddf GetLastError 22980 ba9de6 22979->22980 23098 ba9023 SetCurrentDirectoryW 22980->23098 22986 b9d142 54 API calls 22981->22986 22987 baa35d 22982->22987 22988 baa4d9 22983->22988 23196 b912a4 GetDlgItem EnableWindow 22983->23196 22984->22983 22990 baa339 SetDlgItemTextW 22986->22990 22991 baa36f 22987->22991 23011 baa394 22987->23011 22996 baa500 22988->22996 23003 baa4f8 SendMessageW 22988->23003 22989 ba9dfc 22994 ba9e0f 22989->22994 22995 ba9e05 GetLastError 22989->22995 22990->22971 23194 ba859c 6 API calls 22991->23194 22992 baa3ed 22997 baaa45 91 API calls 22992->22997 23007 ba9e9a 22994->23007 23009 ba9e27 GetTickCount 22994->23009 23050 ba9e8a 22994->23050 22995->22994 22996->22977 23000 b9d142 54 API calls 22996->23000 22997->23006 22999 baa4cf 23197 b912a4 GetDlgItem EnableWindow 22999->23197 23005 baa519 SetDlgItemTextW 23000->23005 23001 baa388 23001->23011 23003->22996 23004 baa488 23195 ba859c 6 API calls 23004->23195 23005->22977 23006->22978 23006->23004 23017 b9d142 54 API calls 23006->23017 23013 baa06e 23007->23013 23014 ba9eb2 GetModuleFileNameW 23007->23014 23008 baa0d3 23107 b912c2 GetDlgItem ShowWindow 23008->23107 23015 b93f5b _swprintf 51 API calls 23009->23015 23011->22992 23018 baaa45 91 API calls 23011->23018 23013->22928 23021 b9d142 54 API calls 23013->23021 23188 b9de7c 73 API calls 23014->23188 23027 ba9e44 23015->23027 23016 baa4a7 23016->22978 23017->23006 23022 baa3c2 23018->23022 23019 baa0e3 23108 b912c2 GetDlgItem ShowWindow 23019->23108 23026 baa082 23021->23026 23022->22992 23028 baa3cb DialogBoxParamW 23022->23028 23024 ba9edc 23025 b93f5b _swprintf 51 API calls 23024->23025 23031 ba9efe CreateFileMappingW 23025->23031 23032 b93f5b _swprintf 51 API calls 23026->23032 23099 b994f1 23027->23099 23028->22928 23028->22992 23029 baa0ed 23030 b9d142 54 API calls 23029->23030 23034 baa0f7 SetDlgItemTextW 23030->23034 23035 ba9f60 GetCommandLineW 23031->23035 23068 ba9fdd __vswprintf_c_l 23031->23068 23036 baa0a0 23032->23036 23109 b912c2 GetDlgItem ShowWindow 23034->23109 23040 ba9f71 23035->23040 23049 b9d142 54 API calls 23036->23049 23037 ba9e6a 23041 ba9e78 23037->23041 23042 ba9e71 GetLastError 23037->23042 23038 ba9fe8 ShellExecuteExW 23063 baa005 23038->23063 23189 ba97e4 SHGetMalloc 23040->23189 23045 b99437 72 API calls 23041->23045 23042->23041 23043 baa10b SetDlgItemTextW GetDlgItem 23046 baa13c 23043->23046 23047 baa124 GetWindowLongW SetWindowLongW 23043->23047 23045->23050 23110 baaa45 23046->23110 23047->23046 23048 ba9f8d 23190 ba97e4 SHGetMalloc 23048->23190 23049->22928 23050->23007 23050->23008 23054 ba9f99 23191 ba97e4 SHGetMalloc 23054->23191 23055 baa048 23055->23013 23062 baa05e UnmapViewOfFile CloseHandle 23055->23062 23056 baaa45 91 API calls 23058 baa158 23056->23058 23135 babc78 23058->23135 23059 ba9fa5 23192 b9dfde 73 API calls ___scrt_get_show_window_mode 23059->23192 23062->23013 23063->23055 23066 baa034 Sleep 23063->23066 23065 ba9fbc MapViewOfFile 23065->23068 23066->23055 23066->23063 23068->23038 23072->22928 23072->22950 23075 b91349 23074->23075 23076 b912f0 23074->23076 23216 b9ceb0 GetWindowLongW SetWindowLongW 23075->23216 23078 b91356 23076->23078 23198 b9ced7 23076->23198 23078->22918 23078->22919 23078->22977 23081 b91325 GetDlgItem 23081->23078 23082 b91335 23081->23082 23082->23078 23083 b9133b SetWindowTextW 23082->23083 23083->23078 23085 bab76a SendMessageW SendMessageW 23084->23085 23086 bab73a 23084->23086 23087 bab7a2 23085->23087 23088 bab7c1 SendMessageW SendMessageW SendMessageW 23085->23088 23091 bab745 ShowWindow SendMessageW SendMessageW 23086->23091 23087->23088 23089 bab80b SendMessageW 23088->23089 23090 bab7ec SendMessageW 23088->23090 23089->22964 23090->23089 23091->23085 23095 b99cd8 23092->23095 23093 b99d69 23094 b99e86 9 API calls 23093->23094 23096 b99d92 23093->23096 23094->23096 23095->23093 23095->23096 23220 b99e86 23095->23220 23096->22979 23096->22980 23098->22989 23100 b994fb 23099->23100 23101 b99565 CreateFileW 23100->23101 23102 b99559 23100->23102 23101->23102 23103 b995b7 23102->23103 23104 b9b275 2 API calls 23102->23104 23103->23037 23105 b9959e 23104->23105 23105->23103 23106 b995a2 CreateFileW 23105->23106 23106->23103 23107->23019 23108->23029 23109->23043 23111 baaa4f __EH_prolog 23110->23111 23112 baa14a 23111->23112 23113 ba96ec ExpandEnvironmentStringsW 23111->23113 23112->23056 23124 baaa86 _wcsrchr 23113->23124 23115 ba96ec ExpandEnvironmentStringsW 23115->23124 23116 baad86 SetWindowTextW 23116->23124 23119 bb20de 22 API calls 23119->23124 23121 baab77 SetFileAttributesW 23123 baac32 GetFileAttributesW 23121->23123 23130 baab6a ___scrt_get_show_window_mode 23121->23130 23126 baac40 DeleteFileW 23123->23126 23123->23130 23124->23112 23124->23115 23124->23116 23124->23119 23128 baaf50 GetDlgItem SetWindowTextW SendMessageW 23124->23128 23124->23130 23131 baaf92 SendMessageW 23124->23131 23241 ba0b12 CompareStringW 23124->23241 23242 ba8b8e GetCurrentDirectoryW 23124->23242 23243 b9a1a9 7 API calls 23124->23243 23246 b9a132 FindClose 23124->23246 23247 ba9844 69 API calls ___std_exception_copy 23124->23247 23126->23130 23128->23124 23129 b93f5b _swprintf 51 API calls 23132 baac75 GetFileAttributesW 23129->23132 23130->23121 23130->23123 23130->23124 23130->23129 23244 b9b100 52 API calls 2 library calls 23130->23244 23245 b9a1a9 7 API calls 23130->23245 23131->23124 23132->23130 23133 baac86 MoveFileW 23132->23133 23133->23130 23134 baac9e MoveFileExW 23133->23134 23134->23130 23136 babc82 __EH_prolog 23135->23136 23248 b9f165 69 API calls 23136->23248 23138 babcb3 23249 b95bb7 69 API calls 23138->23249 23140 babcd1 23250 b97b10 74 API calls 2 library calls 23140->23250 23142 babd15 23251 b97c84 23142->23251 23144 babd24 23260 b97ba0 23144->23260 23148 bab8c9 23147->23148 23149 ba8ac0 6 API calls 23148->23149 23150 bab8ce 23149->23150 23151 bab8d6 GetWindow 23150->23151 23152 baa236 23150->23152 23151->23152 23155 bab8f2 23151->23155 23152->22924 23152->22925 23153 bab8ff GetClassNameW 23761 ba0b12 CompareStringW 23153->23761 23155->23152 23155->23153 23156 bab988 GetWindow 23155->23156 23157 bab927 GetWindowLongW 23155->23157 23156->23152 23156->23155 23157->23156 23158 bab937 SendMessageW 23157->23158 23158->23156 23159 bab94d GetObjectW 23158->23159 23762 ba8b22 GetDC GetDeviceCaps ReleaseDC 23159->23762 23162 bab962 23763 ba8adf GetDC GetDeviceCaps ReleaseDC 23162->23763 23764 ba8cf3 8 API calls ___scrt_get_show_window_mode 23162->23764 23164 bab972 SendMessageW DeleteObject 23164->23156 23165->22939 23167 ba8fe9 23166->23167 23168 ba900e 23166->23168 23765 ba0b12 CompareStringW 23167->23765 23169 ba901c 23168->23169 23170 ba9013 SHAutoComplete 23168->23170 23174 ba9485 23169->23174 23170->23169 23172 ba8ffc 23172->23168 23173 ba9000 FindWindowExW 23172->23173 23173->23168 23175 ba948f __EH_prolog 23174->23175 23176 b9137e 75 API calls 23175->23176 23177 ba94b1 23176->23177 23766 b91edd 23177->23766 23180 ba94da 23183 b918f6 127 API calls 23180->23183 23181 ba94cb 23182 b9162e 79 API calls 23181->23182 23184 ba94d6 23182->23184 23185 ba94fc __vswprintf_c_l ___std_exception_copy 23183->23185 23184->22966 23184->22970 23186 b9162e 79 API calls 23185->23186 23186->23184 23187->22949 23188->23024 23189->23048 23190->23054 23191->23059 23192->23065 23194->23001 23195->23016 23196->22999 23197->22988 23217 b9c88e 23198->23217 23200 b9cefd GetWindowRect GetClientRect 23201 b9cff2 23200->23201 23206 b9cf57 23200->23206 23202 b9d034 GetSystemMetrics GetWindow 23201->23202 23203 b9cffc GetWindowTextW 23201->23203 23215 b9d054 23202->23215 23204 b9c91f 52 API calls 23203->23204 23208 b9d028 SetWindowTextW 23204->23208 23205 b9cfb8 GetWindowLongW 23210 b9cfe2 GetWindowRect 23205->23210 23206->23202 23206->23205 23207 b91312 23207->23078 23207->23081 23208->23202 23209 b9d060 GetWindowTextW 23209->23215 23210->23201 23211 b9d11b GetWindow 23211->23207 23211->23215 23212 b9d0a6 GetWindowRect 23212->23211 23213 b9c91f 52 API calls 23214 b9d093 SetWindowTextW 23213->23214 23214->23215 23215->23207 23215->23209 23215->23211 23215->23212 23215->23213 23216->23078 23218 b9c91f 52 API calls 23217->23218 23219 b9c8b6 _wcschr 23218->23219 23219->23200 23221 b99e93 23220->23221 23222 b99eb7 23221->23222 23223 b99eaa CreateDirectoryW 23221->23223 23224 b99dff 4 API calls 23222->23224 23223->23222 23225 b99eea 23223->23225 23226 b99ebd 23224->23226 23229 b99ef9 23225->23229 23233 b9a0c3 23225->23233 23227 b99efd GetLastError 23226->23227 23230 b9b275 2 API calls 23226->23230 23227->23229 23229->23095 23231 b99ed3 23230->23231 23231->23227 23232 b99ed7 CreateDirectoryW 23231->23232 23232->23225 23232->23227 23234 bacec0 23233->23234 23235 b9a0d0 SetFileAttributesW 23234->23235 23236 b9a113 23235->23236 23237 b9a0e6 23235->23237 23236->23229 23238 b9b275 2 API calls 23237->23238 23239 b9a0fa 23238->23239 23239->23236 23240 b9a0fe SetFileAttributesW 23239->23240 23240->23236 23241->23124 23242->23124 23243->23124 23244->23130 23245->23130 23246->23124 23247->23124 23248->23138 23249->23140 23250->23142 23252 b97c8e 23251->23252 23257 b97cf8 23252->23257 23286 b9a145 23252->23286 23254 b97da4 23254->23144 23256 b97d62 23256->23254 23292 b96d0d 67 API calls 23256->23292 23257->23256 23258 b9a145 8 API calls 23257->23258 23264 b9820b 23257->23264 23258->23257 23261 b97bae 23260->23261 23263 b97bb5 23260->23263 23262 ba0e21 79 API calls 23261->23262 23262->23263 23265 b98215 __EH_prolog 23264->23265 23293 b9137e 23265->23293 23267 b98230 23301 b99ba2 23267->23301 23273 b9825f 23421 b9162e 23273->23421 23274 b982fa 23320 b983a3 23274->23320 23277 b9835a 23324 b91e8e 23277->23324 23279 b9825b 23279->23273 23279->23274 23284 b9a145 8 API calls 23279->23284 23425 b9b6cb CompareStringW 23279->23425 23282 b98365 23282->23273 23328 b93a20 23282->23328 23338 b98409 23282->23338 23284->23279 23287 b9a15a 23286->23287 23288 b9a15e 23287->23288 23749 b9a273 23287->23749 23288->23252 23290 b9a16e 23290->23288 23291 b9a173 FindClose 23290->23291 23291->23288 23292->23254 23294 b91383 __EH_prolog 23293->23294 23427 b9c413 23294->23427 23296 b913ba 23300 b91413 ___scrt_get_show_window_mode 23296->23300 23433 bacdae 23296->23433 23299 b9ac66 75 API calls 23299->23300 23300->23267 23302 b99bad 23301->23302 23303 b98246 23302->23303 23442 b96e66 67 API calls 23302->23442 23303->23273 23305 b919b1 23303->23305 23306 b919bb __EH_prolog 23305->23306 23309 b919fd 23306->23309 23314 b919e4 23306->23314 23443 b9135c 23306->23443 23308 b91b16 23446 b96d0d 67 API calls 23308->23446 23309->23308 23312 b91b26 23309->23312 23309->23314 23311 b93a20 90 API calls 23317 b91b6d 23311->23317 23312->23311 23312->23314 23313 b91bb7 23313->23314 23319 b91bea 23313->23319 23447 b96d0d 67 API calls 23313->23447 23314->23279 23316 b93a20 90 API calls 23316->23317 23317->23313 23317->23316 23318 b93a20 90 API calls 23318->23319 23319->23314 23319->23318 23321 b983b0 23320->23321 23465 b9ffb8 GetSystemTime SystemTimeToFileTime 23321->23465 23323 b98314 23323->23277 23426 ba06c8 65 API calls 23323->23426 23325 b91e93 __EH_prolog 23324->23325 23326 b91ec7 23325->23326 23467 b918f6 23325->23467 23326->23282 23329 b93a2c 23328->23329 23330 b93a30 23328->23330 23329->23282 23331 b93a5d 23330->23331 23332 b93a4f 23330->23332 23685 b9276c 90 API calls 3 library calls 23331->23685 23334 b93a8f 23332->23334 23684 b93203 78 API calls 3 library calls 23332->23684 23334->23282 23336 b93a5b 23336->23334 23686 b91fd2 67 API calls 23336->23686 23339 b98413 __EH_prolog 23338->23339 23340 b9844f 23339->23340 23353 b98453 23339->23353 23715 ba77e7 93 API calls 23339->23715 23341 b98478 23340->23341 23344 b984ff 23340->23344 23340->23353 23343 b9849a 23341->23343 23341->23353 23716 b97a2f 151 API calls 23341->23716 23343->23353 23717 ba77e7 93 API calls 23343->23717 23344->23353 23687 b95d98 23344->23687 23348 b9858c 23348->23353 23695 b980f8 23348->23695 23351 b986e9 23352 b9a145 8 API calls 23351->23352 23354 b9874d 23351->23354 23352->23354 23353->23282 23699 b97c11 23354->23699 23356 b9c57d 73 API calls 23360 b987a7 _memcmp 23356->23360 23357 b988d1 23358 b989a0 23357->23358 23365 b9891f 23357->23365 23363 b989fb 23358->23363 23375 b989ab 23358->23375 23359 b988ca 23720 b96d0d 67 API calls 23359->23720 23360->23353 23360->23356 23360->23357 23360->23359 23718 b980a6 75 API calls 23360->23718 23719 b96d0d 67 API calls 23360->23719 23373 b9898f 23363->23373 23723 b97f88 89 API calls 23363->23723 23364 b989f9 23366 b99437 72 API calls 23364->23366 23367 b99dff 4 API calls 23365->23367 23365->23373 23366->23353 23370 b98956 23367->23370 23368 b99437 72 API calls 23368->23353 23370->23373 23721 b99161 89 API calls 23370->23721 23371 b98acd 23376 b9a6a9 8 API calls 23371->23376 23372 b98a64 23372->23371 23374 b9971a GetFileType 23372->23374 23417 b98fb5 23372->23417 23373->23364 23373->23372 23377 b98aa5 23374->23377 23375->23364 23722 b97dc4 93 API calls __except_handler4 23375->23722 23379 b98b1c 23376->23379 23377->23371 23724 b91f18 67 API calls 23377->23724 23381 b9a6a9 8 API calls 23379->23381 23383 b98b32 23381->23383 23386 b98bd5 23383->23386 23705 b99869 23383->23705 23384 b98abb 23725 b96f67 68 API calls 23384->23725 23387 b98c1e 23386->23387 23388 b98d22 23386->23388 23389 b98c8e 23387->23389 23390 b98c2e 23387->23390 23392 b98d48 23388->23392 23393 b98d34 23388->23393 23409 b98c4e 23388->23409 23391 b980f8 CharUpperW 23389->23391 23395 b98c72 23390->23395 23402 b98c3c 23390->23402 23396 b98ca9 23391->23396 23398 ba1fa9 68 API calls 23392->23398 23397 b990d0 120 API calls 23393->23397 23395->23409 23727 b977d4 101 API calls 23395->23727 23404 b98cd9 23396->23404 23405 b98cd2 23396->23405 23396->23409 23397->23409 23399 b98d61 23398->23399 23400 ba1c40 120 API calls 23399->23400 23400->23409 23726 b91f18 67 API calls 23402->23726 23729 b9900e 85 API calls __EH_prolog 23404->23729 23728 b97586 77 API calls __except_handler4 23405->23728 23408 b98e6c 23410 b98edb 23408->23410 23408->23417 23731 b99b6a SetEndOfFile 23408->23731 23409->23408 23730 b91f18 67 API calls 23409->23730 23710 b99a12 23410->23710 23414 b98f35 23415 b994a3 68 API calls 23414->23415 23416 b98f40 23415->23416 23416->23417 23418 b9a0c3 4 API calls 23416->23418 23417->23368 23419 b98f9f 23418->23419 23419->23417 23732 b91f18 67 API calls 23419->23732 23422 b91640 23421->23422 23748 b9c4b6 79 API calls 23422->23748 23425->23279 23426->23277 23428 b9c41d __EH_prolog 23427->23428 23429 bacdae new 8 API calls 23428->23429 23430 b9c460 23429->23430 23431 bacdae new 8 API calls 23430->23431 23432 b9c484 23431->23432 23432->23296 23436 bacdb3 ___std_exception_copy 23433->23436 23434 b91400 23434->23299 23434->23300 23436->23434 23439 bb46ca 7 API calls 2 library calls 23436->23439 23440 bad83a RaiseException FindHandler new 23436->23440 23441 bad81d RaiseException Concurrency::cancel_current_task FindHandler 23436->23441 23439->23436 23442->23303 23448 b91705 23443->23448 23445 b91378 23445->23309 23446->23314 23447->23319 23449 b9171b 23448->23449 23460 b91773 __vswprintf_c_l 23448->23460 23450 b91744 23449->23450 23461 b96dd3 67 API calls __vswprintf_c_l 23449->23461 23452 b9179a 23450->23452 23455 b91760 ___std_exception_copy 23450->23455 23454 bb20de 22 API calls 23452->23454 23453 b9173a 23462 b96e0b 68 API calls 23453->23462 23457 b917a1 23454->23457 23455->23460 23463 b96e0b 68 API calls 23455->23463 23457->23460 23464 b96e0b 68 API calls 23457->23464 23460->23445 23461->23453 23462->23450 23463->23460 23464->23460 23466 b9ffe8 __vswprintf_c_l 23465->23466 23466->23323 23468 b918fb __EH_prolog 23467->23468 23469 b91934 23468->23469 23471 b91964 23468->23471 23472 b9190f 23468->23472 23470 b93a20 90 API calls 23469->23470 23470->23472 23476 b93e69 23471->23476 23472->23326 23480 b93e72 23476->23480 23477 b93a20 90 API calls 23477->23480 23478 b91980 23478->23472 23481 b91da1 23478->23481 23480->23477 23480->23478 23493 b9f8f2 23480->23493 23482 b91dab __EH_prolog 23481->23482 23501 b93aa3 23482->23501 23484 b91dd4 23485 b91705 69 API calls 23484->23485 23487 b91e5b 23484->23487 23486 b91deb 23485->23486 23531 b9187c 69 API calls 23486->23531 23487->23472 23489 b91e03 23491 b91e0f 23489->23491 23532 ba06e9 MultiByteToWideChar 23489->23532 23533 b9187c 69 API calls 23491->23533 23494 b9f8f9 23493->23494 23495 b9f914 23494->23495 23499 b96dce RaiseException FindHandler 23494->23499 23497 b9f925 SetThreadExecutionState 23495->23497 23500 b96dce RaiseException FindHandler 23495->23500 23497->23480 23499->23495 23500->23497 23502 b93aad __EH_prolog 23501->23502 23503 b93adf 23502->23503 23504 b93ac3 23502->23504 23505 b93d1f 23503->23505 23509 b93b0b 23503->23509 23570 b96d0d 67 API calls 23504->23570 23589 b96d0d 67 API calls 23505->23589 23508 b93ace 23508->23484 23509->23508 23534 ba0be0 23509->23534 23511 b93b43 23538 ba1fa9 23511->23538 23513 b93b8c 23514 b93c17 23513->23514 23530 b93b83 23513->23530 23573 b9c57d 23513->23573 23551 b9a6a9 23514->23551 23515 b93b88 23515->23513 23572 b91fb8 69 API calls 23515->23572 23517 b93b78 23571 b96d0d 67 API calls 23517->23571 23518 b93b5a 23518->23513 23518->23515 23518->23517 23523 b93c2a 23524 b93c9b 23523->23524 23525 b93ca5 23523->23525 23555 b990d0 23524->23555 23579 ba1c40 23525->23579 23528 b93ca3 23528->23530 23588 b91f18 67 API calls 23528->23588 23566 ba0e21 23530->23566 23531->23489 23532->23491 23533->23487 23535 ba0bea __EH_prolog 23534->23535 23590 b9fb02 23535->23590 23537 ba0cea 23537->23511 23539 ba1fb8 23538->23539 23541 ba1fc2 23538->23541 23609 b96e0b 68 API calls 23539->23609 23542 ba2002 23541->23542 23543 ba2007 ___std_exception_copy 23541->23543 23550 ba2060 ___scrt_get_show_window_mode 23541->23550 23611 bb00ca RaiseException 23542->23611 23544 ba2117 23543->23544 23546 ba203c 23543->23546 23543->23550 23612 bb00ca RaiseException 23544->23612 23610 ba1eca 68 API calls 3 library calls 23546->23610 23548 ba213a 23550->23518 23552 b9a6b6 23551->23552 23554 b9a6c0 23551->23554 23553 bacdae new 8 API calls 23552->23553 23553->23554 23554->23523 23556 b990da __EH_prolog 23555->23556 23613 b97c6b 23556->23613 23559 b9135c 69 API calls 23560 b990ec 23559->23560 23616 b9c658 23560->23616 23562 b99146 23562->23528 23563 b9c658 115 API calls 23565 b990fe 23563->23565 23565->23562 23565->23563 23625 b9c810 91 API calls __vswprintf_c_l 23565->23625 23567 ba0e43 23566->23567 23632 b9fc30 23567->23632 23569 ba0e5c 23569->23508 23570->23508 23571->23530 23572->23513 23574 b9c59e 23573->23574 23575 b9c5b0 23573->23575 23648 b96195 73 API calls 23574->23648 23649 b96195 73 API calls 23575->23649 23578 b9c5a8 23578->23514 23580 ba1c49 23579->23580 23581 ba1c72 23579->23581 23582 ba1c66 23580->23582 23584 ba1c68 23580->23584 23585 ba1c5e 23580->23585 23581->23582 23664 ba421d 120 API calls 2 library calls 23581->23664 23582->23528 23663 ba4f35 115 API calls 23584->23663 23650 ba5984 23585->23650 23588->23530 23589->23508 23606 bacdf0 23590->23606 23592 b9fb0c EnterCriticalSection 23593 b9fb30 23592->23593 23604 b9fb4e 23592->23604 23596 bacdae new 8 API calls 23593->23596 23594 b9fb95 LeaveCriticalSection 23598 b9fba1 23594->23598 23595 b9fb66 23597 bacdae new 8 API calls 23595->23597 23599 b9fb3a 23596->23599 23600 b9fb70 23597->23600 23598->23537 23599->23604 23607 b9f930 71 API calls 23599->23607 23601 b9fb8a LeaveCriticalSection 23600->23601 23608 b9f930 71 API calls 23600->23608 23601->23598 23604->23594 23604->23595 23605 b9fb88 23605->23601 23606->23592 23607->23604 23608->23605 23609->23541 23610->23550 23611->23544 23612->23548 23614 b9a8e0 GetVersionExW 23613->23614 23615 b97c70 23614->23615 23615->23559 23622 b9c66d __vswprintf_c_l 23616->23622 23617 b9c7b7 23618 b9c7df 23617->23618 23626 b9c5f7 23617->23626 23620 b9f8f2 2 API calls 23618->23620 23623 b9c7ae 23620->23623 23622->23617 23622->23623 23630 b9a791 85 API calls 23622->23630 23631 ba77e7 93 API calls 23622->23631 23623->23565 23625->23565 23627 b9c600 23626->23627 23629 b9c651 23626->23629 23628 ba0680 PeekMessageW GetMessageW TranslateMessage DispatchMessageW SendDlgItemMessageW 23627->23628 23627->23629 23628->23629 23629->23618 23630->23622 23631->23622 23633 b9fc39 EnterCriticalSection 23632->23633 23634 b9fca2 23632->23634 23638 b9fc57 23633->23638 23640 b9fc75 23633->23640 23634->23569 23635 b9f9d1 77 API calls 23637 b9fc8f 23635->23637 23636 b9fc98 LeaveCriticalSection 23636->23634 23637->23636 23638->23640 23641 b9f9d1 23638->23641 23640->23635 23640->23636 23642 b9fdc9 72 API calls 23641->23642 23643 b9f9f3 ReleaseSemaphore 23642->23643 23644 b9fa31 DeleteCriticalSection CloseHandle CloseHandle 23643->23644 23645 b9fa13 23643->23645 23644->23640 23646 b9fac7 70 API calls 23645->23646 23647 b9fa1d CloseHandle 23646->23647 23647->23644 23647->23645 23648->23578 23649->23578 23665 ba21e6 23650->23665 23652 b9c658 115 API calls 23658 ba5995 ___BuildCatchObject __vswprintf_c_l 23652->23658 23653 ba5d67 23683 ba3ef1 92 API calls __vswprintf_c_l 23653->23683 23655 ba5d77 __vswprintf_c_l 23655->23582 23658->23652 23658->23653 23669 b9fa67 23658->23669 23675 ba2b3a 115 API calls 23658->23675 23676 ba5db9 115 API calls 23658->23676 23677 b9fdc9 23658->23677 23681 ba2593 92 API calls __vswprintf_c_l 23658->23681 23682 ba63f2 120 API calls __vswprintf_c_l 23658->23682 23663->23582 23664->23582 23667 ba21f0 ___std_exception_copy __EH_prolog ___scrt_get_show_window_mode 23665->23667 23666 ba22db 23666->23658 23667->23666 23668 b96e0b 68 API calls 23667->23668 23668->23667 23670 b9fa78 23669->23670 23671 b9fa73 23669->23671 23673 b9fa91 23670->23673 23674 b9fdc9 72 API calls 23670->23674 23672 b9fbb1 77 API calls 23671->23672 23672->23670 23673->23658 23674->23673 23675->23658 23676->23658 23678 b9fe0e 23677->23678 23679 b9fde3 ResetEvent ReleaseSemaphore 23677->23679 23678->23658 23680 b9fac7 70 API calls 23679->23680 23680->23678 23681->23658 23682->23658 23683->23655 23684->23336 23685->23336 23686->23334 23688 b95da6 23687->23688 23733 b95cc5 23688->23733 23691 b95dd9 23692 b95e1a 23691->23692 23693 b95e11 23691->23693 23738 b9a950 CharUpperW CompareStringW CompareStringW 23691->23738 23692->23693 23739 b9f0e1 CompareStringW 23692->23739 23693->23348 23697 b98116 23695->23697 23696 b981b7 CharUpperW 23698 b981ca 23696->23698 23697->23696 23698->23351 23700 b97c20 23699->23700 23701 b97c60 23700->23701 23745 b96f49 67 API calls 23700->23745 23701->23360 23703 b97c58 23746 b96d0d 67 API calls 23703->23746 23706 b99897 2 API calls 23705->23706 23707 b9987d 23706->23707 23708 b99888 23707->23708 23747 b99b6a SetEndOfFile 23707->23747 23708->23386 23711 b99a23 23710->23711 23714 b99a32 23710->23714 23712 b99a29 FlushFileBuffers 23711->23712 23711->23714 23712->23714 23713 b99aab SetFileTime 23713->23414 23714->23713 23715->23340 23716->23343 23717->23353 23718->23360 23719->23360 23720->23357 23721->23373 23722->23364 23723->23373 23724->23384 23725->23371 23726->23409 23727->23409 23728->23409 23729->23409 23730->23408 23731->23410 23732->23417 23740 b95bc2 23733->23740 23735 b95ce6 23735->23691 23737 b95bc2 3 API calls 23737->23735 23738->23691 23739->23693 23741 b95bcc 23740->23741 23743 b95cb4 23741->23743 23744 b9a950 CharUpperW CompareStringW CompareStringW 23741->23744 23743->23735 23743->23737 23744->23741 23745->23703 23746->23701 23747->23708 23750 b9a27d 23749->23750 23751 b9a29b FindFirstFileW 23750->23751 23752 b9a30d FindNextFileW 23750->23752 23755 b9a2b4 23751->23755 23760 b9a2f1 23751->23760 23753 b9a318 GetLastError 23752->23753 23754 b9a32c 23752->23754 23753->23754 23754->23760 23756 b9b275 2 API calls 23755->23756 23757 b9a2cd 23756->23757 23758 b9a2d1 FindFirstFileW 23757->23758 23759 b9a2e6 GetLastError 23757->23759 23758->23759 23758->23760 23759->23760 23760->23290 23761->23155 23762->23162 23763->23162 23764->23164 23765->23172 23767 b99ba2 67 API calls 23766->23767 23768 b91ee9 23767->23768 23769 b919b1 90 API calls 23768->23769 23771 b91eed 23768->23771 23770 b91efa 23769->23770 23770->23771 23773 b96d0d 67 API calls 23770->23773 23771->23180 23771->23181 23773->23771 23914 bb1b40 5 API calls 2 library calls 23887 ba9646 92 API calls

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 00B9F353: GetModuleHandleW.KERNEL32 ref: 00B9F36B
                                                                                                            • Part of subcall function 00B9F353: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00B9F383
                                                                                                            • Part of subcall function 00B9F353: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00B9F3A6
                                                                                                            • Part of subcall function 00BA8B8E: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00BA8B96
                                                                                                            • Part of subcall function 00BA9036: OleInitialize.OLE32(00000000), ref: 00BA904F
                                                                                                            • Part of subcall function 00BA9036: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00BA9086
                                                                                                            • Part of subcall function 00BA9036: SHGetMalloc.SHELL32(00BD20E8), ref: 00BA9090
                                                                                                            • Part of subcall function 00BA0722: GetCPInfo.KERNEL32(00000000,?), ref: 00BA0733
                                                                                                            • Part of subcall function 00BA0722: IsDBCSLeadByte.KERNEL32(00000000), ref: 00BA0747
                                                                                                          • GetCommandLineW.KERNEL32 ref: 00BAC179
                                                                                                          • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00BAC1A0
                                                                                                          • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 00BAC1B1
                                                                                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 00BAC1EB
                                                                                                            • Part of subcall function 00BABE0A: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00BABE20
                                                                                                            • Part of subcall function 00BABE0A: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00BABE5C
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00BAC1F4
                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,00BE7938,00000800), ref: 00BAC20F
                                                                                                          • SetEnvironmentVariableW.KERNEL32(sfxname,00BE7938), ref: 00BAC221
                                                                                                          • GetLocalTime.KERNEL32(?), ref: 00BAC228
                                                                                                          • _swprintf.LIBCMT ref: 00BAC267
                                                                                                          • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00BAC279
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00BAC27C
                                                                                                          • LoadIconW.USER32(00000000,00000064), ref: 00BAC293
                                                                                                          • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_00019B4F,00000000), ref: 00BAC2E4
                                                                                                          • Sleep.KERNEL32(?), ref: 00BAC312
                                                                                                          • DeleteObject.GDI32 ref: 00BAC351
                                                                                                          • DeleteObject.GDI32(?), ref: 00BAC35D
                                                                                                            • Part of subcall function 00BAA8D4: CharUpperW.USER32(?,?,?,?,00001000), ref: 00BAA92C
                                                                                                            • Part of subcall function 00BAA8D4: CharUpperW.USER32(?,?,?,?,?,00001000), ref: 00BAA953
                                                                                                          • CloseHandle.KERNEL32 ref: 00BAC39C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EnvironmentFileHandleVariable$Module$AddressCharCloseDeleteObjectProcUpperView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                                                                          • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                                          • API String ID: 985665271-3710569615
                                                                                                          • Opcode ID: d11bc6c1fd594cece215154da0ff90d9248ab9b15df0b74dfc0d4701b465901e
                                                                                                          • Instruction ID: a475e70a0e76459b764da73f27e55e90bcbeb1a3649df2a8b95177d4af5e51ad
                                                                                                          • Opcode Fuzzy Hash: d11bc6c1fd594cece215154da0ff90d9248ab9b15df0b74dfc0d4701b465901e
                                                                                                          • Instruction Fuzzy Hash: C1610A71909344AFD720ABA5EC45F2B7BECEB5A700F0444AAF545A32A2EF748D44C771

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 598 ba8bd0-ba8beb FindResourceW 599 ba8bf1-ba8c03 SizeofResource 598->599 600 ba8cc6-ba8cc8 598->600 601 ba8c23-ba8c25 599->601 602 ba8c05-ba8c14 LoadResource 599->602 604 ba8cc5 601->604 602->601 603 ba8c16-ba8c21 LockResource 602->603 603->601 605 ba8c2a-ba8c3f GlobalAlloc 603->605 604->600 606 ba8cbf-ba8cc4 605->606 607 ba8c41-ba8c4a GlobalLock 605->607 606->604 608 ba8cb8-ba8cb9 GlobalFree 607->608 609 ba8c4c-ba8c6a call bae000 CreateStreamOnHGlobal 607->609 608->606 612 ba8c6c-ba8c84 call ba8b65 609->612 613 ba8cb1-ba8cb2 GlobalUnlock 609->613 612->613 617 ba8c86-ba8c8e 612->617 613->608 618 ba8ca9-ba8cad 617->618 619 ba8c90-ba8ca4 GdipCreateHBITMAPFromBitmap 617->619 618->613 619->618 620 ba8ca6 619->620 620->618
                                                                                                          APIs
                                                                                                          • FindResourceW.KERNELBASE(00000066,PNG,?,?,00BA9AC8,00000066), ref: 00BA8BE1
                                                                                                          • SizeofResource.KERNEL32(00000000,75295780,?,?,00BA9AC8,00000066), ref: 00BA8BF9
                                                                                                          • LoadResource.KERNEL32(00000000,?,?,00BA9AC8,00000066), ref: 00BA8C0C
                                                                                                          • LockResource.KERNEL32(00000000,?,?,00BA9AC8,00000066), ref: 00BA8C17
                                                                                                          • GlobalAlloc.KERNELBASE(00000002,00000000,00000000,?,?,?,00BA9AC8,00000066), ref: 00BA8C35
                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 00BA8C42
                                                                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00BA8C62
                                                                                                          • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00BA8C9D
                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00BA8CB2
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 00BA8CB9
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$Resource$CreateLock$AllocBitmapFindFreeFromGdipLoadSizeofStreamUnlock
                                                                                                          • String ID: PNG
                                                                                                          • API String ID: 3656887471-364855578
                                                                                                          • Opcode ID: fb5531fd351fa17c78eaf147ed2c1119910ad3902aa1b1b90df8ce9db6ae8e17
                                                                                                          • Instruction ID: f7a2bbb6dec0cb6559d6b917478600f887dd8cddfaad6a50f02148bf483c2d16
                                                                                                          • Opcode Fuzzy Hash: fb5531fd351fa17c78eaf147ed2c1119910ad3902aa1b1b90df8ce9db6ae8e17
                                                                                                          • Instruction Fuzzy Hash: 72216171606606AFC721AF61DD49D2BBFE8EF8A7A1B040568F845D7660EF31DC008AA1

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 860 b9a273-b9a299 call bacec0 863 b9a29b-b9a2ae FindFirstFileW 860->863 864 b9a30d-b9a316 FindNextFileW 860->864 867 b9a334-b9a3dd call b9f10e call b9b902 call ba01c1 * 3 863->867 868 b9a2b4-b9a2cf call b9b275 863->868 865 b9a318-b9a326 GetLastError 864->865 866 b9a32c-b9a32e 864->866 865->866 866->867 869 b9a3e2-b9a3f5 866->869 867->869 875 b9a2d1-b9a2e4 FindFirstFileW 868->875 876 b9a2e6-b9a2ef GetLastError 868->876 875->867 875->876 877 b9a2f1-b9a2f4 876->877 878 b9a300 876->878 877->878 880 b9a2f6-b9a2f9 877->880 881 b9a302-b9a308 878->881 880->878 883 b9a2fb-b9a2fe 880->883 881->869 883->881
                                                                                                          APIs
                                                                                                          • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00B9A16E,000000FF,?,?), ref: 00B9A2A8
                                                                                                          • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00B9A16E,000000FF,?,?), ref: 00B9A2DE
                                                                                                          • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00B9A16E,000000FF,?,?), ref: 00B9A2E6
                                                                                                          • FindNextFileW.KERNEL32(?,?,?,?,?,?,00B9A16E,000000FF,?,?), ref: 00B9A30E
                                                                                                          • GetLastError.KERNEL32(?,?,?,?,00B9A16E,000000FF,?,?), ref: 00B9A31A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileFind$ErrorFirstLast$Next
                                                                                                          • String ID:
                                                                                                          • API String ID: 869497890-0
                                                                                                          • Opcode ID: 30ad08f7b4303861551ab965fba7f1df3f27ba4dd6692689d268f30d378d445d
                                                                                                          • Instruction ID: d857cad3e30650cc51158a64210f6a4b6aa3ddeb3ca951889097eba3d5001b5e
                                                                                                          • Opcode Fuzzy Hash: 30ad08f7b4303861551ab965fba7f1df3f27ba4dd6692689d268f30d378d445d
                                                                                                          • Instruction Fuzzy Hash: 3E416072608245AFC724EF74C880ADAF7E8FB49350F104A6AF5D9D3240D734A9548B96
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32(?,?,00BB4A30,?,00BC7F68,0000000C,00BB4B87,?,00000002,00000000), ref: 00BB4A7B
                                                                                                          • TerminateProcess.KERNEL32(00000000,?,00BB4A30,?,00BC7F68,0000000C,00BB4B87,?,00000002,00000000), ref: 00BB4A82
                                                                                                          • ExitProcess.KERNEL32 ref: 00BB4A94
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                                          • String ID:
                                                                                                          • API String ID: 1703294689-0
                                                                                                          • Opcode ID: 96335c2d4417251dbf49574aedfe79d3230b97a370bb0edca64c7fdbac3a7970
                                                                                                          • Instruction ID: 33b4f13f4817b4d11c12fea2fd26c9155d10e6e5862dfa6e6674ac3b390ee0b2
                                                                                                          • Opcode Fuzzy Hash: 96335c2d4417251dbf49574aedfe79d3230b97a370bb0edca64c7fdbac3a7970
                                                                                                          • Instruction Fuzzy Hash: 35E0B6310A0508EFCF11BF64DD09EA97BA9FB54341F050454F8499B522CF76DD92CB84
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B9840E
                                                                                                          • _memcmp.LIBVCRUNTIME ref: 00B98870
                                                                                                            • Part of subcall function 00B980F8: CharUpperW.USER32(?,?,00000000,?,?,?,?,?,?,?,00000800,?,00B986E9,?,-00000930,?), ref: 00B981BB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CharH_prologUpper_memcmp
                                                                                                          • String ID:
                                                                                                          • API String ID: 4047935103-0
                                                                                                          • Opcode ID: 723f7844c50d195983987ef9cda1c78c516fcc255bb8d02310414833ad5adfe7
                                                                                                          • Instruction ID: b6ffd25a52ae9c5da4716092e266f635930135b5a87d9ad1a3fec87af6d09e1f
                                                                                                          • Opcode Fuzzy Hash: 723f7844c50d195983987ef9cda1c78c516fcc255bb8d02310414833ad5adfe7
                                                                                                          • Instruction Fuzzy Hash: 48721971504185AEDF25DF64C885BF9BBE9EF16300F0841FAE8499F283DB359A88C760
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID:
                                                                                                          • API String ID: 3519838083-0
                                                                                                          • Opcode ID: ca9b7359e086c16e9f39103c9fc08582a225530d9853ab0c0bb14bcdfea22487
                                                                                                          • Instruction ID: e35f7ed15c8b04a662c5437d94645383163e93368a1fb77a39dbcf8a6801ba21
                                                                                                          • Opcode Fuzzy Hash: ca9b7359e086c16e9f39103c9fc08582a225530d9853ab0c0bb14bcdfea22487
                                                                                                          • Instruction Fuzzy Hash: 02D129B160C7458FCB24CF28C885B5BBBE1FF56304F0805ADE8849B642D734EA55CBA6
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00BA9B54
                                                                                                            • Part of subcall function 00B912E7: GetDlgItem.USER32(00000000,00003021), ref: 00B9132B
                                                                                                            • Part of subcall function 00B912E7: SetWindowTextW.USER32(00000000,00BC02E4), ref: 00B91341
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prologItemTextWindow
                                                                                                          • String ID: "%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                                                          • API String ID: 810644672-2803697902
                                                                                                          • Opcode ID: 5a5adaabf5df9d4b94b7c396aec5e7b0cc0108eb68debab90de91b1728f9cc5a
                                                                                                          • Instruction ID: 5cd82c2d944483d32d7990f2aab0fc3c27dd05c200a366f1823e8c73bdea02e7
                                                                                                          • Opcode Fuzzy Hash: 5a5adaabf5df9d4b94b7c396aec5e7b0cc0108eb68debab90de91b1728f9cc5a
                                                                                                          • Instruction Fuzzy Hash: 2942D471949259BFEB21AB60DC8AFAA7BECEB16704F0000E5F601B71D2DB744D44DB62

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 257 b9f353-b9f375 call bacec0 GetModuleHandleW 260 b9f3c8-b9f62f 257->260 261 b9f377-b9f38e GetProcAddress 257->261 262 b9f6fd-b9f72e GetModuleFileNameW call b9b88c call b9f10e 260->262 263 b9f635-b9f640 call bb462a 260->263 264 b9f3a0-b9f3aa GetProcAddress 261->264 265 b9f390-b9f39d 261->265 277 b9f730-b9f73a call b9a8e0 262->277 263->262 273 b9f646-b9f673 GetModuleFileNameW CreateFileW 263->273 264->260 266 b9f3ac-b9f3c3 264->266 265->264 266->260 275 b9f6f1-b9f6f8 CloseHandle 273->275 276 b9f675-b9f683 SetFilePointer 273->276 275->262 276->275 278 b9f685-b9f6a2 ReadFile 276->278 284 b9f73c-b9f740 call b9f309 277->284 285 b9f747 277->285 278->275 280 b9f6a4-b9f6c9 278->280 282 b9f6e6-b9f6ef call b9ef07 280->282 282->275 291 b9f6cb-b9f6e5 call b9f309 282->291 292 b9f745 284->292 286 b9f749-b9f74b 285->286 289 b9f76d-b9f78f call b9b902 GetFileAttributesW 286->289 290 b9f74d-b9f76b CompareStringW 286->290 293 b9f791-b9f795 289->293 299 b9f799 289->299 290->289 290->293 291->282 292->286 293->277 297 b9f797 293->297 300 b9f79d-b9f7a2 297->300 299->300 301 b9f7a4 300->301 302 b9f7d6-b9f7d8 300->302 305 b9f7a6-b9f7c8 call b9b902 GetFileAttributesW 301->305 303 b9f7de-b9f7f5 call b9b8d6 call b9a8e0 302->303 304 b9f8e5-b9f8ef 302->304 315 b9f85d-b9f890 call b93f5b AllocConsole 303->315 316 b9f7f7-b9f858 call b9f309 * 2 call b9d142 call b93f5b call b9d142 call ba8ccb 303->316 311 b9f7ca-b9f7ce 305->311 312 b9f7d2 305->312 311->305 314 b9f7d0 311->314 312->302 314->302 321 b9f8dd-b9f8df ExitProcess 315->321 322 b9f892-b9f8d7 GetCurrentProcessId AttachConsole call bb20b3 GetStdHandle WriteConsoleW Sleep FreeConsole 315->322 316->321 322->321
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32 ref: 00B9F36B
                                                                                                          • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00B9F383
                                                                                                          • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00B9F3A6
                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00B9F651
                                                                                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B9F669
                                                                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B9F67B
                                                                                                          • ReadFile.KERNEL32(00000000,?,00007FFE,00BC0858,00000000), ref: 00B9F69A
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00B9F6F2
                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00B9F708
                                                                                                          • CompareStringW.KERNEL32(00000400,00001001,00BC08A4,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 00B9F762
                                                                                                          • GetFileAttributesW.KERNELBASE(?,?,00BC0870,00000800,?,00000000,?,00000800), ref: 00B9F78B
                                                                                                          • GetFileAttributesW.KERNEL32(?,?,00BC0930,00000800), ref: 00B9F7C4
                                                                                                            • Part of subcall function 00B9F309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B9F324
                                                                                                            • Part of subcall function 00B9F309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00B9DEC8,Crypt32.dll,?,00B9DF4A,?,00B9DF2E,?,?,?,?), ref: 00B9F346
                                                                                                          • _swprintf.LIBCMT ref: 00B9F834
                                                                                                          • _swprintf.LIBCMT ref: 00B9F880
                                                                                                            • Part of subcall function 00B93F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B93F6E
                                                                                                          • AllocConsole.KERNEL32 ref: 00B9F888
                                                                                                          • GetCurrentProcessId.KERNEL32 ref: 00B9F892
                                                                                                          • AttachConsole.KERNEL32(00000000), ref: 00B9F899
                                                                                                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00B9F8BF
                                                                                                          • WriteConsoleW.KERNEL32(00000000), ref: 00B9F8C6
                                                                                                          • Sleep.KERNEL32(00002710), ref: 00B9F8D1
                                                                                                          • FreeConsole.KERNEL32 ref: 00B9F8D7
                                                                                                          • ExitProcess.KERNEL32 ref: 00B9F8DF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                                                                                                          • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                                                                          • API String ID: 1201351596-3298887752
                                                                                                          • Opcode ID: 27f3d7528ae90e55f5ec7ef4861d27452bb68aa5bcf0616e1d2b1b26ab4f9260
                                                                                                          • Instruction ID: a3744f219e07c6e9f4e8835c250541b6fcaca4b36bf043a61211de6dd59e323f
                                                                                                          • Opcode Fuzzy Hash: 27f3d7528ae90e55f5ec7ef4861d27452bb68aa5bcf0616e1d2b1b26ab4f9260
                                                                                                          • Instruction Fuzzy Hash: F0D170B2128385DBD730FF508849FAFBAE8EB84314F5049ADF58996150CBB49548CB66

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 404 baaa45-baaa5d call bacdf0 call bacec0 409 baaa63-baaa8d call ba96ec 404->409 410 bab645-bab652 404->410 409->410 413 baaa93-baaa98 409->413 414 baaa99-baaaa7 413->414 415 baaaa8-baaab8 call ba93ba 414->415 418 baaaba 415->418 419 baaabc-baaad1 call ba0b12 418->419 422 baaade-baaae1 419->422 423 baaad3-baaad7 419->423 425 bab611-bab63c call ba96ec 422->425 426 baaae7 422->426 423->419 424 baaad9 423->424 424->425 425->414 437 bab642-bab644 425->437 428 baad9b-baad9d 426->428 429 baaaee-baaaf1 426->429 430 baad7e-baad80 426->430 431 baacdd-baacdf 426->431 428->425 435 baada3-baadaa 428->435 429->425 434 baaaf7-baab64 call ba8b8e call b9b56e call b9a11c call b9a256 call b96fa3 call b9a1a9 429->434 430->425 433 baad86-baad96 SetWindowTextW 430->433 431->425 436 baace5-baacf1 431->436 433->425 503 baab6a-baab70 434->503 504 baacc9-baacd8 call b9a132 434->504 435->425 439 baadb0-baadc9 435->439 440 baacf3-baad04 call bb4654 436->440 441 baad05-baad0a 436->441 437->410 443 baadcb 439->443 444 baadd1-baaddf call bb20b3 439->444 440->441 446 baad0c-baad12 441->446 447 baad14-baad1f call ba9844 441->447 443->444 444->425 461 baade5-baadee 444->461 451 baad24-baad26 446->451 447->451 454 baad28-baad2f call bb20b3 451->454 455 baad31-baad51 call bb20b3 call bb20de 451->455 454->455 479 baad6a-baad6c 455->479 480 baad53-baad5a 455->480 465 baadf0-baadf4 461->465 466 baae17-baae1a 461->466 465->466 471 baadf6-baadfe 465->471 467 baaeff-baaf0d call b9f10e 466->467 468 baae20-baae23 466->468 484 baaf0f-baaf23 call bb031b 467->484 472 baae30-baae4b 468->472 473 baae25-baae2a 468->473 471->425 477 baae04-baae12 call b9f10e 471->477 493 baae4d-baae87 472->493 494 baae95-baae9c 472->494 473->467 473->472 477->484 479->425 483 baad72-baad79 call bb20ce 479->483 487 baad5c-baad5e 480->487 488 baad61-baad69 call bb4654 480->488 483->425 505 baaf30-baaf83 call b9f10e call ba9592 GetDlgItem SetWindowTextW SendMessageW call bb20e9 484->505 506 baaf25-baaf29 484->506 487->488 488->479 528 baae8b-baae8d 493->528 529 baae89 493->529 496 baaeca-baaeed call bb20b3 * 2 494->496 497 baae9e-baaeb6 call bb20b3 494->497 496->484 534 baaeef-baaefd call b9f0e6 496->534 497->496 515 baaeb8-baaec5 call b9f0e6 497->515 510 baab77-baab8c SetFileAttributesW 503->510 504->425 542 baaf88-baaf8c 505->542 506->505 511 baaf2b-baaf2d 506->511 516 baac32-baac3e GetFileAttributesW 510->516 517 baab92-baabc5 call b9b100 call b9adf5 call bb20b3 510->517 511->505 515->496 525 baacae-baacc3 call b9a1a9 516->525 526 baac40-baac4f DeleteFileW 516->526 552 baabd8-baabe6 call b9b52e 517->552 553 baabc7-baabd6 call bb20b3 517->553 525->504 540 baab72 525->540 526->525 533 baac51-baac54 526->533 528->494 529->528 538 baac58-baac84 call b93f5b GetFileAttributesW 533->538 534->484 549 baac56-baac57 538->549 550 baac86-baac9c MoveFileW 538->550 540->510 542->425 546 baaf92-baafa4 SendMessageW 542->546 546->425 549->538 550->525 551 baac9e-baaca8 MoveFileExW 550->551 551->525 552->504 558 baabec-baac2b call bb20b3 call badea0 552->558 553->552 553->558 558->516
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00BAAA4A
                                                                                                            • Part of subcall function 00BA96EC: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00BA97B4
                                                                                                          • SetFileAttributesW.KERNEL32(?,00000005,?,?,?,00000800,?,?,00000000,00000001,00BAA35D,?,00000000), ref: 00BAAB7F
                                                                                                          • GetFileAttributesW.KERNEL32(?), ref: 00BAAC39
                                                                                                          • DeleteFileW.KERNEL32(?), ref: 00BAAC47
                                                                                                          • SetWindowTextW.USER32(?,?), ref: 00BAAD90
                                                                                                          • _wcsrchr.LIBVCRUNTIME ref: 00BAAF1A
                                                                                                          • GetDlgItem.USER32(?,00000066), ref: 00BAAF55
                                                                                                          • SetWindowTextW.USER32(00000000,?), ref: 00BAAF65
                                                                                                          • SendMessageW.USER32(00000000,00000143,00000000,00BD412A), ref: 00BAAF79
                                                                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00BAAFA2
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$AttributesMessageSendTextWindow$DeleteEnvironmentExpandH_prologItemStrings_wcsrchr
                                                                                                          • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                                                          • API String ID: 3676479488-312220925
                                                                                                          • Opcode ID: fd55dc664ffede66c7253e31bee8bf91220c332037bfda55a084a7d4f08cced0
                                                                                                          • Instruction ID: 47e2a5c678bc924e70eb42eb51cd06852eea6e560d68b3fbf0b38e5be0a9a4e2
                                                                                                          • Opcode Fuzzy Hash: fd55dc664ffede66c7253e31bee8bf91220c332037bfda55a084a7d4f08cced0
                                                                                                          • Instruction Fuzzy Hash: 8DE15D72904219AAEF24ABA4DD85EEEB3FCEB06350F1040E6F555E3051EF709B84CB61

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 563 b9ced7-b9cf51 call b9c88e GetWindowRect GetClientRect 566 b9cff2-b9cffa 563->566 567 b9cf57-b9cf5f 563->567 569 b9d034-b9d04f GetSystemMetrics GetWindow 566->569 570 b9cffc-b9d02e GetWindowTextW call b9c91f SetWindowTextW 566->570 568 b9cf65-b9cfae 567->568 567->569 571 b9cfb0 568->571 572 b9cfb2-b9cfb4 568->572 574 b9d12d-b9d12f 569->574 570->569 571->572 575 b9cfb8-b9cfee GetWindowLongW GetWindowRect 572->575 576 b9cfb6 572->576 577 b9d135-b9d13f 574->577 578 b9d054-b9d05a 574->578 575->566 576->575 578->577 580 b9d060-b9d078 GetWindowTextW 578->580 582 b9d07a-b9d099 call b9c91f SetWindowTextW 580->582 583 b9d09f-b9d0a4 580->583 582->583 584 b9d11b-b9d12a GetWindow 583->584 585 b9d0a6-b9d114 GetWindowRect 583->585 584->577 588 b9d12c 584->588 585->584 588->574
                                                                                                          APIs
                                                                                                            • Part of subcall function 00B9C88E: _wcschr.LIBVCRUNTIME ref: 00B9C8BD
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00B9CF0E
                                                                                                          • GetClientRect.USER32(?,?), ref: 00B9CF1A
                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00B9CFBB
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00B9CFE8
                                                                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00B9D007
                                                                                                          • SetWindowTextW.USER32(?,?), ref: 00B9D02E
                                                                                                          • GetSystemMetrics.USER32(00000008), ref: 00B9D036
                                                                                                          • GetWindow.USER32(?,00000005), ref: 00B9D041
                                                                                                          • GetWindowTextW.USER32(00000000,?,00000400), ref: 00B9D06C
                                                                                                          • SetWindowTextW.USER32(00000000,00000000), ref: 00B9D099
                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 00B9D0AC
                                                                                                          • GetWindow.USER32(00000000,00000002), ref: 00B9D11E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$RectText$ClientLongMetricsSystem_wcschr
                                                                                                          • String ID: d
                                                                                                          • API String ID: 4134264131-2564639436
                                                                                                          • Opcode ID: 0292c9ed1b6b6e4c1dcc0591ed713320167ceb6ab0b52bf32a4c27b3935ac66e
                                                                                                          • Instruction ID: 53342b29ce93fea9192172aa622e7983d686bbc9e71dd11167db1bcdcb69f828
                                                                                                          • Opcode Fuzzy Hash: 0292c9ed1b6b6e4c1dcc0591ed713320167ceb6ab0b52bf32a4c27b3935ac66e
                                                                                                          • Instruction Fuzzy Hash: 0E615E72208344AFD711DF69CD89E6BBBEAFBC9714F04452DF68493290CA74ED058B52

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(00000068,00BE8958), ref: 00BAB71D
                                                                                                          • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,?,?,?,00BA9325), ref: 00BAB748
                                                                                                          • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00BAB757
                                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,00BC02E4), ref: 00BAB761
                                                                                                          • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00BAB777
                                                                                                          • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00BAB78D
                                                                                                          • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00BAB7CD
                                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00BAB7D7
                                                                                                          • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00BAB7E6
                                                                                                          • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00BAB809
                                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,00BC1368), ref: 00BAB814
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$ItemShowWindow
                                                                                                          • String ID: \
                                                                                                          • API String ID: 1207805008-2967466578
                                                                                                          • Opcode ID: 6dc012d5dde65f4bce231d56efdbbd5beefa26a8d59e3c3b26354e17b74fa2ca
                                                                                                          • Instruction ID: a5bdff9df9225e7f1c15302e326a223d8bdffd095d532a97e132aca20210a409
                                                                                                          • Opcode Fuzzy Hash: 6dc012d5dde65f4bce231d56efdbbd5beefa26a8d59e3c3b26354e17b74fa2ca
                                                                                                          • Instruction Fuzzy Hash: 2B2128712867447BE311EB249C41FABBFDCEF92714F000519FA60A71D1DBA55D048AA7

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 621 bab9aa-bab9c2 call bacec0 624 bab9c8-bab9d4 call bb20b3 621->624 625 babc0e-babc16 621->625 624->625 628 bab9da-baba02 call badea0 624->628 631 baba0c-baba19 628->631 632 baba04 628->632 633 baba1b 631->633 634 baba1d-baba26 631->634 632->631 633->634 635 baba28-baba2a 634->635 636 baba5e 634->636 638 baba32-baba35 635->638 637 baba62-baba64 636->637 639 baba6b-baba6d 637->639 640 baba66-baba69 637->640 641 baba3b-baba43 638->641 642 babbc2-babbc7 638->642 645 baba80-baba92 call b9b09c 639->645 646 baba6f-baba76 639->646 640->639 640->645 647 babbdb-babbe3 641->647 648 baba49-baba4f 641->648 643 babbc9 642->643 644 babbbc-babbc0 642->644 649 babbce-babbd2 643->649 644->642 644->649 656 babaab-babab6 call b99dff 645->656 657 baba94-babaa1 call ba0b12 645->657 646->645 651 baba78 646->651 652 babbeb-babbf3 647->652 653 babbe5-babbe7 647->653 648->647 650 baba55-baba5c 648->650 649->647 650->636 650->638 651->645 652->637 653->652 662 babab8-babacf call b9ae20 656->662 663 babad3-babae0 ShellExecuteExW 656->663 657->656 664 babaa3 657->664 662->663 666 babc0c-babc0d 663->666 667 babae6-babaf9 663->667 664->656 666->625 669 babafb-babb02 667->669 670 babb0c-babb0e 667->670 669->670 671 babb04-babb0a 669->671 672 babb10-babb19 670->672 673 babb21-babb40 call babe69 670->673 671->670 674 babb77-babb83 CloseHandle 671->674 672->673 683 babb1b-babb1f ShowWindow 672->683 673->674 688 babb42-babb4a 673->688 675 babb94-babba2 674->675 676 babb85-babb92 call ba0b12 674->676 681 babbff-babc01 675->681 682 babba4-babba6 675->682 676->675 689 babbf8 676->689 681->666 686 babc03-babc05 681->686 682->681 687 babba8-babbae 682->687 683->673 686->666 690 babc07-babc0a ShowWindow 686->690 687->681 691 babbb0-babbba 687->691 688->674 692 babb4c-babb5d GetExitCodeProcess 688->692 689->681 690->666 691->681 692->674 693 babb5f-babb69 692->693 694 babb6b 693->694 695 babb70 693->695 694->695 695->674
                                                                                                          APIs
                                                                                                          • ShellExecuteExW.SHELL32(000001C0), ref: 00BABAD8
                                                                                                          • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,?), ref: 00BABB1D
                                                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00BABB55
                                                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00BABB7B
                                                                                                          • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?), ref: 00BABC0A
                                                                                                            • Part of subcall function 00BA0B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00B9AC49,?,?,?,00B9ABF8,?,-00000002,?,00000000,?), ref: 00BA0B28
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
                                                                                                          • String ID: $.exe$.inf
                                                                                                          • API String ID: 3686203788-2452507128
                                                                                                          • Opcode ID: 6eccb5c86a945ead18225da1bc7a0d2d37d82d71983d2281b82a12eb4d539eb3
                                                                                                          • Instruction ID: d23bde081052fc3976c0265f7b6b14787fa3fd050ae2453aa3abde0974b22a3d
                                                                                                          • Opcode Fuzzy Hash: 6eccb5c86a945ead18225da1bc7a0d2d37d82d71983d2281b82a12eb4d539eb3
                                                                                                          • Instruction Fuzzy Hash: 0051E37150D3809ADB31AF20C980EBBB7E9EF86704F44089DE4E597157EBB18948CB62

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 696 b9cacc-b9cb00 call bacdf0 call bacec0 call bb0138 703 b9cb33-b9cb3c call b9f10e 696->703 704 b9cb02-b9cb31 GetModuleFileNameW call b9b88c call b9f0e6 696->704 707 b9cb41-b9cb65 call b99401 call b9973d 703->707 704->707 715 b9cdb8-b9cdd3 call b99437 707->715 716 b9cb6b-b9cb74 707->716 718 b9cb77-b9cb7a 716->718 720 b9cca8-b9ccc8 call b999e0 call bb20d3 718->720 721 b9cb80-b9cb86 call b99aeb 718->721 720->715 732 b9ccce-b9cce7 call b9990d 720->732 725 b9cb8b-b9cbb2 call b9990d 721->725 730 b9cbb8-b9cbc0 725->730 731 b9cc71-b9cc74 725->731 734 b9cbeb-b9cbf6 730->734 735 b9cbc2-b9cbca 730->735 736 b9cc77-b9cc99 call b999e0 731->736 742 b9cce9-b9ccee 732->742 743 b9ccf0-b9cd02 call bb20d3 732->743 739 b9cbf8-b9cc04 734->739 740 b9cc21-b9cc29 734->740 735->734 738 b9cbcc-b9cbe6 call bb3660 735->738 736->718 754 b9cc9f-b9cca2 736->754 757 b9cbe8 738->757 758 b9cc67-b9cc6f 738->758 739->740 745 b9cc06-b9cc0b 739->745 747 b9cc2b-b9cc33 740->747 748 b9cc55-b9cc59 740->748 750 b9cd27-b9cd2f 742->750 743->715 764 b9cd08-b9cd25 call ba06e9 call bb20ce 743->764 745->740 753 b9cc0d-b9cc1f call bb3589 745->753 747->748 755 b9cc35-b9cc4f call bb3660 747->755 748->731 749 b9cc5b-b9cc5e 748->749 749->730 760 b9cd31 750->760 761 b9cd34-b9cd41 750->761 753->740 769 b9cc63 753->769 754->715 754->720 755->715 755->748 757->734 758->736 760->761 766 b9cdad-b9cdb5 761->766 767 b9cd43-b9cd45 761->767 764->750 766->715 770 b9cd46-b9cd50 767->770 769->758 770->766 771 b9cd52-b9cd56 770->771 773 b9cd58-b9cd5f 771->773 774 b9cd90-b9cd93 771->774 776 b9cd61-b9cd64 773->776 777 b9cd86 773->777 779 b9cd9d-b9cd9f 774->779 780 b9cd95-b9cd9b 774->780 781 b9cd82-b9cd84 776->781 782 b9cd66-b9cd69 776->782 783 b9cd88-b9cd8e 777->783 784 b9cda0 779->784 780->779 780->784 781->783 786 b9cd6b-b9cd6e 782->786 787 b9cd7e-b9cd80 782->787 785 b9cda4-b9cdab 783->785 784->785 785->766 785->770 788 b9cd7a-b9cd7c 786->788 789 b9cd70-b9cd74 786->789 787->783 788->783 789->784 790 b9cd76-b9cd78 789->790 790->783
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B9CAD1
                                                                                                          • _wcschr.LIBVCRUNTIME ref: 00B9CAEF
                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00B9CAB3,?), ref: 00B9CB0A
                                                                                                            • Part of subcall function 00BA06E9: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00B9B25B,00000000,?,?,?,?), ref: 00BA0705
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharFileH_prologModuleMultiNameWide_wcschr
                                                                                                          • String ID: *messages***$*messages***$R$a
                                                                                                          • API String ID: 803915177-2900423073
                                                                                                          • Opcode ID: a400f463a845af09b76f177c51459cb9a106f54f03499ba8069c549bfce7190f
                                                                                                          • Instruction ID: a86fce0a078d788e2f03faa0d9d56883b2b938ce41a29c497a1347d09ad425ce
                                                                                                          • Opcode Fuzzy Hash: a400f463a845af09b76f177c51459cb9a106f54f03499ba8069c549bfce7190f
                                                                                                          • Instruction Fuzzy Hash: 7E91F3B1A002099BDF20EF68CC85BEA7FF4EF55710F1045FAE649A7291DA709A84CB54

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 791 bb73ae-bb73c7 792 bb73c9-bb73d9 call bbb9bc 791->792 793 bb73dd-bb73e2 791->793 792->793 803 bb73db 792->803 794 bb73ef-bb7413 MultiByteToWideChar 793->794 795 bb73e4-bb73ec 793->795 797 bb7419-bb7425 794->797 798 bb75a6-bb75b9 call bad783 794->798 795->794 800 bb7479 797->800 801 bb7427-bb7438 797->801 807 bb747b-bb747d 800->807 804 bb743a-bb7449 call bbf160 801->804 805 bb7457-bb7468 call bb59fc 801->805 803->793 808 bb759b 804->808 818 bb744f-bb7455 804->818 805->808 819 bb746e 805->819 807->808 809 bb7483-bb7496 MultiByteToWideChar 807->809 813 bb759d-bb75a4 call bb7616 808->813 809->808 812 bb749c-bb74ae call bb7a09 809->812 820 bb74b3-bb74b7 812->820 813->798 822 bb7474-bb7477 818->822 819->822 820->808 823 bb74bd-bb74c4 820->823 822->807 824 bb74fe-bb750a 823->824 825 bb74c6-bb74cb 823->825 827 bb750c-bb751d 824->827 828 bb7556 824->828 825->813 826 bb74d1-bb74d3 825->826 826->808 829 bb74d9-bb74f3 call bb7a09 826->829 831 bb7538-bb7549 call bb59fc 827->831 832 bb751f-bb752e call bbf160 827->832 830 bb7558-bb755a 828->830 829->813 846 bb74f9 829->846 835 bb755c-bb7575 call bb7a09 830->835 836 bb7594-bb759a call bb7616 830->836 831->836 845 bb754b 831->845 832->836 844 bb7530-bb7536 832->844 835->836 849 bb7577-bb757e 835->849 836->808 848 bb7551-bb7554 844->848 845->848 846->808 848->830 850 bb75ba-bb75c0 849->850 851 bb7580-bb7581 849->851 852 bb7582-bb7592 WideCharToMultiByte 850->852 851->852 852->836 853 bb75c2-bb75c9 call bb7616 852->853 853->813
                                                                                                          APIs
                                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00BB2FC2,00BB2FC2,?,?,?,00BB75FF,00000001,00000001,F5E85006), ref: 00BB7408
                                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00BB75FF,00000001,00000001,F5E85006,?,?,?), ref: 00BB748E
                                                                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,F5E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00BB7588
                                                                                                          • __freea.LIBCMT ref: 00BB7595
                                                                                                            • Part of subcall function 00BB59FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,00BB23AA,?,0000015D,?,?,?,?,00BB2F29,000000FF,00000000,?,?), ref: 00BB5A2E
                                                                                                          • __freea.LIBCMT ref: 00BB759E
                                                                                                          • __freea.LIBCMT ref: 00BB75C3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 1414292761-0
                                                                                                          • Opcode ID: c834bf7c6595039bae0afffc73170e97c487e87340b9a02b44ec1938866aec38
                                                                                                          • Instruction ID: 57d19238a07e856591fc536353a686038d6a6e379fc2fbb04c9e256fa5c64432
                                                                                                          • Opcode Fuzzy Hash: c834bf7c6595039bae0afffc73170e97c487e87340b9a02b44ec1938866aec38
                                                                                                          • Instruction Fuzzy Hash: C051DE72654216ABEB358E68CC81EFF7BE9EB94710F1546A8FC05D6140EFB4DC4086A0

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 00B9F309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B9F324
                                                                                                            • Part of subcall function 00B9F309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00B9DEC8,Crypt32.dll,?,00B9DF4A,?,00B9DF2E,?,?,?,?), ref: 00B9F346
                                                                                                          • OleInitialize.OLE32(00000000), ref: 00BA904F
                                                                                                          • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00BA9086
                                                                                                          • SHGetMalloc.SHELL32(00BD20E8), ref: 00BA9090
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                                                          • String ID: riched20.dll$3Ro
                                                                                                          • API String ID: 3498096277-3613677438
                                                                                                          • Opcode ID: 2f5056862b3515150ccba47d38bace793c4366df940c2401025477bc045c766d
                                                                                                          • Instruction ID: 46ae2ec435b66d13d250793ef13df14d53654193a804554d74ae06f4b01f90d3
                                                                                                          • Opcode Fuzzy Hash: 2f5056862b3515150ccba47d38bace793c4366df940c2401025477bc045c766d
                                                                                                          • Instruction Fuzzy Hash: 07F04FB1C0010DABCB10AF9AD8499EEFFFCEF85705F0040AAE814E3211DBB40605CBA1

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 00B9FDC9: ResetEvent.KERNEL32(?,?,00B9F9F3,0109EBA0,?,00BD1E74,00000000,00BBF79B,000000FF,000001B8,00B9FC8F,?,?,?,?,00B9A5A0), ref: 00B9FDE9
                                                                                                            • Part of subcall function 00B9FDC9: ReleaseSemaphore.KERNEL32(?,?,00000000,?,?,?,?,00B9A5A0,?,?,?,?,00BBF79B,000000FF), ref: 00B9FDFD
                                                                                                          • ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 00B9FA05
                                                                                                          • CloseHandle.KERNEL32(?,?), ref: 00B9FA1F
                                                                                                          • DeleteCriticalSection.KERNEL32(?), ref: 00B9FA38
                                                                                                          • CloseHandle.KERNELBASE(?), ref: 00B9FA44
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00B9FA50
                                                                                                            • Part of subcall function 00B9FAC7: WaitForSingleObject.KERNEL32(?,000000FF,00B9FD0B,?,?,00B9FD80,?,?,?,?,?,00B9FD6A), ref: 00B9FACD
                                                                                                            • Part of subcall function 00B9FAC7: GetLastError.KERNEL32(?,?,00B9FD80,?,?,?,?,?,00B9FD6A), ref: 00B9FAD9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                                          • String ID:
                                                                                                          • API String ID: 1868215902-0
                                                                                                          • Opcode ID: 75d90aaa40da3deca435cbf5c2d1fe4fc79048a4aa89e58ab6f28a2f6aa42e52
                                                                                                          • Instruction ID: 3f4e51afa9ec9d77887eacc95555a6ac6928444946d3547a55f5ba876884d084
                                                                                                          • Opcode Fuzzy Hash: 75d90aaa40da3deca435cbf5c2d1fe4fc79048a4aa89e58ab6f28a2f6aa42e52
                                                                                                          • Instruction Fuzzy Hash: BB019E32000748EFCB21AB28DD84F96BBFAFB49710F014579F2AED2560CB712800CB21

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 896 ba8fc8-ba8fe7 GetClassNameW 897 ba8fe9-ba8ffe call ba0b12 896->897 898 ba900f-ba9011 896->898 903 ba900e 897->903 904 ba9000-ba900c FindWindowExW 897->904 899 ba901c-ba9020 898->899 900 ba9013-ba9016 SHAutoComplete 898->900 900->899 903->898 904->903
                                                                                                          APIs
                                                                                                          • GetClassNameW.USER32(?,?,00000050), ref: 00BA8FDF
                                                                                                          • SHAutoComplete.SHLWAPI(?,00000010), ref: 00BA9016
                                                                                                            • Part of subcall function 00BA0B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00B9AC49,?,?,?,00B9ABF8,?,-00000002,?,00000000,?), ref: 00BA0B28
                                                                                                          • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00BA9006
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                                          • String ID: EDIT
                                                                                                          • API String ID: 4243998846-3080729518
                                                                                                          • Opcode ID: 1ef79425773caf9777908df930dc7dba60387606ab82f89ac716b1ef6f468fdf
                                                                                                          • Instruction ID: 30675e181d7701fd6bf248ff3c945eaf4f8e156c41629ae9f915ae0c2b353576
                                                                                                          • Opcode Fuzzy Hash: 1ef79425773caf9777908df930dc7dba60387606ab82f89ac716b1ef6f468fdf
                                                                                                          • Instruction Fuzzy Hash: 2DF0E93260422C77E73056255C05F9B76ACDB4BB50F040095BD00F3181DB609901D6F6

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 905 babe0a-babe35 call bacec0 SetEnvironmentVariableW call b9ef07 909 babe3a-babe3e 905->909 910 babe62-babe66 909->910 911 babe40-babe44 909->911 912 babe4d-babe54 call b9effe 911->912 915 babe46-babe4c 912->915 916 babe56-babe5c SetEnvironmentVariableW 912->916 915->912 916->910
                                                                                                          APIs
                                                                                                          • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00BABE20
                                                                                                          • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00BABE5C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EnvironmentVariable
                                                                                                          • String ID: sfxcmd$sfxpar
                                                                                                          • API String ID: 1431749950-3493335439
                                                                                                          • Opcode ID: 398c3e502e5102ea3eb9882e89f847b2d07c780243b291ca7af6eb739a07d909
                                                                                                          • Instruction ID: 45958bdbf5f7e581389dd7c24daa79e509f85f6b841c9bd977d1a2e2b1b35153
                                                                                                          • Opcode Fuzzy Hash: 398c3e502e5102ea3eb9882e89f847b2d07c780243b291ca7af6eb739a07d909
                                                                                                          • Instruction Fuzzy Hash: A1F0A772815224E6DB256F948C49FF67BD8DF0AB51B0404D6FD84A6153DB659C40C6E0

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 917 b9973d-b9975e call bacec0 920 b99760-b99765 917->920 921 b99767 917->921 920->921 922 b99769-b99786 920->922 921->922 923 b99788 922->923 924 b9978e-b99798 922->924 923->924 925 b9979a 924->925 926 b9979d-b997c8 CreateFileW 924->926 925->926 927 b997ca-b997ec GetLastError call b9b275 926->927 928 b9982c-b99841 926->928 934 b9981b-b99820 927->934 935 b997ee-b99810 CreateFileW GetLastError 927->935 929 b9985b-b99866 928->929 930 b99843-b99856 call b9f10e 928->930 930->929 934->928 938 b99822 934->938 936 b99812 935->936 937 b99816-b99819 935->937 936->937 937->928 937->934 938->928
                                                                                                          APIs
                                                                                                          • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,-00000001,00000000,?,00000000,?,?,00B9777A,?,00000005,?,00000011), ref: 00B997BD
                                                                                                          • GetLastError.KERNEL32(?,?,00B9777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00B997CA
                                                                                                          • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,00B9777A,?,00000005,?), ref: 00B997FF
                                                                                                          • GetLastError.KERNEL32(?,?,00B9777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00B99807
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateErrorFileLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 1214770103-0
                                                                                                          • Opcode ID: eef83b07f744602efd7949ee32365de34d04cfd22d7b5a830f54a653f4cbfb01
                                                                                                          • Instruction ID: 404b6531a64cd4382f9a1da38582275a427241d8f09d7098e69984fa0c664fb1
                                                                                                          • Opcode Fuzzy Hash: eef83b07f744602efd7949ee32365de34d04cfd22d7b5a830f54a653f4cbfb01
                                                                                                          • Instruction Fuzzy Hash: 01315470840355AFEB209F688C49BEABBE8FB49364F00467DF990832D1D7759888CBD0
                                                                                                          APIs
                                                                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00B99623
                                                                                                          • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00B9963B
                                                                                                          • GetLastError.KERNEL32 ref: 00B9966D
                                                                                                          • GetLastError.KERNEL32 ref: 00B9968C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$FileHandleRead
                                                                                                          • String ID:
                                                                                                          • API String ID: 2244327787-0
                                                                                                          • Opcode ID: 7d8a3352bda2ee90ab6e87cbd91199fc96bc75c8d4868c1ac36f22693bfd24c6
                                                                                                          • Instruction ID: ebcd0c7b2106bb63d3caf97c14a3b45594964ddbe294817b7d4118ba00cc09cc
                                                                                                          • Opcode Fuzzy Hash: 7d8a3352bda2ee90ab6e87cbd91199fc96bc75c8d4868c1ac36f22693bfd24c6
                                                                                                          • Instruction Fuzzy Hash: EA117934510208EBCFB0AF69C944A6A77EDEB09321F10C5BEF96AC6290CB368D40CF51
                                                                                                          APIs
                                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00BB2213,00000000,00000000,?,00BB7778,00BB2213,00000000,00000000,00000000,?,00BB7975,00000006,FlsSetValue), ref: 00BB7803
                                                                                                          • GetLastError.KERNEL32(?,00BB7778,00BB2213,00000000,00000000,00000000,?,00BB7975,00000006,FlsSetValue,00BC3768,00BC3770,00000000,00000364,?,00BB63F1), ref: 00BB780F
                                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00BB7778,00BB2213,00000000,00000000,00000000,?,00BB7975,00000006,FlsSetValue,00BC3768,00BC3770,00000000), ref: 00BB781D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 3177248105-0
                                                                                                          • Opcode ID: b4558e2c5d3e6238b2293f60be55eb5772e28bb81c974bd9555446e4bb7b925e
                                                                                                          • Instruction ID: fc2d96b5d3debf3afc51bbb436b4346736d462a0f6f88eddb945c0d96dec8b18
                                                                                                          • Opcode Fuzzy Hash: b4558e2c5d3e6238b2293f60be55eb5772e28bb81c974bd9555446e4bb7b925e
                                                                                                          • Instruction Fuzzy Hash: 7A01FC327592269BC7214B6A9C4CEBA7BD8EF887B1B210660F907D7140DF60D900C6E0
                                                                                                          APIs
                                                                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00BA992F
                                                                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BA9940
                                                                                                          • TranslateMessage.USER32(?), ref: 00BA994A
                                                                                                          • DispatchMessageW.USER32(?), ref: 00BA9954
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Message$DispatchPeekTranslate
                                                                                                          • String ID:
                                                                                                          • API String ID: 4217535847-0
                                                                                                          • Opcode ID: 2decfb87e33f9721a13d277714827c080e5bbfc32a0ec554603b409bfbd92042
                                                                                                          • Instruction ID: ccc563f7ada2adb819d5108af9064482f74f0ece17752f5ad9cfeb07a3f97ebe
                                                                                                          • Opcode Fuzzy Hash: 2decfb87e33f9721a13d277714827c080e5bbfc32a0ec554603b409bfbd92042
                                                                                                          • Instruction Fuzzy Hash: EEE09272D0212EB78B20AFF6AD4CDDBBF7CEE0A2A97004555B519D3010DA789505C7F1
                                                                                                          APIs
                                                                                                          • CreateThread.KERNELBASE(00000000,00010000,Function_0000FD61,?,00000000,00000000), ref: 00B9FBD5
                                                                                                          • SetThreadPriority.KERNEL32(?,00000000), ref: 00B9FC1C
                                                                                                            • Part of subcall function 00B96DD3: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B96DF1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                                                          • String ID: CreateThread failed
                                                                                                          • API String ID: 2655393344-3849766595
                                                                                                          • Opcode ID: ba89e6be7dc8071749f608281498e078afee30c1d08d34844e6759ca3f673a82
                                                                                                          • Instruction ID: f2dd5f862f6a8cae68f2e4b5069d89018c6d387000d1bb2de13130925710c36c
                                                                                                          • Opcode Fuzzy Hash: ba89e6be7dc8071749f608281498e078afee30c1d08d34844e6759ca3f673a82
                                                                                                          • Instruction Fuzzy Hash: CE01D67234430EABDA206F989C42FB677E9EB55B21F1044BEF946D2180DEA1AC018620
                                                                                                          APIs
                                                                                                          • GetStdHandle.KERNEL32(000000F5,?,?,00B9C853,00000001,?,?,?,00000000,00BA420B,?,?,?,?,?,00BA3CB0), ref: 00B99BE3
                                                                                                          • WriteFile.KERNEL32(?,00000000,?,00BA3EB8,00000000,?,?,00000000,00BA420B,?,?,?,?,?,00BA3CB0,?), ref: 00B99C23
                                                                                                          • WriteFile.KERNELBASE(?,00000000,?,00BA3EB8,00000000,?,00000001,?,?,00B9C853,00000001,?,?,?,00000000,00BA420B), ref: 00B99C50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileWrite$Handle
                                                                                                          • String ID:
                                                                                                          • API String ID: 4209713984-0
                                                                                                          • Opcode ID: b3760da743d093637a3976e92b274e6d678af0e154f0388e888867bbccf281d9
                                                                                                          • Instruction ID: 4b0b8be36b9a996c74870db0f166c2515893a2a88befb1093e7ac4f584ff89ea
                                                                                                          • Opcode Fuzzy Hash: b3760da743d093637a3976e92b274e6d678af0e154f0388e888867bbccf281d9
                                                                                                          • Instruction Fuzzy Hash: 3031037114860AAFDF609E58DC48FA6BBF8EB61700F04456DF595932D0CB79A888CBA1
                                                                                                          APIs
                                                                                                          • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,00B99D92,?,00000001,00000000,?,?), ref: 00B99EAD
                                                                                                          • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,00B99D92,?,00000001,00000000,?,?), ref: 00B99EE0
                                                                                                          • GetLastError.KERNEL32(?,?,?,?,00B99D92,?,00000001,00000000,?,?), ref: 00B99EFD
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateDirectory$ErrorLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 2485089472-0
                                                                                                          • Opcode ID: 5116c4cf415b3ffcaf9df81ab0d6362cef4fde77b51d87e56fc40e98d911439a
                                                                                                          • Instruction ID: d6b99e401ffab699e9786493f7b00ed8df01c54d26591c1840fdb316d44679f0
                                                                                                          • Opcode Fuzzy Hash: 5116c4cf415b3ffcaf9df81ab0d6362cef4fde77b51d87e56fc40e98d911439a
                                                                                                          • Instruction Fuzzy Hash: 3201F131510518A6DFB1EB6C4C86FFE77CCEF0A741F1804FAF805D2091DB20998496E2
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID:
                                                                                                          • API String ID: 3519838083-0
                                                                                                          • Opcode ID: ff2a6d3107ca80a9a9dee51a7b075868894fbc4c66e25d05da2dd83ce1aa8cd0
                                                                                                          • Instruction ID: 3a8187504b48b396f61a3620162354956682f01dfc0d2609413cbd279f2f231a
                                                                                                          • Opcode Fuzzy Hash: ff2a6d3107ca80a9a9dee51a7b075868894fbc4c66e25d05da2dd83ce1aa8cd0
                                                                                                          • Instruction Fuzzy Hash: D311A371A052449BDF15EBB895557BEBBE4EF55300F1004FEA48AD7382DBB45E00C791
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID: CMT
                                                                                                          • API String ID: 3519838083-2756464174
                                                                                                          • Opcode ID: 9e1b3df2d39e434ad3aa9e399ab0b1addf5895874e3ff06327155d999c69fddf
                                                                                                          • Instruction ID: 2d7c25537fa1358693b496888a55ee9f4eaadef2625a769c8138840f609d89d7
                                                                                                          • Opcode Fuzzy Hash: 9e1b3df2d39e434ad3aa9e399ab0b1addf5895874e3ff06327155d999c69fddf
                                                                                                          • Instruction Fuzzy Hash: 3661AF71504F44AADF21DB74CC91AE7BBE8EF15701F4449BEE1AA87142DB326A48CF50
                                                                                                          APIs
                                                                                                          • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00BB82E8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Info
                                                                                                          • String ID:
                                                                                                          • API String ID: 1807457897-3916222277
                                                                                                          • Opcode ID: 9f49117efa5585d5ab5c5f6d12fd8eb737424ef450a34982e9387886e2b460aa
                                                                                                          • Instruction ID: bda1575195ede638f0c1db970064548ad57cc08daeb561cb2f7f6312547a3013
                                                                                                          • Opcode Fuzzy Hash: 9f49117efa5585d5ab5c5f6d12fd8eb737424ef450a34982e9387886e2b460aa
                                                                                                          • Instruction Fuzzy Hash: CE41F97050424C9FDB228E24CC84AFABBFEEB55704F5404ECE58A97142DAB59985DF60
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B91DA6
                                                                                                            • Part of subcall function 00B93AA3: __EH_prolog.LIBCMT ref: 00B93AA8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID: CMT
                                                                                                          • API String ID: 3519838083-2756464174
                                                                                                          • Opcode ID: 1fa826d809c4ef35a775e99c9fd6fe95e584ea675969070838bc170304e461d1
                                                                                                          • Instruction ID: b911dccbf0af57cd9d6c0df50e5ff94119cb4884d28ef9f6cbaa001084e974fd
                                                                                                          • Opcode Fuzzy Hash: 1fa826d809c4ef35a775e99c9fd6fe95e584ea675969070838bc170304e461d1
                                                                                                          • Instruction Fuzzy Hash: 0E21177690460A9FCF15EF98C9459EEFBF6AF59300F1004A9E845A7261CB325E10DB60
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID: CMT
                                                                                                          • API String ID: 3519838083-2756464174
                                                                                                          • Opcode ID: c656d68da9fb45903d7e3a3bee3929ff53ba0f68e4daf29ac51871f80a6e12d7
                                                                                                          • Instruction ID: 42818b1331e24cc2dd1752e4df5f6a38ee8800591a38db37210e77cb60b13d87
                                                                                                          • Opcode Fuzzy Hash: c656d68da9fb45903d7e3a3bee3929ff53ba0f68e4daf29ac51871f80a6e12d7
                                                                                                          • Instruction Fuzzy Hash: F411DA70A00202AFDF04DF69C4959BEF7EAFF45300F0444BAE4459B242DB349952EB50
                                                                                                          APIs
                                                                                                          • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,F5E85006,00000001,?,000000FF), ref: 00BB7A7A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: String
                                                                                                          • String ID: LCMapStringEx
                                                                                                          • API String ID: 2568140703-3893581201
                                                                                                          • Opcode ID: 2cffacfb131270f322e22ecec4748116b974719c16b4101c66a6de98be86e415
                                                                                                          • Instruction ID: 95ae320c7e76e386ed6bbbe8f8fd83d088fca883913a6ac4e8f628fd237b411c
                                                                                                          • Opcode Fuzzy Hash: 2cffacfb131270f322e22ecec4748116b974719c16b4101c66a6de98be86e415
                                                                                                          • Instruction Fuzzy Hash: 7801E57664420DBBCF02AF90DC05EEE7FA2EF48750F458195FE1966160CA72DA71AB80
                                                                                                          APIs
                                                                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00BB709A), ref: 00BB79F2
                                                                                                          Strings
                                                                                                          • InitializeCriticalSectionEx, xrefs: 00BB79C2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CountCriticalInitializeSectionSpin
                                                                                                          • String ID: InitializeCriticalSectionEx
                                                                                                          • API String ID: 2593887523-3084827643
                                                                                                          • Opcode ID: 49c6652583a65fd8d9f7d7b6c085aa1630ff1a47ede3e85e1ed579c758b2722c
                                                                                                          • Instruction ID: 603c778b91bb86eedb81dc08811ba5499494702d6a6204b508778cceca083c9a
                                                                                                          • Opcode Fuzzy Hash: 49c6652583a65fd8d9f7d7b6c085aa1630ff1a47ede3e85e1ed579c758b2722c
                                                                                                          • Instruction Fuzzy Hash: 20F0B471685208FBCB016F55DC05DAEBFE1DB49710B404199FC156B160DEB14E2097D0
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Alloc
                                                                                                          • String ID: FlsAlloc
                                                                                                          • API String ID: 2773662609-671089009
                                                                                                          • Opcode ID: c594ff1124c262d2473e807661190f44f1be80e06b14cef12cca362dc59e893c
                                                                                                          • Instruction ID: b646716a177334c69038fe4bfb9a6f024c9a7c790b50b956549e729f2d7daa8a
                                                                                                          • Opcode Fuzzy Hash: c594ff1124c262d2473e807661190f44f1be80e06b14cef12cca362dc59e893c
                                                                                                          • Instruction Fuzzy Hash: FEE02B74B89218BBC315BF659C0AEBEBBE4DB89B20F4001E9FC0577261DDB10E0186C5
                                                                                                          APIs
                                                                                                          • try_get_function.LIBVCRUNTIME ref: 00BB1DAF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: try_get_function
                                                                                                          • String ID: FlsAlloc
                                                                                                          • API String ID: 2742660187-671089009
                                                                                                          • Opcode ID: 2fb160ab42c25c8904b7d3448e8e9bb59dc04fc9a25de3fd583722c3bac49b7e
                                                                                                          • Instruction ID: 4f972f7437c852ac2fe21d3bea3d0027d006057d1388d1ce1d3560b05f9d6d7c
                                                                                                          • Opcode Fuzzy Hash: 2fb160ab42c25c8904b7d3448e8e9bb59dc04fc9a25de3fd583722c3bac49b7e
                                                                                                          • Instruction Fuzzy Hash: 2BD05B25B833247B951136DDAC02FEABED4CB01FB1F4408E5FF187515795D5445059D1
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BACD6E
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID: 3Ro
                                                                                                          • API String ID: 1269201914-1492261280
                                                                                                          • Opcode ID: 7ed8bf1bda9ca735077d304e5bc2b95ec0f0104d6d287c3d10f7e4f7e13c60af
                                                                                                          • Instruction ID: afbb971d77f60a37ed2a8de5c3acde1524fe5f9df37d9021b1ea7d0eb5e5bf35
                                                                                                          • Opcode Fuzzy Hash: 7ed8bf1bda9ca735077d304e5bc2b95ec0f0104d6d287c3d10f7e4f7e13c60af
                                                                                                          • Instruction Fuzzy Hash: 6FB012C626D009FD332492049E02D370DCCC0C2F5433040FFF442D4050E8500C038036
                                                                                                          APIs
                                                                                                            • Part of subcall function 00BB81EB: GetOEMCP.KERNEL32(00000000,?,?,00BB8474,?), ref: 00BB8216
                                                                                                          • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00BB84B9,?,00000000), ref: 00BB868C
                                                                                                          • GetCPInfo.KERNEL32(00000000,00BB84B9,?,?,?,00BB84B9,?,00000000), ref: 00BB869F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CodeInfoPageValid
                                                                                                          • String ID:
                                                                                                          • API String ID: 546120528-0
                                                                                                          • Opcode ID: a74f2830ae0b1046c508bdad060b7d1c9975842930a9116b7e93ec03a4b6430a
                                                                                                          • Instruction ID: c9debb23765e80985f24f93828cd38f5fb7d17124dfa9c06b9b1118ae9e5fd92
                                                                                                          • Opcode Fuzzy Hash: a74f2830ae0b1046c508bdad060b7d1c9975842930a9116b7e93ec03a4b6430a
                                                                                                          • Instruction Fuzzy Hash: 815135709002459FDB219F36C895AFBBBEDEF41318F2840EED0968B251DEB59D46CB90
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B91383
                                                                                                            • Part of subcall function 00B95FB1: __EH_prolog.LIBCMT ref: 00B95FB6
                                                                                                            • Part of subcall function 00B9C413: __EH_prolog.LIBCMT ref: 00B9C418
                                                                                                            • Part of subcall function 00B9C413: new.LIBCMT ref: 00B9C45B
                                                                                                            • Part of subcall function 00B9C413: new.LIBCMT ref: 00B9C47F
                                                                                                          • new.LIBCMT ref: 00B913FB
                                                                                                            • Part of subcall function 00B9AC66: __EH_prolog.LIBCMT ref: 00B9AC6B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID:
                                                                                                          • API String ID: 3519838083-0
                                                                                                          • Opcode ID: bcd6a19585097cee983e71774ffd85cfd3fdc11b780b10cf4010cec86beca8e5
                                                                                                          • Instruction ID: 5b5eea7cfc544c23bc511904d7f40f8837114601db7f0397fa833bd5f6fd1a31
                                                                                                          • Opcode Fuzzy Hash: bcd6a19585097cee983e71774ffd85cfd3fdc11b780b10cf4010cec86beca8e5
                                                                                                          • Instruction Fuzzy Hash: 384135B0805B40DEDB20DF798485AE6FBE5FB29300F5049BED5EE87282CB326554CB11
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B91383
                                                                                                            • Part of subcall function 00B95FB1: __EH_prolog.LIBCMT ref: 00B95FB6
                                                                                                            • Part of subcall function 00B9C413: __EH_prolog.LIBCMT ref: 00B9C418
                                                                                                            • Part of subcall function 00B9C413: new.LIBCMT ref: 00B9C45B
                                                                                                            • Part of subcall function 00B9C413: new.LIBCMT ref: 00B9C47F
                                                                                                          • new.LIBCMT ref: 00B913FB
                                                                                                            • Part of subcall function 00B9AC66: __EH_prolog.LIBCMT ref: 00B9AC6B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID:
                                                                                                          • API String ID: 3519838083-0
                                                                                                          • Opcode ID: 0ff409d0195b43f9421855f35ca40334ac294ac9a2f3791b714c157ad2be0806
                                                                                                          • Instruction ID: 24fb81c18baba394cec4cc1cade2eb0e6437b7f4ad3e8bf933c61c918f06fa50
                                                                                                          • Opcode Fuzzy Hash: 0ff409d0195b43f9421855f35ca40334ac294ac9a2f3791b714c157ad2be0806
                                                                                                          • Instruction Fuzzy Hash: 8B4134B0805B40DEDB20DF798485AE6FAE5FF29300F404ABED5EE87282CB326554CB11
                                                                                                          APIs
                                                                                                            • Part of subcall function 00BB631F: GetLastError.KERNEL32(?,00BCCBE8,00BB2674,00BCCBE8,?,?,00BB2213,?,?,00BCCBE8), ref: 00BB6323
                                                                                                            • Part of subcall function 00BB631F: _free.LIBCMT ref: 00BB6356
                                                                                                            • Part of subcall function 00BB631F: SetLastError.KERNEL32(00000000,?,00BCCBE8), ref: 00BB6397
                                                                                                            • Part of subcall function 00BB631F: _abort.LIBCMT ref: 00BB639D
                                                                                                            • Part of subcall function 00BB8576: _abort.LIBCMT ref: 00BB85A8
                                                                                                            • Part of subcall function 00BB8576: _free.LIBCMT ref: 00BB85DC
                                                                                                            • Part of subcall function 00BB81EB: GetOEMCP.KERNEL32(00000000,?,?,00BB8474,?), ref: 00BB8216
                                                                                                          • _free.LIBCMT ref: 00BB84CF
                                                                                                          • _free.LIBCMT ref: 00BB8505
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorLast_abort
                                                                                                          • String ID:
                                                                                                          • API String ID: 2991157371-0
                                                                                                          • Opcode ID: be26fa744b0c36f4e1a11e23e43c39a11d7df417c5ee092a5667d37222961528
                                                                                                          • Instruction ID: 6e36335ada57e2a4319d68c91ddef8d950cdc4f657782ec8e6061c0eac503cc4
                                                                                                          • Opcode Fuzzy Hash: be26fa744b0c36f4e1a11e23e43c39a11d7df417c5ee092a5667d37222961528
                                                                                                          • Instruction Fuzzy Hash: 74318F31904209AFDB20EBA9D541BFDB7E9EF44320F2541D9E4049B291DFB59E41CB51
                                                                                                          APIs
                                                                                                          • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00B99B87,?,?,00B97735), ref: 00B99579
                                                                                                          • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00B99B87,?,?,00B97735), ref: 00B995AE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateFile
                                                                                                          • String ID:
                                                                                                          • API String ID: 823142352-0
                                                                                                          • Opcode ID: 7953543619f488601d4c0595d94bf2990cb55b0d28e8cfe9970ea60a2b12dc94
                                                                                                          • Instruction ID: 51ee4e6ceb72120b87f0adcfc30d236d148de0fa7b1a4111790d7a6266eaa4b2
                                                                                                          • Opcode Fuzzy Hash: 7953543619f488601d4c0595d94bf2990cb55b0d28e8cfe9970ea60a2b12dc94
                                                                                                          • Instruction Fuzzy Hash: 1521E4B1004748AFDB318F28C885BABBBE8EB59764F01497DF4D582191C374AD498A61
                                                                                                          APIs
                                                                                                          • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,?,00B97436,?,?,?), ref: 00B99A2C
                                                                                                          • SetFileTime.KERNELBASE(?,?,?,?), ref: 00B99ADC
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$BuffersFlushTime
                                                                                                          • String ID:
                                                                                                          • API String ID: 1392018926-0
                                                                                                          • Opcode ID: 7df735800ce28edc685906679bf3bd2e67a9ea18127c3de0bb6d907ae738b54c
                                                                                                          • Instruction ID: 3423bc7509375269bb8313a80ccbf2a908bdb3ed0a25285861d1c02a6b839fba
                                                                                                          • Opcode Fuzzy Hash: 7df735800ce28edc685906679bf3bd2e67a9ea18127c3de0bb6d907ae738b54c
                                                                                                          • Instruction Fuzzy Hash: C921D331159386AFCB51DF68C881ABABBD8EF96704F0809ADF8C1C7191D729ED08C751
                                                                                                          APIs
                                                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00BB7795
                                                                                                          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00BB77A2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc__crt_fast_encode_pointer
                                                                                                          • String ID:
                                                                                                          • API String ID: 2279764990-0
                                                                                                          • Opcode ID: 63b6f44bbdb69bb0c3b8136c40cf6bae96686ee2b987fd61d616b2af9c7be91d
                                                                                                          • Instruction ID: db379a27fdae7b3cbee2a18e89fd45eb5ff4203ec9df6bc9767836c42db04e58
                                                                                                          • Opcode Fuzzy Hash: 63b6f44bbdb69bb0c3b8136c40cf6bae96686ee2b987fd61d616b2af9c7be91d
                                                                                                          • Instruction Fuzzy Hash: FD113637A482259B9B22DE2BECC4DFA33D1EBC8724B1602A0FC14AB254DE71DC0187D1
                                                                                                          APIs
                                                                                                          • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00B99B21
                                                                                                          • GetLastError.KERNEL32 ref: 00B99B2D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorFileLastPointer
                                                                                                          • String ID:
                                                                                                          • API String ID: 2976181284-0
                                                                                                          • Opcode ID: 65f89068f3eaf35d99f4e95201fc91dfb9306569ced8d14f795beb214ac835fe
                                                                                                          • Instruction ID: 6f748273adf41779a6ed7c850b7e9c63d83f2e7125cd029657e856ccd7a25ce7
                                                                                                          • Opcode Fuzzy Hash: 65f89068f3eaf35d99f4e95201fc91dfb9306569ced8d14f795beb214ac835fe
                                                                                                          • Instruction Fuzzy Hash: 2801DE70300304ABEF349E2CEC84B6AB7D9DB84324F1045BEB252C3680CA38DC088221
                                                                                                          APIs
                                                                                                          • SetFilePointer.KERNELBASE(000000FF,?,?,?), ref: 00B998EB
                                                                                                          • GetLastError.KERNEL32 ref: 00B998F8
                                                                                                            • Part of subcall function 00B996AA: __EH_prolog.LIBCMT ref: 00B996AF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorFileH_prologLastPointer
                                                                                                          • String ID:
                                                                                                          • API String ID: 4236474358-0
                                                                                                          • Opcode ID: c91ab426ebe8a5ca7cc430ec08aa3b3f2913118815cb54e1e275fc97de579d9a
                                                                                                          • Instruction ID: 77c70fc538d8b63b72dc8a276a38a9dc2fd9781fc0480e41cc4ba0de653daf66
                                                                                                          • Opcode Fuzzy Hash: c91ab426ebe8a5ca7cc430ec08aa3b3f2913118815cb54e1e275fc97de579d9a
                                                                                                          • Instruction Fuzzy Hash: EF01B132600209EB9F589E6D8CC4AAA77D9EF4377071542BDE9368B290DB30DC018770
                                                                                                          APIs
                                                                                                          • _free.LIBCMT ref: 00BB5B0B
                                                                                                            • Part of subcall function 00BB59FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,00BB23AA,?,0000015D,?,?,?,?,00BB2F29,000000FF,00000000,?,?), ref: 00BB5A2E
                                                                                                          • RtlReAllocateHeap.NTDLL(00000000,?,00200000,?,?,00BCCBE8,00B917A1,?,?,?,?,00000000,?,00B91378,?,?), ref: 00BB5B47
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap$_free
                                                                                                          • String ID:
                                                                                                          • API String ID: 1482568997-0
                                                                                                          • Opcode ID: 820102d19e2cabc0ed4b2bdc0a11898bf53d565e0f3664be1ad022898ac8f235
                                                                                                          • Instruction ID: bfb3ad2e3ab6a193411f07424da5351b7c8e83314a7c8c8067606e1ad4cbab3c
                                                                                                          • Opcode Fuzzy Hash: 820102d19e2cabc0ed4b2bdc0a11898bf53d565e0f3664be1ad022898ac8f235
                                                                                                          • Instruction Fuzzy Hash: 88F06232611E19ABDB312E259C41FFB3BDDDF81770B144195F8589A1A2DEF1D80191B3
                                                                                                          APIs
                                                                                                          • LoadStringW.USER32(?,?,00000200,?), ref: 00B9D187
                                                                                                          • LoadStringW.USER32(?,?,00000200,?), ref: 00B9D19D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LoadString
                                                                                                          • String ID:
                                                                                                          • API String ID: 2948472770-0
                                                                                                          • Opcode ID: c337709504c9f3d7d88d886cb1485df56931c54ba4a5c6d361d1a504781a1b17
                                                                                                          • Instruction ID: 1566b14a40c25787ab2cde592e4b2abf50bf51376a0419ba5dcdd0b1c3b8e5c9
                                                                                                          • Opcode Fuzzy Hash: c337709504c9f3d7d88d886cb1485df56931c54ba4a5c6d361d1a504781a1b17
                                                                                                          • Instruction Fuzzy Hash: E5F0CD3370122C6BEB119F90AC85FA77E99EF29384F010839FA88A7061DA214C0187A0
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32(?,?), ref: 00B9FCB3
                                                                                                          • GetProcessAffinityMask.KERNEL32(00000000), ref: 00B9FCBA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Process$AffinityCurrentMask
                                                                                                          • String ID:
                                                                                                          • API String ID: 1231390398-0
                                                                                                          • Opcode ID: 772e355d7d1b954220e48644f85212f679416e31edb5ca48986dd64b3e196e8c
                                                                                                          • Instruction ID: eff8042897cd934b706e8a2c54dba4f35ce1bec5901253e47a18929a35b8f99d
                                                                                                          • Opcode Fuzzy Hash: 772e355d7d1b954220e48644f85212f679416e31edb5ca48986dd64b3e196e8c
                                                                                                          • Instruction Fuzzy Hash: 4FE06D32E1010FA78F089AA49C049FA76EEFA0822072481BAAD16D3200EA34DD0146A0
                                                                                                          APIs
                                                                                                          • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00B99EF9,?,?,?,00B99D92,?,00000001,00000000,?,?), ref: 00B9A0D7
                                                                                                          • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00B99EF9,?,?,?,00B99D92,?,00000001,00000000,?,?), ref: 00B9A108
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AttributesFile
                                                                                                          • String ID:
                                                                                                          • API String ID: 3188754299-0
                                                                                                          • Opcode ID: c87d7788682a6ea7e3730a16555f8a7da8970b2ff0589a9f33a8b5f74d8f311f
                                                                                                          • Instruction ID: b9d1770ebf04e3b4fd78b444f790644fed0085e43af973ccb77bf5d0c15f7f16
                                                                                                          • Opcode Fuzzy Hash: c87d7788682a6ea7e3730a16555f8a7da8970b2ff0589a9f33a8b5f74d8f311f
                                                                                                          • Instruction Fuzzy Hash: 0CF0303125011DABDF116F60EC01FEA7BADEB09385F4480A1B98896165DB329A98AA94
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemText_swprintf
                                                                                                          • String ID:
                                                                                                          • API String ID: 3011073432-0
                                                                                                          • Opcode ID: 563c0b9dbfce7a980608b70e397dd26e54244a10d75f1f6d1cb2ed831c70a061
                                                                                                          • Instruction ID: e61285eb5c50c33bd1fc1c7de1da4bb19f2b34f8b3ff52fb2d7064a35f5ad7b3
                                                                                                          • Opcode Fuzzy Hash: 563c0b9dbfce7a980608b70e397dd26e54244a10d75f1f6d1cb2ed831c70a061
                                                                                                          • Instruction Fuzzy Hash: 3AF0EC3255924CB6EB21B7708C06FAA3FDDA705741F0400D6B605A30A2EA725A209751
                                                                                                          APIs
                                                                                                          • DeleteFileW.KERNELBASE(?,?,?,00B99611,?,?,00B9946C), ref: 00B99DBD
                                                                                                          • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,00B99611,?,?,00B9946C), ref: 00B99DEB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DeleteFile
                                                                                                          • String ID:
                                                                                                          • API String ID: 4033686569-0
                                                                                                          • Opcode ID: f8b1b99153761e87cc0c96ff4ce7d7e8b9a5ec16edfa3af937a4421756defaa6
                                                                                                          • Instruction ID: b9ef9b4a8ede0e1f932c7319b7349201d7b96287b26c3c2238732a6b94b7ff91
                                                                                                          • Opcode Fuzzy Hash: f8b1b99153761e87cc0c96ff4ce7d7e8b9a5ec16edfa3af937a4421756defaa6
                                                                                                          • Instruction Fuzzy Hash: DBE0927165020DABDF11AF65DC81FEA77DDEF09382F8440B5B988C3060DF319D949A90
                                                                                                          APIs
                                                                                                          • GetFileAttributesW.KERNELBASE(?,?,?,00B99E08,?,00B975A0,?,?,?,?), ref: 00B99E24
                                                                                                          • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00B99E08,?,00B975A0,?,?,?,?), ref: 00B99E50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AttributesFile
                                                                                                          • String ID:
                                                                                                          • API String ID: 3188754299-0
                                                                                                          • Opcode ID: 44b8fdd2ec04d0e7d3e6f0d4e3668a486227847a88491f385d35f2b8a841b2ff
                                                                                                          • Instruction ID: 06015345cbfa7f7b66cd2af13d9bc63dbcf030e781ea630fd242837e24ef0027
                                                                                                          • Opcode Fuzzy Hash: 44b8fdd2ec04d0e7d3e6f0d4e3668a486227847a88491f385d35f2b8a841b2ff
                                                                                                          • Instruction Fuzzy Hash: 30E0653250015C57DF50AB689C05BD97B98EB087A1F0001B1FD48E3194DA705D888BD4
                                                                                                          APIs
                                                                                                          • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B9F324
                                                                                                          • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00B9DEC8,Crypt32.dll,?,00B9DF4A,?,00B9DF2E,?,?,?,?), ref: 00B9F346
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DirectoryLibraryLoadSystem
                                                                                                          • String ID:
                                                                                                          • API String ID: 1175261203-0
                                                                                                          • Opcode ID: d2740a12eec9640641cfb7eb260bf0cb97ec0a8f890d0f4f300c68f583b4e581
                                                                                                          • Instruction ID: 4f87db6a503bbb0e5e1892df4fc26475e1b783e007bc49be172f5dab6b1d98bc
                                                                                                          • Opcode Fuzzy Hash: d2740a12eec9640641cfb7eb260bf0cb97ec0a8f890d0f4f300c68f583b4e581
                                                                                                          • Instruction Fuzzy Hash: 64E0127291511CA7DB11AAA49C05FEB77ACEB0D391F0440A5B948D3005DA7499408BF0
                                                                                                          APIs
                                                                                                          • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00BA8945
                                                                                                          • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00BA894C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: BitmapCreateFromGdipStream
                                                                                                          • String ID:
                                                                                                          • API String ID: 1918208029-0
                                                                                                          • Opcode ID: 3ec5097aa86131637413173a4c972945ef3d7481062fd463d5a69132030813b0
                                                                                                          • Instruction ID: e92e5f67507d06af45f8f14411975160abfd042d5b79ddd6a6fa833aa58f8f7c
                                                                                                          • Opcode Fuzzy Hash: 3ec5097aa86131637413173a4c972945ef3d7481062fd463d5a69132030813b0
                                                                                                          • Instruction Fuzzy Hash: 70E06575404208EFC710DF88C4017AEBBE8EB05311F1084AAE88593601D670AE049B91
                                                                                                          APIs
                                                                                                          • GdiplusShutdown.GDIPLUS(?,?,?,00BBF79B,000000FF), ref: 00BA90C7
                                                                                                          • CoUninitialize.COMBASE(?,?,?,00BBF79B,000000FF), ref: 00BA90CC
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: GdiplusShutdownUninitialize
                                                                                                          • String ID:
                                                                                                          • API String ID: 3856339756-0
                                                                                                          • Opcode ID: 1f46f9f461c9e7e8e7c52e3a0dcbcb19e536b7aba2798e51da1c5a29bfb87310
                                                                                                          • Instruction ID: 172e69e26205ffde91aefa6ef6b7434d7fcabe7c1558cd83590d51521b5ae882
                                                                                                          • Opcode Fuzzy Hash: 1f46f9f461c9e7e8e7c52e3a0dcbcb19e536b7aba2798e51da1c5a29bfb87310
                                                                                                          • Instruction Fuzzy Hash: 0BE01A32548644AFC310DB4CDD45F55FBE9FB09B20F0087AAB91A93B60CB786C00CA91
                                                                                                          APIs
                                                                                                            • Part of subcall function 00BB1D9A: try_get_function.LIBVCRUNTIME ref: 00BB1DAF
                                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00BB0CC4
                                                                                                          • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00BB0CCF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                                                          • String ID:
                                                                                                          • API String ID: 806969131-0
                                                                                                          • Opcode ID: 0d7bf7f94056d47be366d7a37a722ded58bd2cee6ba0a707a0fa9079150e845f
                                                                                                          • Instruction ID: 1c3b96fc3c84246c42dfe6b2ee0d76c7d52be08133fa8b7b1fd90c0376ac2fa8
                                                                                                          • Opcode Fuzzy Hash: 0d7bf7f94056d47be366d7a37a722ded58bd2cee6ba0a707a0fa9079150e845f
                                                                                                          • Instruction Fuzzy Hash: B3D023355783051F1D003B742C324FF1FC8D5127B47F00BC5E021A51D1DFD080816112
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemShowWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 3351165006-0
                                                                                                          • Opcode ID: 0ba22da0688dc1c0381cdcd0ed654b05e09c7c40883ce9641cf88baa617ab8d1
                                                                                                          • Instruction ID: f80d2ad0bb94396decbc89004909cce5d1fb9fb5c08e27a6bf1f333aa6af90bd
                                                                                                          • Opcode Fuzzy Hash: 0ba22da0688dc1c0381cdcd0ed654b05e09c7c40883ce9641cf88baa617ab8d1
                                                                                                          • Instruction Fuzzy Hash: 3BC01232058204BFCB010BB0DC09C2EFBAEABA9216F00C908B4A5C20A0CA38C820DB12
                                                                                                          APIs
                                                                                                          • EnterCriticalSection.KERNEL32(00BD1E74,?,?,?,?,00B9A5A0,?,?,?,?,00BBF79B,000000FF), ref: 00B9FC42
                                                                                                          • LeaveCriticalSection.KERNEL32(00BD1E74,?,?,?,?,00B9A5A0,?,?,?,?,00BBF79B,000000FF), ref: 00B9FC99
                                                                                                            • Part of subcall function 00B9F9D1: ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 00B9FA05
                                                                                                            • Part of subcall function 00B9F9D1: CloseHandle.KERNEL32(?,?), ref: 00B9FA1F
                                                                                                            • Part of subcall function 00B9F9D1: DeleteCriticalSection.KERNEL32(?), ref: 00B9FA38
                                                                                                            • Part of subcall function 00B9F9D1: CloseHandle.KERNELBASE(?), ref: 00B9FA44
                                                                                                            • Part of subcall function 00B9F9D1: CloseHandle.KERNEL32(?), ref: 00B9FA50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseCriticalHandleSection$DeleteEnterLeaveReleaseSemaphore
                                                                                                          • String ID:
                                                                                                          • API String ID: 3265325312-0
                                                                                                          • Opcode ID: 8df63813d0e4844c408e116637b04614c1a05e1b70b41dcb8031fadd4383796a
                                                                                                          • Instruction ID: 38475b5b57a79c82f768aa316d27a0c23fb9c4a42c244dfa3a623aa45b3345ad
                                                                                                          • Opcode Fuzzy Hash: 8df63813d0e4844c408e116637b04614c1a05e1b70b41dcb8031fadd4383796a
                                                                                                          • Instruction Fuzzy Hash: 3AF0C83320521A7BDE116728EC8097EF7ECD786774326457BFC04E3242EF25AC4142A0
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID:
                                                                                                          • API String ID: 3519838083-0
                                                                                                          • Opcode ID: 5eff5449da3c4ade7437e31bad30b01b7a79e64242b22d93d5e61d93d8e97e3e
                                                                                                          • Instruction ID: 18b74f17c07fa4c8675015ba83512b94af430a77364932a5279eb6a8a606939a
                                                                                                          • Opcode Fuzzy Hash: 5eff5449da3c4ade7437e31bad30b01b7a79e64242b22d93d5e61d93d8e97e3e
                                                                                                          • Instruction Fuzzy Hash: 73B1C170A04647AEEF19CF7CC484BB9FBE6FF05304F144AAAE46597281C731A854DB91
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B98210
                                                                                                            • Part of subcall function 00B9137E: __EH_prolog.LIBCMT ref: 00B91383
                                                                                                            • Part of subcall function 00B9137E: new.LIBCMT ref: 00B913FB
                                                                                                            • Part of subcall function 00B919B1: __EH_prolog.LIBCMT ref: 00B919B6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID:
                                                                                                          • API String ID: 3519838083-0
                                                                                                          • Opcode ID: da73ef4fd521b41ef1a57d4fdf70cca2bda9c46fc0a362564b11b0ac40a4a080
                                                                                                          • Instruction ID: c39d690a785ebf2c835d2ccc9ac3caaf3334d47d08d7b5658495d955afe0b2ac
                                                                                                          • Opcode Fuzzy Hash: da73ef4fd521b41ef1a57d4fdf70cca2bda9c46fc0a362564b11b0ac40a4a080
                                                                                                          • Instruction Fuzzy Hash: 3241AE719446589ADF24EB64CC51BFAB7E8AF51700F0404FAF48AA3092DF746EC8DB50
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID:
                                                                                                          • API String ID: 3519838083-0
                                                                                                          • Opcode ID: 64065b430707efdd8ed09f55997de19895e5c5f623f6202d631c20eedebe5f5b
                                                                                                          • Instruction ID: 72dc5e84e8ab740c56e408a49d9fba8453b32b6df28d0579c44a82de239fea96
                                                                                                          • Opcode Fuzzy Hash: 64065b430707efdd8ed09f55997de19895e5c5f623f6202d631c20eedebe5f5b
                                                                                                          • Instruction Fuzzy Hash: F621A6B1E44616AFDB14DFB9CC4176B7BE8FB16314F0006BAE905EBA81D7709D40C6A8
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00BA948A
                                                                                                            • Part of subcall function 00B9137E: __EH_prolog.LIBCMT ref: 00B91383
                                                                                                            • Part of subcall function 00B9137E: new.LIBCMT ref: 00B913FB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID:
                                                                                                          • API String ID: 3519838083-0
                                                                                                          • Opcode ID: 9ebfaa0e10fd640f3e76797538e7b8ca4d005347079f72f1b637b54a37d497c0
                                                                                                          • Instruction ID: bf20b5b4da42db92c0bcac5275b587849d18428eb15eaed7b16677f4617948e5
                                                                                                          • Opcode Fuzzy Hash: 9ebfaa0e10fd640f3e76797538e7b8ca4d005347079f72f1b637b54a37d497c0
                                                                                                          • Instruction Fuzzy Hash: 6C214176D0825A9BCF15DF98D9525EEBBF4FF19300F1004EAE809A7202D7356E05DB60
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID:
                                                                                                          • API String ID: 3519838083-0
                                                                                                          • Opcode ID: 773de79be20d407f2b6d29b294908f2d8a431fbd7799fcbe058c5155677b8315
                                                                                                          • Instruction ID: c78fd0a91581cb530bb9375931efeeecaaccd94e44754bb5263b80c3eb30908b
                                                                                                          • Opcode Fuzzy Hash: 773de79be20d407f2b6d29b294908f2d8a431fbd7799fcbe058c5155677b8315
                                                                                                          • Instruction Fuzzy Hash: 2B11827394042AABCF21AE6CCC969EEBBB5FF48740F0545B9F81577211DA318D0087E0
                                                                                                          APIs
                                                                                                            • Part of subcall function 00BB5A8D: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00BB634D,00000001,00000364,?,00BB2213,?,?,00BCCBE8), ref: 00BB5ACE
                                                                                                          • _free.LIBCMT ref: 00BB8F50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap_free
                                                                                                          • String ID:
                                                                                                          • API String ID: 614378929-0
                                                                                                          • Opcode ID: ffe7a698f1ec9d313924040038d8a651e71016dbf9af90b8887af046bf84921e
                                                                                                          • Instruction ID: dc14ec7df74a8cfa7421a08bd01b0e11d1962e3bf34cd30777dd40afcdc7d938
                                                                                                          • Opcode Fuzzy Hash: ffe7a698f1ec9d313924040038d8a651e71016dbf9af90b8887af046bf84921e
                                                                                                          • Instruction Fuzzy Hash: 9501DB72204345ABE7318F59D8819B9FBDDEB85370F25095DE59893280EA706805C674
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6f69b890bfcadbff77c2162ea7abf3c3c8eb9a14ff0d02becf574ea9a8cd57a9
                                                                                                          • Instruction ID: 6e54e54047cdfe4808aa64c70da3b0ead8df35a00a7435702a5709d965f3c4a1
                                                                                                          • Opcode Fuzzy Hash: 6f69b890bfcadbff77c2162ea7abf3c3c8eb9a14ff0d02becf574ea9a8cd57a9
                                                                                                          • Instruction Fuzzy Hash: B5F0AF319107159FDF30DE24C8457167BE4EB11360F2089BEE49AC7590EBB0E890A7D2
                                                                                                          APIs
                                                                                                          • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00BB634D,00000001,00000364,?,00BB2213,?,?,00BCCBE8), ref: 00BB5ACE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 1279760036-0
                                                                                                          • Opcode ID: ff45dfc0df5573dce20c0c8b9c6df0f2ff2b4b5ed79d8ee4bfd0769df4246d76
                                                                                                          • Instruction ID: aaa70b13cacea0fa01a4bb9d771fe6eb42f617f7db10aa6d58d2bf9910a127a2
                                                                                                          • Opcode Fuzzy Hash: ff45dfc0df5573dce20c0c8b9c6df0f2ff2b4b5ed79d8ee4bfd0769df4246d76
                                                                                                          • Instruction Fuzzy Hash: D8F0B431601E206BEB316A228C85BFB37C8EF41760F2842D1F815BB1A0CAE0D80086A2
                                                                                                          APIs
                                                                                                          • RtlAllocateHeap.NTDLL(00000000,?,?,?,00BB23AA,?,0000015D,?,?,?,?,00BB2F29,000000FF,00000000,?,?), ref: 00BB5A2E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 1279760036-0
                                                                                                          • Opcode ID: 63d3b9008fac445f24b9bd432f7b1dce176afa8b98bcc7b6d9c846589b66ba75
                                                                                                          • Instruction ID: ce088aa4c52d7220225e78b8bee1b5a5c1400fa6beb0eabc730fd277e531ce64
                                                                                                          • Opcode Fuzzy Hash: 63d3b9008fac445f24b9bd432f7b1dce176afa8b98bcc7b6d9c846589b66ba75
                                                                                                          • Instruction Fuzzy Hash: ADE06531111E645BE6312A659C86BFB76C8EF553A4F1503E4AC16BA191DBE0DC0041A7
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B95B3A
                                                                                                            • Part of subcall function 00B9AC66: __EH_prolog.LIBCMT ref: 00B9AC6B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID:
                                                                                                          • API String ID: 3519838083-0
                                                                                                          • Opcode ID: 58fc50be8b5d598d2121268d6160990a61cae63a13bdf78d68395d29f470b9dc
                                                                                                          • Instruction ID: 4c55e225be3ed7ef0f3ad2198e651057ee4a34180ba8d90017d89afb6c5722d8
                                                                                                          • Opcode Fuzzy Hash: 58fc50be8b5d598d2121268d6160990a61cae63a13bdf78d68395d29f470b9dc
                                                                                                          • Instruction Fuzzy Hash: FD016D30904696DADB15E7A4C4557EDFBE49F56314F0080FDA859A3282DBB42B08D7A2
                                                                                                          APIs
                                                                                                          • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00B9A174
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseFind
                                                                                                          • String ID:
                                                                                                          • API String ID: 1863332320-0
                                                                                                          • Opcode ID: 5849d1492c015da5acc44ecd42c8133fb8833f8c5402dbcf7957e3c43fd754a2
                                                                                                          • Instruction ID: 5b9a652130ca791840567f3fe50eb5c914465293ac39a0a8331d2489d0f1e604
                                                                                                          • Opcode Fuzzy Hash: 5849d1492c015da5acc44ecd42c8133fb8833f8c5402dbcf7957e3c43fd754a2
                                                                                                          • Instruction Fuzzy Hash: 1AF0E231408790EECE626BB48804BCB7BD09F1A331F008A8DF1FD521A2C27560899B62
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B91E93
                                                                                                            • Part of subcall function 00B918F6: __EH_prolog.LIBCMT ref: 00B918FB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID:
                                                                                                          • API String ID: 3519838083-0
                                                                                                          • Opcode ID: bfcb075aeac57bd363965acee772789c956b8bb76c69bf5520d039f45dbf9236
                                                                                                          • Instruction ID: 573132302483cd4602e2cbb9689490296b0b0cfdb7bfa166638a66da1c731c75
                                                                                                          • Opcode Fuzzy Hash: bfcb075aeac57bd363965acee772789c956b8bb76c69bf5520d039f45dbf9236
                                                                                                          • Instruction Fuzzy Hash: B1F0F8B1C0028A8ECF41DFACC8456EEBBF0BB18300F1405BAD409E3202E7344A04CB91
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B91E93
                                                                                                            • Part of subcall function 00B918F6: __EH_prolog.LIBCMT ref: 00B918FB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog
                                                                                                          • String ID:
                                                                                                          • API String ID: 3519838083-0
                                                                                                          • Opcode ID: e0ae847181b1538d67acaf3b877b1e0c0f52bda45648bd320df295aee16f3314
                                                                                                          • Instruction ID: f6e04af5a1b9285dcde69208e88f5152623fd7d0dd0e22246efc83d266b3169d
                                                                                                          • Opcode Fuzzy Hash: e0ae847181b1538d67acaf3b877b1e0c0f52bda45648bd320df295aee16f3314
                                                                                                          • Instruction Fuzzy Hash: E3F0A5B1C056999ECF41DFACC8456EEBBF1BB19300F1446BAD409E7202E7355A04DB91
                                                                                                          APIs
                                                                                                          • SetThreadExecutionState.KERNEL32(00000001), ref: 00B9F927
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExecutionStateThread
                                                                                                          • String ID:
                                                                                                          • API String ID: 2211380416-0
                                                                                                          • Opcode ID: 4ebdfda00d4e6955589a6d051dd3234da6aaa83743c298f59392863fe16c107d
                                                                                                          • Instruction ID: c3a51718430b540c0b42adf132f32fdaa9656c352111ca1367aa6e675b251fed
                                                                                                          • Opcode Fuzzy Hash: 4ebdfda00d4e6955589a6d051dd3234da6aaa83743c298f59392863fe16c107d
                                                                                                          • Instruction Fuzzy Hash: D7D05B5175411522DE11336C6906FFD2BC78FCB324F0900F9F018D72D38E594C5692B1
                                                                                                          APIs
                                                                                                          • GdipAlloc.GDIPLUS(00000010), ref: 00BA8B6B
                                                                                                            • Part of subcall function 00BA8924: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00BA8945
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Gdip$AllocBitmapCreateFromStream
                                                                                                          • String ID:
                                                                                                          • API String ID: 1915507550-0
                                                                                                          • Opcode ID: 15c49645ae947bc9d886009c95b2f94d8af3cf3aba4b9e0e598e8e73a7603f1a
                                                                                                          • Instruction ID: 71fc05bb48efe6fb510dacab84f00d103cd4d52a8ea1212274a30c036c06ff80
                                                                                                          • Opcode Fuzzy Hash: 15c49645ae947bc9d886009c95b2f94d8af3cf3aba4b9e0e598e8e73a7603f1a
                                                                                                          • Instruction Fuzzy Hash: 62D0A77060810C7BDF406E609C0297E7AD8EB07350F5041B5BC04A5550FE73CD206261
                                                                                                          APIs
                                                                                                          • GetFileType.KERNELBASE(000000FF,00B9964C), ref: 00B99726
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileType
                                                                                                          • String ID:
                                                                                                          • API String ID: 3081899298-0
                                                                                                          • Opcode ID: e0147cd86ae6254c6663733a76b8b03b1cd67623d4d6f96611b4bbef48a33de0
                                                                                                          • Instruction ID: 8a2711ca4548cedfcaa841f72b2041e1a495e722f0f60d93063af8a4877b8f48
                                                                                                          • Opcode Fuzzy Hash: e0147cd86ae6254c6663733a76b8b03b1cd67623d4d6f96611b4bbef48a33de0
                                                                                                          • Instruction Fuzzy Hash: EFD01230131200D68EA11E7C6D0A0796691DB433A7B28DAFCE065C50A1CF26CC43F540
                                                                                                          APIs
                                                                                                          • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 00BABF9C
                                                                                                            • Part of subcall function 00BA991E: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00BA992F
                                                                                                            • Part of subcall function 00BA991E: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BA9940
                                                                                                            • Part of subcall function 00BA991E: TranslateMessage.USER32(?), ref: 00BA994A
                                                                                                            • Part of subcall function 00BA991E: DispatchMessageW.USER32(?), ref: 00BA9954
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Message$DispatchItemPeekSendTranslate
                                                                                                          • String ID:
                                                                                                          • API String ID: 4142818094-0
                                                                                                          • Opcode ID: d386e514eb21920b0d713e4c4d3f7eb880447de7714a0de65e22e68671e573c8
                                                                                                          • Instruction ID: a2bbdef7a1b07024d1874a56a86097b02260f367b35272ecf99a7925e84be1e8
                                                                                                          • Opcode Fuzzy Hash: d386e514eb21920b0d713e4c4d3f7eb880447de7714a0de65e22e68671e573c8
                                                                                                          • Instruction Fuzzy Hash: 73D09E31148200FADA112B51CD06F0ABAE6BB9CB04F004599B244340B186629D30AB02
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BAC799
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID:
                                                                                                          • API String ID: 1269201914-0
                                                                                                          • Opcode ID: 8d933d6bf85ed4ec1e2040e04ba7e860dd3e64d33da713c08f2d43f6c54d18aa
                                                                                                          • Instruction ID: c1a30d66126244636ac3528dcfb766eecc5f0fd569c5d87cc5355544f3d14be9
                                                                                                          • Opcode Fuzzy Hash: 8d933d6bf85ed4ec1e2040e04ba7e860dd3e64d33da713c08f2d43f6c54d18aa
                                                                                                          • Instruction Fuzzy Hash: 4FB012E225C1096D3288D1155C46E3B05CCC0C2F1433080DFB400C4150E8800C40413A
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BAC799
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID:
                                                                                                          • API String ID: 1269201914-0
                                                                                                          • Opcode ID: 6920883f85d17b219fa5cf2d00a1e4c841998e46a47f998046b176fdb5fcb1d6
                                                                                                          • Instruction ID: 48a4c143b1f74e3b4bca151af6d364ae965307352d5d6dd7da35e262bd153f23
                                                                                                          • Opcode Fuzzy Hash: 6920883f85d17b219fa5cf2d00a1e4c841998e46a47f998046b176fdb5fcb1d6
                                                                                                          • Instruction Fuzzy Hash: 52B012E225C1057D328491105C86D3B05CDC0C3B14330C0DFB800C4050E9801C444036
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BAC799
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID:
                                                                                                          • API String ID: 1269201914-0
                                                                                                          • Opcode ID: 9fc7337134dbed4207ce38447df1683da1167d3b6ba58eb88296c75ecc592ce7
                                                                                                          • Instruction ID: bad5460a233546050bac6155fecc207eacd5b03e56bb19b8f93d46576200a9f1
                                                                                                          • Opcode Fuzzy Hash: 9fc7337134dbed4207ce38447df1683da1167d3b6ba58eb88296c75ecc592ce7
                                                                                                          • Instruction Fuzzy Hash: F1B012E225C0056D3284D1145D06E3B05CDC0C2B1433080DFB400C5150E8800C495036
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BAC738
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID:
                                                                                                          • API String ID: 1269201914-0
                                                                                                          • Opcode ID: c1ddbed18bf1352e8e9c78123bb8ebca176d532d0c089175c3fb9f12123da211
                                                                                                          • Instruction ID: a49002418422d8a0ae71e5ae642ec6ec1623497104cee77411cacebe017eed80
                                                                                                          • Opcode Fuzzy Hash: c1ddbed18bf1352e8e9c78123bb8ebca176d532d0c089175c3fb9f12123da211
                                                                                                          • Instruction Fuzzy Hash: A3B012A236C2057C360892405D8AE3709DCC0C2F2433041DFF400D8150E8401C44C532
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BAC738
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID:
                                                                                                          • API String ID: 1269201914-0
                                                                                                          • Opcode ID: 39b31bec2fa07d58d2878e06396c52cdf74c410640fda52097d439b6fb635467
                                                                                                          • Instruction ID: 09a462c8ad8a16817da6358d0002a4e5cc14cef3a667c4569bc2e521154207a0
                                                                                                          • Opcode Fuzzy Hash: 39b31bec2fa07d58d2878e06396c52cdf74c410640fda52097d439b6fb635467
                                                                                                          • Instruction Fuzzy Hash: E2B0129236C2056D3244D2046F46E3709CCC0C2F1433040DFF400C4250E8400C058532
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BAC738
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID:
                                                                                                          • API String ID: 1269201914-0
                                                                                                          • Opcode ID: 6faec6ef98a88d0827d092136b6ac4a74ae041afecc4ce21878da9e95ee5b142
                                                                                                          • Instruction ID: 6582dc01cc5925fd5fe7fc6c5aa7bdd91722cb2211accb55e518ebe39f4b25ab
                                                                                                          • Opcode Fuzzy Hash: 6faec6ef98a88d0827d092136b6ac4a74ae041afecc4ce21878da9e95ee5b142
                                                                                                          • Instruction Fuzzy Hash: 77B0129237C1057C3244D2045D46E3709CCC0C2F1433080DFF800C4250E8400C048532
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BAC738
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID:
                                                                                                          • API String ID: 1269201914-0
                                                                                                          • Opcode ID: 6540efa666bcdc07834333b64d25f201aa2141c23c75473d09831e8635078a14
                                                                                                          • Instruction ID: 886fae699a6bff82b0b5a4acd7cad5b94fb6521abdd669d2b380c79d5f4ed807
                                                                                                          • Opcode Fuzzy Hash: 6540efa666bcdc07834333b64d25f201aa2141c23c75473d09831e8635078a14
                                                                                                          • Instruction Fuzzy Hash: 41B0129237C0056C3244D2059D06E3709CCC0C2B1433041DFF401C4250E8401C048132
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BAC799
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID:
                                                                                                          • API String ID: 1269201914-0
                                                                                                          • Opcode ID: c0a9a9e3e491441d41c05d3df74ff5b38667b2e0b5e75e165ca5e43b08a3c599
                                                                                                          • Instruction ID: 8320c70e26f3738f78c124847749f3d0dfc6d8af0312f8cce664ac4f6965d963
                                                                                                          • Opcode Fuzzy Hash: c0a9a9e3e491441d41c05d3df74ff5b38667b2e0b5e75e165ca5e43b08a3c599
                                                                                                          • Instruction Fuzzy Hash: D1A001E62AD516BD3288A261AD4AD3B1A9CC4C6B65330899EB842C81A5A9801C959439
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BAC799
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID:
                                                                                                          • API String ID: 1269201914-0
                                                                                                          • Opcode ID: 26a5112d571c0b04f4e812f30abe50f66e86b8ad5c040243f51b1136c1ddc03a
                                                                                                          • Instruction ID: 8320c70e26f3738f78c124847749f3d0dfc6d8af0312f8cce664ac4f6965d963
                                                                                                          • Opcode Fuzzy Hash: 26a5112d571c0b04f4e812f30abe50f66e86b8ad5c040243f51b1136c1ddc03a
                                                                                                          • Instruction Fuzzy Hash: D1A001E62AD516BD3288A261AD4AD3B1A9CC4C6B65330899EB842C81A5A9801C959439
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BAC738
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID:
                                                                                                          • API String ID: 1269201914-0
                                                                                                          • Opcode ID: decbc07db96eaf4d996d45ae57ce9beaa86fd13391023cb3f5106860d541d144
                                                                                                          • Instruction ID: 6deab25cfc0e9b96a7d9a5ea51660adccb3e910cfb63849fcb041358343a7aea
                                                                                                          • Opcode Fuzzy Hash: decbc07db96eaf4d996d45ae57ce9beaa86fd13391023cb3f5106860d541d144
                                                                                                          • Instruction Fuzzy Hash: E3A001A62AD506BC3648A251AD4AD3B0A9DC4C6B65330899FF802982A5E9801C499531
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BAC738
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID:
                                                                                                          • API String ID: 1269201914-0
                                                                                                          • Opcode ID: 6f67257e3d8e88d2b196c3dd8ff8251e51db4bb8f002256baeb8125e4a648b67
                                                                                                          • Instruction ID: 6deab25cfc0e9b96a7d9a5ea51660adccb3e910cfb63849fcb041358343a7aea
                                                                                                          • Opcode Fuzzy Hash: 6f67257e3d8e88d2b196c3dd8ff8251e51db4bb8f002256baeb8125e4a648b67
                                                                                                          • Instruction Fuzzy Hash: E3A001A62AD506BC3648A251AD4AD3B0A9DC4C6B65330899FF802982A5E9801C499531
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BAC738
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID:
                                                                                                          • API String ID: 1269201914-0
                                                                                                          • Opcode ID: 637b09326622823994601df96c4cbcb0e7409c1d469af88c9214e38de2916df7
                                                                                                          • Instruction ID: 6deab25cfc0e9b96a7d9a5ea51660adccb3e910cfb63849fcb041358343a7aea
                                                                                                          • Opcode Fuzzy Hash: 637b09326622823994601df96c4cbcb0e7409c1d469af88c9214e38de2916df7
                                                                                                          • Instruction Fuzzy Hash: E3A001A62AD506BC3648A251AD4AD3B0A9DC4C6B65330899FF802982A5E9801C499531
                                                                                                          APIs
                                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00BAC738
                                                                                                            • Part of subcall function 00BACABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BACB39
                                                                                                            • Part of subcall function 00BACABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BACB4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                          • String ID:
                                                                                                          • API String ID: 1269201914-0
                                                                                                          • Opcode ID: d59060a968df15405e44e7a755c276c345f36f138eeb546dd568668bffa35cea
                                                                                                          • Instruction ID: 6deab25cfc0e9b96a7d9a5ea51660adccb3e910cfb63849fcb041358343a7aea
                                                                                                          • Opcode Fuzzy Hash: d59060a968df15405e44e7a755c276c345f36f138eeb546dd568668bffa35cea
                                                                                                          • Instruction Fuzzy Hash: E3A001A62AD506BC3648A251AD4AD3B0A9DC4C6B65330899FF802982A5E9801C499531
                                                                                                          APIs
                                                                                                          • SetEndOfFile.KERNELBASE(?,00B98EDB,?,?,-00001954), ref: 00B99B6D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File
                                                                                                          • String ID:
                                                                                                          • API String ID: 749574446-0
                                                                                                          • Opcode ID: ecfd061397ac4fb8eb900fcfb3b85635ec286e787069edc26d6d203df33e584a
                                                                                                          • Instruction ID: e03c63419f3d602d706fccf19340e480cb996a7180cebfa7a0982081e81e00bc
                                                                                                          • Opcode Fuzzy Hash: ecfd061397ac4fb8eb900fcfb3b85635ec286e787069edc26d6d203df33e584a
                                                                                                          • Instruction Fuzzy Hash: 59B011320F000ACB8E003B30CC08C203A20EB2230AB0082A0A00ACA0A0CF22C002AA00
                                                                                                          APIs
                                                                                                          • SetCurrentDirectoryW.KERNELBASE(?,00BA927A,00BD2120,00000000,00BD3122,00000006), ref: 00BA9027
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CurrentDirectory
                                                                                                          • String ID:
                                                                                                          • API String ID: 1611563598-0
                                                                                                          • Opcode ID: 352e7abd0ef413d4769bad3c424a53b382f466d9b784840f4f49f17ed9644701
                                                                                                          • Instruction ID: a1b8f71e519147881b8e7fbbe02405fd46befb5116d847920dcb5cfda533b749
                                                                                                          • Opcode Fuzzy Hash: 352e7abd0ef413d4769bad3c424a53b382f466d9b784840f4f49f17ed9644701
                                                                                                          • Instruction Fuzzy Hash: 3CA012301A410786CA001B30CC09C15B6505760702F0086207002C10A0CF30C810E500
                                                                                                          APIs
                                                                                                          • CloseHandle.KERNELBASE(000000FF,?,?,00B99473), ref: 00B994BE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandle
                                                                                                          • String ID:
                                                                                                          • API String ID: 2962429428-0
                                                                                                          • Opcode ID: d12e8a3fc0cde2b28b07c4dba6797361f15c41c71a13b5623a17d9fa55eafd58
                                                                                                          • Instruction ID: ed627a0d6b8006121c6ebccc69efd8c175c6c21c35157757b8f0450d772b36cc
                                                                                                          • Opcode Fuzzy Hash: d12e8a3fc0cde2b28b07c4dba6797361f15c41c71a13b5623a17d9fa55eafd58
                                                                                                          • Instruction Fuzzy Hash: B6F0B430182B044FDF318A289508B9177E89B11721F0487AED0FA436D0D361684A8B10
                                                                                                          APIs
                                                                                                            • Part of subcall function 00B912E7: GetDlgItem.USER32(00000000,00003021), ref: 00B9132B
                                                                                                            • Part of subcall function 00B912E7: SetWindowTextW.USER32(00000000,00BC02E4), ref: 00B91341
                                                                                                          • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00BAA5C8
                                                                                                          • EndDialog.USER32(?,00000006), ref: 00BAA5DB
                                                                                                          • GetDlgItem.USER32(?,0000006C), ref: 00BAA5F7
                                                                                                          • SetFocus.USER32(00000000), ref: 00BAA5FE
                                                                                                          • SetDlgItemTextW.USER32(?,00000065,?), ref: 00BAA63E
                                                                                                          • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00BAA671
                                                                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00BAA687
                                                                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00BAA6A5
                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00BAA6B5
                                                                                                          • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00BAA6D2
                                                                                                          • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00BAA6F0
                                                                                                            • Part of subcall function 00B9D142: LoadStringW.USER32(?,?,00000200,?), ref: 00B9D187
                                                                                                            • Part of subcall function 00B9D142: LoadStringW.USER32(?,?,00000200,?), ref: 00B9D19D
                                                                                                          • _swprintf.LIBCMT ref: 00BAA720
                                                                                                            • Part of subcall function 00B93F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B93F6E
                                                                                                          • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00BAA733
                                                                                                          • FindClose.KERNEL32(00000000), ref: 00BAA736
                                                                                                          • _swprintf.LIBCMT ref: 00BAA791
                                                                                                          • SetDlgItemTextW.USER32(?,00000068,?), ref: 00BAA7A4
                                                                                                          • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00BAA7BA
                                                                                                          • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 00BAA7DA
                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00BAA7EA
                                                                                                          • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00BAA804
                                                                                                          • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00BAA81C
                                                                                                          • _swprintf.LIBCMT ref: 00BAA84D
                                                                                                          • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00BAA860
                                                                                                          • _swprintf.LIBCMT ref: 00BAA8B0
                                                                                                          • SetDlgItemTextW.USER32(?,00000069,?), ref: 00BAA8C3
                                                                                                            • Part of subcall function 00BA932F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00BA9355
                                                                                                            • Part of subcall function 00BA932F: GetNumberFormatW.KERNEL32(00000400,00000000,?,00BCA154,?,?), ref: 00BA93A4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLoadLocalStringSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                                                                          • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                                                                          • API String ID: 3227067027-1840816070
                                                                                                          • Opcode ID: 5f64ed4be66ed5fc4f8483cce08bdde95d4da84a462d14b5bf4fef7b6ab58966
                                                                                                          • Instruction ID: 1a54a45df68c390a0729d6f273cd371e018e510a11d856d8da2c523d8c5f3f2f
                                                                                                          • Opcode Fuzzy Hash: 5f64ed4be66ed5fc4f8483cce08bdde95d4da84a462d14b5bf4fef7b6ab58966
                                                                                                          • Instruction Fuzzy Hash: 1C918172548348BBD621DBA0CC89FFB77ECEB8A704F044859B645D6081DB75AA05CB73
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B97075
                                                                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 00B971D5
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00B971E5
                                                                                                            • Part of subcall function 00B97A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 00B97AAC
                                                                                                            • Part of subcall function 00B97A9D: GetLastError.KERNEL32 ref: 00B97AF2
                                                                                                            • Part of subcall function 00B97A9D: CloseHandle.KERNEL32(?), ref: 00B97B01
                                                                                                          • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 00B971F0
                                                                                                          • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00B972FE
                                                                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 00B9732A
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00B9733C
                                                                                                          • GetLastError.KERNEL32(00000015,00000000,?), ref: 00B9734C
                                                                                                          • RemoveDirectoryW.KERNEL32(?), ref: 00B97398
                                                                                                          • DeleteFileW.KERNEL32(?), ref: 00B973C0
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
                                                                                                          • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                                          • API String ID: 3935142422-3508440684
                                                                                                          • Opcode ID: e193c7efd31d972590c6ce7b0bf6222bc8ee6a1f3cdf846ea1ea8715c81b3bf8
                                                                                                          • Instruction ID: 3e1f68ba4cb02351f78605b7c02335de9296ad23e5ae1482faad7e14ccd2fd1b
                                                                                                          • Opcode Fuzzy Hash: e193c7efd31d972590c6ce7b0bf6222bc8ee6a1f3cdf846ea1ea8715c81b3bf8
                                                                                                          • Instruction Fuzzy Hash: A1B19D71954218ABDF21EF64CC85BEE77F8EF08700F1444A9F919E7242DB70AA45CB61
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog_memcmp
                                                                                                          • String ID: CMT$h%u$hc%u
                                                                                                          • API String ID: 3004599000-3282847064
                                                                                                          • Opcode ID: 190485f82e3bb74b2f4eb2297f5ab5b5fb6d31593ed5ce061e7892f42c53b75b
                                                                                                          • Instruction ID: d789fc7a4ec0aa3730c270271e8c1c29eeef45f62a927c23111b0d43f1d42b50
                                                                                                          • Opcode Fuzzy Hash: 190485f82e3bb74b2f4eb2297f5ab5b5fb6d31593ed5ce061e7892f42c53b75b
                                                                                                          • Instruction Fuzzy Hash: C5329F715142849FDF14DF64C896BEA3BE5EF55700F0844BDFD8A9B282DB70AA48CB60
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __floor_pentium4
                                                                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                          • API String ID: 4168288129-2761157908
                                                                                                          • Opcode ID: dd8225ed564c2fd7d6bedd6c308679530bf98e2eb08a5219949c4c638ad53d5f
                                                                                                          • Instruction ID: 75ae7660e672260ab8ef2263d1be1946bd439ce31c44372a2572bae4f8132553
                                                                                                          • Opcode Fuzzy Hash: dd8225ed564c2fd7d6bedd6c308679530bf98e2eb08a5219949c4c638ad53d5f
                                                                                                          • Instruction Fuzzy Hash: 2DC2F871E086288FDB25CE28DD80BEAB7F5EB54305F1541EAD44EE7240E7B5AE818F41
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B92775
                                                                                                          • _strlen.LIBCMT ref: 00B92CFF
                                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B92E56
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prologUnothrow_t@std@@@__ehfuncinfo$??2@_strlen
                                                                                                          • String ID: CMT
                                                                                                          • API String ID: 3741668355-2756464174
                                                                                                          • Opcode ID: ca355009069ddc18cf6a6a2b180989154c1223b9b0f480719e99e3aeae01e54e
                                                                                                          • Instruction ID: 2e3c89182a93a98c6e801ea9468a1a27cd6848e54441ba3092551f0399ed04d2
                                                                                                          • Opcode Fuzzy Hash: ca355009069ddc18cf6a6a2b180989154c1223b9b0f480719e99e3aeae01e54e
                                                                                                          • Instruction Fuzzy Hash: 5962E3719002849FDF28DF78C895BEA3BE1EF54304F0545BEEC9A9B282D7719949CB60
                                                                                                          APIs
                                                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00BB5C4B
                                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00BB5C55
                                                                                                          • UnhandledExceptionFilter.KERNEL32(-00000311,?,?,?,?,?,00000000), ref: 00BB5C62
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                          • String ID:
                                                                                                          • API String ID: 3906539128-0
                                                                                                          • Opcode ID: 8e7896514b262f85d66c33e9234052f77f2f0ebc70517f3dfea6108cf9ef8493
                                                                                                          • Instruction ID: 9ef32585cd511d7c3df27829dde47da03e31a142b221e8a74af1038aba23583c
                                                                                                          • Opcode Fuzzy Hash: 8e7896514b262f85d66c33e9234052f77f2f0ebc70517f3dfea6108cf9ef8493
                                                                                                          • Instruction Fuzzy Hash: B031B274911228ABCB21DF64D989BDDBBF8EF18310F5041DAE40DA7250EB709B818F45
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: adb73a532f26a33538fd5fb2ed24ee19948087a43571b45bda065bffbee46b1a
                                                                                                          • Instruction ID: 7fcc79f5069f0badaa8df33573cdee67ec683b9876de4373de4dd5f0032ada75
                                                                                                          • Opcode Fuzzy Hash: adb73a532f26a33538fd5fb2ed24ee19948087a43571b45bda065bffbee46b1a
                                                                                                          • Instruction Fuzzy Hash: A0021C71E002199FDF14DFA9C8806EDBBF1EF48324F2581AAD919E7240D771AE41CB95
                                                                                                          APIs
                                                                                                          • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00BA9355
                                                                                                          • GetNumberFormatW.KERNEL32(00000400,00000000,?,00BCA154,?,?), ref: 00BA93A4
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FormatInfoLocaleNumber
                                                                                                          • String ID:
                                                                                                          • API String ID: 2169056816-0
                                                                                                          • Opcode ID: df63f0998eda9e3bc47cde8ada63585e07c2647ee0d07972cb3fa8167fe90190
                                                                                                          • Instruction ID: 19d7ccb6ab761f4a305baaa10eb786332e7068c4c7231a2a498d96df7aa20b1f
                                                                                                          • Opcode Fuzzy Hash: df63f0998eda9e3bc47cde8ada63585e07c2647ee0d07972cb3fa8167fe90190
                                                                                                          • Instruction Fuzzy Hash: 76017135500349ABDB10DFA5DC45FAB77FCEF09710F005462BA08E7161D7709915CBA6
                                                                                                          APIs
                                                                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00BBE8CF,?,?,00000008,?,?,00BBE56F,00000000), ref: 00BBEB01
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionRaise
                                                                                                          • String ID:
                                                                                                          • API String ID: 3997070919-0
                                                                                                          • Opcode ID: 9f02a094aa3460d0ef0d268fa21b8945d350699606cae7a4288ed202cef6a6e3
                                                                                                          • Instruction ID: 6bbb29511ca2098c97b4ab3314588623e994a48e7be6f0d1d03b90d56da3b010
                                                                                                          • Opcode Fuzzy Hash: 9f02a094aa3460d0ef0d268fa21b8945d350699606cae7a4288ed202cef6a6e3
                                                                                                          • Instruction Fuzzy Hash: 96B1F8316106089FD725CF28C4CABE57BE1FF45365F258698E8AACF2A1C375E991CB40
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: gj
                                                                                                          • API String ID: 0-4203073231
                                                                                                          • Opcode ID: 1f04fcc904ddadf17013e34a023f571e7a0bed55d094b295d39d32f006734316
                                                                                                          • Instruction ID: 8a0a6b046c184908f60109343827aae5f1847052f3784eb5c4ca98ecc578a414
                                                                                                          • Opcode Fuzzy Hash: 1f04fcc904ddadf17013e34a023f571e7a0bed55d094b295d39d32f006734316
                                                                                                          • Instruction Fuzzy Hash: 38F1C2B1A083818FD748CF29D880A1AFBE1BFCC208F19896EF598D7711D734E9558B56
                                                                                                          APIs
                                                                                                          • GetVersionExW.KERNEL32(?), ref: 00B9A905
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Version
                                                                                                          • String ID:
                                                                                                          • API String ID: 1889659487-0
                                                                                                          • Opcode ID: 9e1e740d53b1a494cccaf3c8b2420df884eca7994de92225778658165c0d99a5
                                                                                                          • Instruction ID: 174234b01601acef568b981464eb478b168491a699ad42a50102ca12355b3a35
                                                                                                          • Opcode Fuzzy Hash: 9e1e740d53b1a494cccaf3c8b2420df884eca7994de92225778658165c0d99a5
                                                                                                          • Instruction Fuzzy Hash: 81F01DB4D0021C8BCB28DF58EC82AE577B5F75D314F2142E5D91993390DA70AD808E92
                                                                                                          APIs
                                                                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0001DBCF,00BAD604), ref: 00BADBC8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterUnhandled
                                                                                                          • String ID:
                                                                                                          • API String ID: 3192549508-0
                                                                                                          • Opcode ID: 573fe7933f91a2785b4eaea199a2810e717d7d1c3bee47d8cae4c6df6bfe52d9
                                                                                                          • Instruction ID: b0141f7e115daa4a00ca301c34d6a3af5ad24a64b0d381c3a94a29343273b687
                                                                                                          • Opcode Fuzzy Hash: 573fe7933f91a2785b4eaea199a2810e717d7d1c3bee47d8cae4c6df6bfe52d9
                                                                                                          • Instruction Fuzzy Hash:
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HeapProcess
                                                                                                          • String ID:
                                                                                                          • API String ID: 54951025-0
                                                                                                          • Opcode ID: c8ac48db03c43669fa6fc585e892dd3804b168981116f1b2ca78d9688fbfc676
                                                                                                          • Instruction ID: c632ef41cb19a733cdb78a322886010bae84799ab9c3ac21b2f00176bb955faa
                                                                                                          • Opcode Fuzzy Hash: c8ac48db03c43669fa6fc585e892dd3804b168981116f1b2ca78d9688fbfc676
                                                                                                          • Instruction Fuzzy Hash: 8DA02230202280CFA3008F32AF0BB0E3AE8FA0A3C0B0A802CB008CB230EF3080008B00
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: f76edbdb3f4a612c21f71557bb68a806c2ac5dff8f8e7f0331655fa6002ea0a3
                                                                                                          • Instruction ID: f22c5a30eb272f7fe488b87f7cba5e489238733e9c33801e9fdbb3ec5bd55fa4
                                                                                                          • Opcode Fuzzy Hash: f76edbdb3f4a612c21f71557bb68a806c2ac5dff8f8e7f0331655fa6002ea0a3
                                                                                                          • Instruction Fuzzy Hash: 1662F771608B859FCB35CF38C8906B9B7E1AF96304F0485AED99B8F346D634AA45CB50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 90a98d7e6f2e54dcba7a323e5310e852aff7c38bf50c3d5cf95a57ea582718e0
                                                                                                          • Instruction ID: 6bc0c76e6731be7162c6cf4a288f3ac30bc3df99ac960fd431816c46c4b06c1d
                                                                                                          • Opcode Fuzzy Hash: 90a98d7e6f2e54dcba7a323e5310e852aff7c38bf50c3d5cf95a57ea582718e0
                                                                                                          • Instruction Fuzzy Hash: 2D6216B160878A9FC719CF28C8905B9FBE0FF56304F1886AED99687742D730E955CB80
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: c11df8756d099823b9e38222dbb77727418297263203a366b416988efb5d9dfb
                                                                                                          • Instruction ID: b4a880a5954cb0de2555b7fd2d277b53b98efa0b9bfa2299e21d84a4a1d3b3cb
                                                                                                          • Opcode Fuzzy Hash: c11df8756d099823b9e38222dbb77727418297263203a366b416988efb5d9dfb
                                                                                                          • Instruction Fuzzy Hash: 195248B26087019FC758CF18C891A6AF7E1FFC8304F49892DF5969B255D734E9198B82
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b471490386e01567d942545501849e18891268d8950023b21fc8d8fbbf457e22
                                                                                                          • Instruction ID: 265e83487c575bee132073c7882861f3756c2e032443ec5d15dcbeaf996fd9a9
                                                                                                          • Opcode Fuzzy Hash: b471490386e01567d942545501849e18891268d8950023b21fc8d8fbbf457e22
                                                                                                          • Instruction Fuzzy Hash: 6712F3B1608B068FCB28CF28C8D06B9B3E1FF55308F14896EE597C7A81D774A995CB45
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 899b573bcf301bda9b02d48786797bbbbdd91131a4e88251f2a5a4af03abb674
                                                                                                          • Instruction ID: acd6398f2aed0e9b8f4afa18950ba5dafd2fbac959f130637db0b901d8244982
                                                                                                          • Opcode Fuzzy Hash: 899b573bcf301bda9b02d48786797bbbbdd91131a4e88251f2a5a4af03abb674
                                                                                                          • Instruction Fuzzy Hash: 9EF18971A083458FCB14CF29D684A6EBBE6FFC9714F144AAEF48687355DB30E9058B42
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                          • Instruction ID: f5fa27e3ff7ae68b2f249b6cf36696f4fe3f3560c9ccb44cf489a5c0874dc623
                                                                                                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                          • Instruction Fuzzy Hash: 6CC1703620D1930ADB2D46B985741BEBAE19E937B131A07BDE4B6CB1D4FF24C524D620
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                          • Instruction ID: deb09ba27cd3ae7b7fdc73ade5508bf4a64801b0739a92a4542018a81991c97a
                                                                                                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                          • Instruction Fuzzy Hash: C6C1703620D1930ADB2D46BAC5741BEBAE19A937B131A07BDE4B6CB0D5FF24C524D620
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                                          • Instruction ID: 3549bd16b215dd8bf6357e026e206f51fc02b22603002a56dd43c8af98a959ce
                                                                                                          • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                                          • Instruction Fuzzy Hash: 13C1613620D1930ADF2D46B985741BEBEE19AA37B131A07BDE4B6CB1D4FF24C524D620
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                          • Instruction ID: a03094f28e50b74507575595a6c805c76c3249071bd0577c72cc73203541b3ed
                                                                                                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                          • Instruction Fuzzy Hash: 27C1803620D1930ADB6D46B9C5741BEBEE19AA37B131A07FDE4B6CB0C5FF24C5249620
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b92ff28e4cebaa411b92f0e0e73da0948b5213712e2dd6e480a0a53730ac5a01
                                                                                                          • Instruction ID: 81cafc4bff54a19b5a9b57db2bf5a6714971de95f92eb5cbdb5b9dda8f3580b1
                                                                                                          • Opcode Fuzzy Hash: b92ff28e4cebaa411b92f0e0e73da0948b5213712e2dd6e480a0a53730ac5a01
                                                                                                          • Instruction Fuzzy Hash: 36E146755193808FC344CF29D89096ABBF0EFCA300F8949AEF5D597362C634EA55CB62
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 258a2619ca224506e2ce8481b4959e2ad5c6699b1b0424d45743f46b69a4843c
                                                                                                          • Instruction ID: 8169b4744329da3ba39919ee0a58b766e1482e9910a15b63458385ab5138cdf5
                                                                                                          • Opcode Fuzzy Hash: 258a2619ca224506e2ce8481b4959e2ad5c6699b1b0424d45743f46b69a4843c
                                                                                                          • Instruction Fuzzy Hash: C79157B02087458FDB24EF68D8D5BBE73D5EB52300F1009ADF59687382DBB5A644C792
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 9750684155aaa232ee1bb644d01dd073fa678e0e9f3ffb48d24baa3bfbc59ad8
                                                                                                          • Instruction ID: 61ad58cb5b991e9aefb1798567f52fbc006015ad2482d9923d3195f7cff6920c
                                                                                                          • Opcode Fuzzy Hash: 9750684155aaa232ee1bb644d01dd073fa678e0e9f3ffb48d24baa3bfbc59ad8
                                                                                                          • Instruction Fuzzy Hash: 5261987160070867DE385F288896BFF37D4EF16740F2409E9E882DB291DAD5ED868356
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 9ea23a0b5be8d720a81cc3f877502472f5d544f68c9a06fa8112536a0a6d4999
                                                                                                          • Instruction ID: 0111a4dad114d723e81b41bb99ba189d9fd405a4ccbfa9a63d016474c7185311
                                                                                                          • Opcode Fuzzy Hash: 9ea23a0b5be8d720a81cc3f877502472f5d544f68c9a06fa8112536a0a6d4999
                                                                                                          • Instruction Fuzzy Hash: B771257070C3455BDF24DF68C8D4BAD77D1EB93B04F0009BDF9868B282DA749A858756
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 64440d81506276fd736a2176fb08f7aefe94178c61f91618577dd8806ed2241b
                                                                                                          • Instruction ID: dd2c46edd3964a2b8a567844f4bb289b50378886c5a979f995ba183cb07be2ed
                                                                                                          • Opcode Fuzzy Hash: 64440d81506276fd736a2176fb08f7aefe94178c61f91618577dd8806ed2241b
                                                                                                          • Instruction Fuzzy Hash: 9181799221A2E4AEC7065F3E38E42B57FA19777341F1C44FBD4C5872A3D8368658D722
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6af173fddd2911dc92c51a452754cdb3e0d665afc6fc910b4470e20e2ad5b15f
                                                                                                          • Instruction ID: 4d050339adfee350140d87d7358c7d0833b6c0fceced2fe6747244aebe14db05
                                                                                                          • Opcode Fuzzy Hash: 6af173fddd2911dc92c51a452754cdb3e0d665afc6fc910b4470e20e2ad5b15f
                                                                                                          • Instruction Fuzzy Hash: 3C51A17150C3958ECB12CF2A81805AEBFF1EE9A314F5A48EEE4E54B252D131D689CB52
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 479a5afa1e86b5198811b5ea4fcc8e29855258fc2d3607bcc4a6a1478ace49cb
                                                                                                          • Instruction ID: b96f183aadb40454c935c333d3c43fa6aad6522c6404cf9f8cf38363247cff0a
                                                                                                          • Opcode Fuzzy Hash: 479a5afa1e86b5198811b5ea4fcc8e29855258fc2d3607bcc4a6a1478ace49cb
                                                                                                          • Instruction Fuzzy Hash: 8F512571A083028FC748CF19D48059AF7E1FF88314F058A2EE899A7740DB34EA59CB96
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 03d8200d211fb2155360bb18f1da6528e951efe338ec765a37701bdcb59cc893
                                                                                                          • Instruction ID: cd6f93c532e4a0d6299a5488aae34e7415fa8f297ae01dd49b943774e70c1c38
                                                                                                          • Opcode Fuzzy Hash: 03d8200d211fb2155360bb18f1da6528e951efe338ec765a37701bdcb59cc893
                                                                                                          • Instruction Fuzzy Hash: 0B3104B16087498FCB14DF28C85126EBBE0FB96700F40896DE4DAD7741D778E909CBA2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 41047f3c64880d302e25f698767705e05818bb38e51a803858510868a3b0e98c
                                                                                                          • Instruction ID: 77fd1b9b4a6c0010105dbbeb40e9fe9dff86b7aac2f98c7418e640b4f6cb3663
                                                                                                          • Opcode Fuzzy Hash: 41047f3c64880d302e25f698767705e05818bb38e51a803858510868a3b0e98c
                                                                                                          • Instruction Fuzzy Hash: 6B21DD32B205655BCF18CF2DEC95C3A7795D78E301786817BE9468B2D0CA35ED25C7A0
                                                                                                          APIs
                                                                                                          • ___free_lconv_mon.LIBCMT ref: 00BB95D1
                                                                                                            • Part of subcall function 00BB916C: _free.LIBCMT ref: 00BB9189
                                                                                                            • Part of subcall function 00BB916C: _free.LIBCMT ref: 00BB919B
                                                                                                            • Part of subcall function 00BB916C: _free.LIBCMT ref: 00BB91AD
                                                                                                            • Part of subcall function 00BB916C: _free.LIBCMT ref: 00BB91BF
                                                                                                            • Part of subcall function 00BB916C: _free.LIBCMT ref: 00BB91D1
                                                                                                            • Part of subcall function 00BB916C: _free.LIBCMT ref: 00BB91E3
                                                                                                            • Part of subcall function 00BB916C: _free.LIBCMT ref: 00BB91F5
                                                                                                            • Part of subcall function 00BB916C: _free.LIBCMT ref: 00BB9207
                                                                                                            • Part of subcall function 00BB916C: _free.LIBCMT ref: 00BB9219
                                                                                                            • Part of subcall function 00BB916C: _free.LIBCMT ref: 00BB922B
                                                                                                            • Part of subcall function 00BB916C: _free.LIBCMT ref: 00BB923D
                                                                                                            • Part of subcall function 00BB916C: _free.LIBCMT ref: 00BB924F
                                                                                                            • Part of subcall function 00BB916C: _free.LIBCMT ref: 00BB9261
                                                                                                          • _free.LIBCMT ref: 00BB95C6
                                                                                                            • Part of subcall function 00BB59C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00BB9301,?,00000000,?,00000000,?,00BB9328,?,00000007,?,?,00BB9725,?), ref: 00BB59D8
                                                                                                            • Part of subcall function 00BB59C2: GetLastError.KERNEL32(?,?,00BB9301,?,00000000,?,00000000,?,00BB9328,?,00000007,?,?,00BB9725,?,?), ref: 00BB59EA
                                                                                                          • _free.LIBCMT ref: 00BB95E8
                                                                                                          • _free.LIBCMT ref: 00BB95FD
                                                                                                          • _free.LIBCMT ref: 00BB9608
                                                                                                          • _free.LIBCMT ref: 00BB962A
                                                                                                          • _free.LIBCMT ref: 00BB963D
                                                                                                          • _free.LIBCMT ref: 00BB964B
                                                                                                          • _free.LIBCMT ref: 00BB9656
                                                                                                          • _free.LIBCMT ref: 00BB968E
                                                                                                          • _free.LIBCMT ref: 00BB9695
                                                                                                          • _free.LIBCMT ref: 00BB96B2
                                                                                                          • _free.LIBCMT ref: 00BB96CA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                          • String ID:
                                                                                                          • API String ID: 161543041-0
                                                                                                          • Opcode ID: aa5414f5b4c7c6bcb7c2668ea848c9de7772564def3b2d19f98394fb04103c7b
                                                                                                          • Instruction ID: 1acd770110187bed38e761b08060f8558383830a1c4ed8d0df61f61bf0c16d4c
                                                                                                          • Opcode Fuzzy Hash: aa5414f5b4c7c6bcb7c2668ea848c9de7772564def3b2d19f98394fb04103c7b
                                                                                                          • Instruction Fuzzy Hash: CD311871604705EFEF31AB79D845BEA77E9EF00320F2084A9E59AD7151DEF5AC808B11
                                                                                                          APIs
                                                                                                          • GetWindow.USER32(?,00000005), ref: 00BAB8DD
                                                                                                          • GetClassNameW.USER32(00000000,?,00000800), ref: 00BAB90C
                                                                                                            • Part of subcall function 00BA0B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00B9AC49,?,?,?,00B9ABF8,?,-00000002,?,00000000,?), ref: 00BA0B28
                                                                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00BAB92A
                                                                                                          • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00BAB941
                                                                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 00BAB954
                                                                                                            • Part of subcall function 00BA8B22: GetDC.USER32(00000000), ref: 00BA8B2E
                                                                                                            • Part of subcall function 00BA8B22: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00BA8B3D
                                                                                                            • Part of subcall function 00BA8B22: ReleaseDC.USER32(00000000,00000000), ref: 00BA8B4B
                                                                                                            • Part of subcall function 00BA8ADF: GetDC.USER32(00000000), ref: 00BA8AEB
                                                                                                            • Part of subcall function 00BA8ADF: GetDeviceCaps.GDI32(00000000,00000058), ref: 00BA8AFA
                                                                                                            • Part of subcall function 00BA8ADF: ReleaseDC.USER32(00000000,00000000), ref: 00BA8B08
                                                                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00BAB97B
                                                                                                          • DeleteObject.GDI32(00000000), ref: 00BAB982
                                                                                                          • GetWindow.USER32(00000000,00000002), ref: 00BAB98B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$CapsDeviceMessageObjectReleaseSend$ClassCompareDeleteLongNameString
                                                                                                          • String ID: STATIC
                                                                                                          • API String ID: 1444658586-1882779555
                                                                                                          • Opcode ID: 0226abdfe4741f93b60bec6cd12474291ef4c5922c5574ca0a1660c6ce3faa3e
                                                                                                          • Instruction ID: ead5aa7e91ed5355777f1bd5626249d41703dbedc518af07fa29accd9e205d1f
                                                                                                          • Opcode Fuzzy Hash: 0226abdfe4741f93b60bec6cd12474291ef4c5922c5574ca0a1660c6ce3faa3e
                                                                                                          • Instruction Fuzzy Hash: 8A21D5726482187BEB216B64DC4AFAF7AACEF0A715F004191FA11A6092CF744D4296B6
                                                                                                          APIs
                                                                                                          • _free.LIBCMT ref: 00BB623F
                                                                                                            • Part of subcall function 00BB59C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00BB9301,?,00000000,?,00000000,?,00BB9328,?,00000007,?,?,00BB9725,?), ref: 00BB59D8
                                                                                                            • Part of subcall function 00BB59C2: GetLastError.KERNEL32(?,?,00BB9301,?,00000000,?,00000000,?,00BB9328,?,00000007,?,?,00BB9725,?,?), ref: 00BB59EA
                                                                                                          • _free.LIBCMT ref: 00BB624B
                                                                                                          • _free.LIBCMT ref: 00BB6256
                                                                                                          • _free.LIBCMT ref: 00BB6261
                                                                                                          • _free.LIBCMT ref: 00BB626C
                                                                                                          • _free.LIBCMT ref: 00BB6277
                                                                                                          • _free.LIBCMT ref: 00BB6282
                                                                                                          • _free.LIBCMT ref: 00BB628D
                                                                                                          • _free.LIBCMT ref: 00BB6298
                                                                                                          • _free.LIBCMT ref: 00BB62A6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 776569668-0
                                                                                                          • Opcode ID: 0dd97291be8b87d4b8a898081f42f9be1089059ac49fadace10879f8f8958f78
                                                                                                          • Instruction ID: 334fa6967fecddfc44f2cab254b523ecdd436fe4011fb366e581ca8d0156390e
                                                                                                          • Opcode Fuzzy Hash: 0dd97291be8b87d4b8a898081f42f9be1089059ac49fadace10879f8f8958f78
                                                                                                          • Instruction Fuzzy Hash: DA117476610608EFCF11EF59C842DE93BA5FF04360B5145E5BAC88F222DAB1EE509B81
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ;%u$x%u$xc%u
                                                                                                          • API String ID: 0-2277559157
                                                                                                          • Opcode ID: ca2aff96353e507b9be7ed3297c0e3127b1e4587cf99c99640da9345276694fe
                                                                                                          • Instruction ID: 81c934e5ade02435a1930d2f4fe69dcf1ad19199df738e0a85906b409173e303
                                                                                                          • Opcode Fuzzy Hash: ca2aff96353e507b9be7ed3297c0e3127b1e4587cf99c99640da9345276694fe
                                                                                                          • Instruction Fuzzy Hash: 9AF12A71A083406BDF15EB648895BFE7BDA9F95300F0845F9F885AB283C7249C44C762
                                                                                                          APIs
                                                                                                            • Part of subcall function 00B912E7: GetDlgItem.USER32(00000000,00003021), ref: 00B9132B
                                                                                                            • Part of subcall function 00B912E7: SetWindowTextW.USER32(00000000,00BC02E4), ref: 00B91341
                                                                                                          • EndDialog.USER32(?,00000001), ref: 00BA99AF
                                                                                                          • SendMessageW.USER32(?,00000080,00000001,?), ref: 00BA99DC
                                                                                                          • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00BA99F1
                                                                                                          • SetWindowTextW.USER32(?,?), ref: 00BA9A02
                                                                                                          • GetDlgItem.USER32(?,00000065), ref: 00BA9A0B
                                                                                                          • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00BA9A1F
                                                                                                          • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00BA9A31
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Item$TextWindow$Dialog
                                                                                                          • String ID: LICENSEDLG
                                                                                                          • API String ID: 3214253823-2177901306
                                                                                                          • Opcode ID: 6b63cddc9a1c89d0207f746c16032365feee81a374b661c0a68a08dffd2fd4b5
                                                                                                          • Instruction ID: 0b0242ca68f3eb7162f6182e15685da6673e3aacdd67826db21b60b1a4bcf582
                                                                                                          • Opcode Fuzzy Hash: 6b63cddc9a1c89d0207f746c16032365feee81a374b661c0a68a08dffd2fd4b5
                                                                                                          • Instruction Fuzzy Hash: 16212B322082087FE6116B65DD89F7B7BEDEB4BB85F000059F604A75A1CF669C01E772
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B99232
                                                                                                          • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00B99255
                                                                                                          • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00B99274
                                                                                                            • Part of subcall function 00BA0B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00B9AC49,?,?,?,00B9ABF8,?,-00000002,?,00000000,?), ref: 00BA0B28
                                                                                                          • _swprintf.LIBCMT ref: 00B99310
                                                                                                            • Part of subcall function 00B93F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B93F6E
                                                                                                          • MoveFileW.KERNEL32(?,?), ref: 00B99385
                                                                                                          • MoveFileW.KERNEL32(?,?), ref: 00B993C1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
                                                                                                          • String ID: rtmp%d
                                                                                                          • API String ID: 2111052971-3303766350
                                                                                                          • Opcode ID: 4e6a5079f9b1e30f5cbcf4bfdf1d49fa04559fb6ead0d83c9e8b12827c787a52
                                                                                                          • Instruction ID: 22caa9747f3e153ead9da22755dcd3edc42bb041d4b0bbb3e01aa0e6a472663c
                                                                                                          • Opcode Fuzzy Hash: 4e6a5079f9b1e30f5cbcf4bfdf1d49fa04559fb6ead0d83c9e8b12827c787a52
                                                                                                          • Instruction Fuzzy Hash: 40416C71915259A7DF61BFA88D85EEE77FCAF45340F0040F9A505A3142EA309B458B64
                                                                                                          APIs
                                                                                                          • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,?,?,?,00BA8705,?), ref: 00BA7FBA
                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000003,00000000,00000000), ref: 00BA7FDB
                                                                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,00000000), ref: 00BA8002
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$AllocByteCharCreateMultiStreamWide
                                                                                                          • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                                                          • API String ID: 4094277203-4209811716
                                                                                                          • Opcode ID: 425d4b098ced664de0f4feb71233522478dcf584a92bea54020ce1338d5be933
                                                                                                          • Instruction ID: 8c0196b3e21b858c4d39e9d3744d3eb393e37f60f286c0b7b75c385f383b739d
                                                                                                          • Opcode Fuzzy Hash: 425d4b098ced664de0f4feb71233522478dcf584a92bea54020ce1338d5be933
                                                                                                          • Instruction Fuzzy Hash: 5131203204C3567FE325AB249C06FABB7D8EF53320F14458EF511A61C2EFB1990883A6
                                                                                                          APIs
                                                                                                          • GetTickCount.KERNEL32 ref: 00BA7DAF
                                                                                                          • GetTickCount.KERNEL32 ref: 00BA7DCD
                                                                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00BA7DE3
                                                                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BA7DF7
                                                                                                          • TranslateMessage.USER32(?), ref: 00BA7E02
                                                                                                          • DispatchMessageW.USER32(?), ref: 00BA7E0D
                                                                                                          • ShowWindow.USER32(?,00000005,?,00000000,?,?,?,?,00000000,00000000,00000000,<html>,00000006), ref: 00BA7EBD
                                                                                                          • SetWindowTextW.USER32(?,00000000), ref: 00BA7EC7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Message$CountTickWindow$DispatchPeekShowTextTranslate
                                                                                                          • String ID:
                                                                                                          • API String ID: 4150546248-0
                                                                                                          • Opcode ID: 6ff8ff32e9bb6cb7f417fc03427f11be96328a0dfcb2b5d617b6e57e9a176330
                                                                                                          • Instruction ID: 66c9206927ee54f92f19a52b07d19aaa42212983a59ef38038eacfa915dae0fb
                                                                                                          • Opcode Fuzzy Hash: 6ff8ff32e9bb6cb7f417fc03427f11be96328a0dfcb2b5d617b6e57e9a176330
                                                                                                          • Instruction Fuzzy Hash: 2641F37124C306AFDA149F65DC88D2BBBEDEB9A704B0008ADB546C7261DB61EC458B62
                                                                                                          APIs
                                                                                                          • __aulldiv.LIBCMT ref: 00B9FE33
                                                                                                            • Part of subcall function 00B9A8E0: GetVersionExW.KERNEL32(?), ref: 00B9A905
                                                                                                          • FileTimeToLocalFileTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 00B9FE5C
                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 00B9FE6E
                                                                                                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00B9FE7B
                                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B9FE91
                                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B9FE9D
                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B9FED3
                                                                                                          • __aullrem.LIBCMT ref: 00B9FF5D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                                                          • String ID:
                                                                                                          • API String ID: 1247370737-0
                                                                                                          • Opcode ID: 491d390167b22157e326b30b761ab42e1a1b61471f06bd65e45bcc8663a9a15f
                                                                                                          • Instruction ID: 2b15f45b0b9e811c7e6fdd34015a65085b89b6fe7b6714c551f527935108f818
                                                                                                          • Opcode Fuzzy Hash: 491d390167b22157e326b30b761ab42e1a1b61471f06bd65e45bcc8663a9a15f
                                                                                                          • Instruction Fuzzy Hash: 674117B240830A9FC710DF65C880AABFBF8FB88754F044A2EF596D2650E735E548DB52
                                                                                                          APIs
                                                                                                          • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00BBCCE2,00000000,00000000,00000000,00000000,00000000,00BB2C4E), ref: 00BBC5AF
                                                                                                          • __fassign.LIBCMT ref: 00BBC62A
                                                                                                          • __fassign.LIBCMT ref: 00BBC645
                                                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00BBC66B
                                                                                                          • WriteFile.KERNEL32(?,00000000,00000000,00BBCCE2,00000000,?,?,?,?,?,?,?,?,?,00BBCCE2,00000000), ref: 00BBC68A
                                                                                                          • WriteFile.KERNEL32(?,00000000,00000001,00BBCCE2,00000000,?,?,?,?,?,?,?,?,?,00BBCCE2,00000000), ref: 00BBC6C3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                          • String ID:
                                                                                                          • API String ID: 1324828854-0
                                                                                                          • Opcode ID: d2e50c77c8757f9126003ee101e040aa36f557601df3affd41f73e928b45b629
                                                                                                          • Instruction ID: 303eb37f7e5ba56a473590fb9eb4f23dbb9bf9758123b074a53240a7a9c9662d
                                                                                                          • Opcode Fuzzy Hash: d2e50c77c8757f9126003ee101e040aa36f557601df3affd41f73e928b45b629
                                                                                                          • Instruction Fuzzy Hash: 3F5182719002499FCB10CFA8D885EFEBBF8EF19300F15419AE556E7251EB70A940CFA5
                                                                                                          APIs
                                                                                                          • GetTempPathW.KERNEL32(00000800,?), ref: 00BAB0EF
                                                                                                          • _swprintf.LIBCMT ref: 00BAB123
                                                                                                            • Part of subcall function 00B93F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B93F6E
                                                                                                          • SetDlgItemTextW.USER32(?,00000066,00BD3122), ref: 00BAB143
                                                                                                          • _wcschr.LIBVCRUNTIME ref: 00BAB176
                                                                                                          • EndDialog.USER32(?,00000001), ref: 00BAB257
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                                                                                                          • String ID: %s%s%u
                                                                                                          • API String ID: 2892007947-1360425832
                                                                                                          • Opcode ID: 8ad1a9c581934b974c55b58961fd3bfdbb226a09128768fc6b1a41e801269469
                                                                                                          • Instruction ID: c3ab4a4d8ee142970433f965958399ed3081d560fb1a650e1a84ac60bf294029
                                                                                                          • Opcode Fuzzy Hash: 8ad1a9c581934b974c55b58961fd3bfdbb226a09128768fc6b1a41e801269469
                                                                                                          • Instruction Fuzzy Hash: 22414B71914219AEEF25DB64DC85EEEB7F8EB09304F0040E6F519E7052EF709A848FA1
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _strlen$_swprintf_wcschr_wcsrchr
                                                                                                          • String ID: %08x
                                                                                                          • API String ID: 1593746830-3682738293
                                                                                                          • Opcode ID: 32baa6b381de3d249146957029edada4c9211ab0fadefb81e613a1dc00d496c0
                                                                                                          • Instruction ID: 0447c946d7c2b46b6156be453b72a7d95de76b71389df63d144bf8c4ef84ccf4
                                                                                                          • Opcode Fuzzy Hash: 32baa6b381de3d249146957029edada4c9211ab0fadefb81e613a1dc00d496c0
                                                                                                          • Instruction Fuzzy Hash: 7C41E433908355ABEB31EA24CC49EBB7BECEB85750F1405BAF948A7183D6749D04C2A1
                                                                                                          APIs
                                                                                                          • ShowWindow.USER32(?,00000000), ref: 00BA85B5
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00BA85DA
                                                                                                          • ShowWindow.USER32(?,00000005,?), ref: 00BA8671
                                                                                                          • SetWindowTextW.USER32(?,00000000), ref: 00BA8679
                                                                                                          • ShowWindow.USER32(00000000,00000005), ref: 00BA868F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Show$RectText
                                                                                                          • String ID: RarHtmlClassName
                                                                                                          • API String ID: 3937224194-1658105358
                                                                                                          • Opcode ID: db18bc3d67f103af0238bc3b3130a8935998c93e06009b2aa06dacbf3847fbb6
                                                                                                          • Instruction ID: bcdb0c2001ed127cddf3868d3319fead3bcfd965e09dbe8a67d845ddbe8f5f6c
                                                                                                          • Opcode Fuzzy Hash: db18bc3d67f103af0238bc3b3130a8935998c93e06009b2aa06dacbf3847fbb6
                                                                                                          • Instruction Fuzzy Hash: B831AE32105308AFD721AF689D48F5FBBE9EB49705F044499FD09AA192DF70ED10CBA2
                                                                                                          APIs
                                                                                                            • Part of subcall function 00BB92D3: _free.LIBCMT ref: 00BB92FC
                                                                                                          • _free.LIBCMT ref: 00BB935D
                                                                                                            • Part of subcall function 00BB59C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00BB9301,?,00000000,?,00000000,?,00BB9328,?,00000007,?,?,00BB9725,?), ref: 00BB59D8
                                                                                                            • Part of subcall function 00BB59C2: GetLastError.KERNEL32(?,?,00BB9301,?,00000000,?,00000000,?,00BB9328,?,00000007,?,?,00BB9725,?,?), ref: 00BB59EA
                                                                                                          • _free.LIBCMT ref: 00BB9368
                                                                                                          • _free.LIBCMT ref: 00BB9373
                                                                                                          • _free.LIBCMT ref: 00BB93C7
                                                                                                          • _free.LIBCMT ref: 00BB93D2
                                                                                                          • _free.LIBCMT ref: 00BB93DD
                                                                                                          • _free.LIBCMT ref: 00BB93E8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 776569668-0
                                                                                                          • Opcode ID: 79ca16251da02bffb22ec5b04b3bd6bb15c96f5b654e5c829824a9962078a30e
                                                                                                          • Instruction ID: 2cf92c59b8d0d4f0342129eae20ca4455976dd62f8ddc86f7b56fc65425b8843
                                                                                                          • Opcode Fuzzy Hash: 79ca16251da02bffb22ec5b04b3bd6bb15c96f5b654e5c829824a9962078a30e
                                                                                                          • Instruction Fuzzy Hash: 4711F971E41B04FBDA30BBB0CC47FEB77DCAF04B14F804895B2D9A6092DAE5B9088651
                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32(?,?,00BB0C0B,00BAE662), ref: 00BB0C22
                                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00BB0C30
                                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00BB0C49
                                                                                                          • SetLastError.KERNEL32(00000000,?,00BB0C0B,00BAE662), ref: 00BB0C9B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                                          • String ID:
                                                                                                          • API String ID: 3852720340-0
                                                                                                          • Opcode ID: c03c71ea7ec03ab4b0432146a1d5883c406d3cb342ced851c394827eec6105fd
                                                                                                          • Instruction ID: 06d465d3079e096d2b807ef39abd956f865eccc3696c12618ef65decfc8c83ed
                                                                                                          • Opcode Fuzzy Hash: c03c71ea7ec03ab4b0432146a1d5883c406d3cb342ced851c394827eec6105fd
                                                                                                          • Instruction Fuzzy Hash: C401FC322697155FE72537B86C8ADFB2EC8EB053B9B7403AAF514620E1EFD18C005141
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                                          • API String ID: 0-1718035505
                                                                                                          • Opcode ID: ed699ff26d9e9c15dba2c21d99a5fa57461ed7f7ac2678fcabbf2a3f3cf4f29a
                                                                                                          • Instruction ID: 13d255d4993c9e6bb75d3fb24e8c67cab706a6e4dea594899727ca9c54496602
                                                                                                          • Opcode Fuzzy Hash: ed699ff26d9e9c15dba2c21d99a5fa57461ed7f7ac2678fcabbf2a3f3cf4f29a
                                                                                                          • Instruction Fuzzy Hash: 69012D7674A2219B4F201F745CC4AB62FC8FA0775132116FDE510E7151EB28D840A7E1
                                                                                                          APIs
                                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BA00AE
                                                                                                            • Part of subcall function 00B9A8E0: GetVersionExW.KERNEL32(?), ref: 00B9A905
                                                                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00BA00D0
                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00BA00EA
                                                                                                          • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00BA00FB
                                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BA010B
                                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BA0117
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Time$File$System$Local$SpecificVersion
                                                                                                          • String ID:
                                                                                                          • API String ID: 2092733347-0
                                                                                                          • Opcode ID: f08eb4d195b1e79b5bb3ac815ae2684a4d735a67c99b028d86c4709540d7965e
                                                                                                          • Instruction ID: 15146fffd1d9163673d206a8de453ebabfef6c982d7d0b7d088166510bb206ee
                                                                                                          • Opcode Fuzzy Hash: f08eb4d195b1e79b5bb3ac815ae2684a4d735a67c99b028d86c4709540d7965e
                                                                                                          • Instruction Fuzzy Hash: 4731D57A1183459BC700EFA5C98099BB7F8FF98704F04495EF999D3210EB30E549CB6A
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _memcmp
                                                                                                          • String ID:
                                                                                                          • API String ID: 2931989736-0
                                                                                                          • Opcode ID: 8eedca7ff06ac0600b9a2e9558804c1a14b9e0b4684b3cf6ec2b426b3e5b7a7e
                                                                                                          • Instruction ID: 86426c75da955b8cf8c21119a8dc52531dc71acc1ce51378daabaa00260776b1
                                                                                                          • Opcode Fuzzy Hash: 8eedca7ff06ac0600b9a2e9558804c1a14b9e0b4684b3cf6ec2b426b3e5b7a7e
                                                                                                          • Instruction Fuzzy Hash: 19213AB160C70AABD7449A14CCC1F7B77ECEF56758B1485A9FC089A503F730DD4546A0
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B9FB07
                                                                                                          • EnterCriticalSection.KERNEL32(00BD1E74,00000000,?,?,00B9A7C2,?,00B9C74B,?,00000000,?,00000001,?,?,?,00BA3AFF,?), ref: 00B9FB15
                                                                                                          • new.LIBCMT ref: 00B9FB35
                                                                                                          • new.LIBCMT ref: 00B9FB6B
                                                                                                          • LeaveCriticalSection.KERNEL32(00BD1E74,?,00B9A7C2,?,00B9C74B,?,00000000,?,00000001,?,?,?,00BA3AFF,?,00008000,?), ref: 00B9FB8B
                                                                                                          • LeaveCriticalSection.KERNEL32(00BD1E74,?,00B9A7C2,?,00B9C74B,?,00000000,?,00000001,?,?,?,00BA3AFF,?,00008000,?), ref: 00B9FB96
                                                                                                            • Part of subcall function 00B9F930: InitializeCriticalSection.KERNEL32(000001A0,00BD1E74,00000000,?,?,00B9FB88,00000020,?,00B9A7C2,?,00B9C74B,?,00000000,?,00000001,?), ref: 00B9F969
                                                                                                            • Part of subcall function 00B9F930: CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,00B9A7C2,?,00B9C74B,?,00000000,?,00000001,?,?,?,00BA3AFF), ref: 00B9F973
                                                                                                            • Part of subcall function 00B9F930: CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,00B9A7C2,?,00B9C74B,?,00000000,?,00000001,?,?,?,00BA3AFF), ref: 00B9F983
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$CreateLeave$EnterEventH_prologInitializeSemaphore
                                                                                                          • String ID:
                                                                                                          • API String ID: 3919453512-0
                                                                                                          • Opcode ID: 8e5232f7b50deaa9d190a2b8c998c0d908f541569e9c8e9a6815f8553c0d8889
                                                                                                          • Instruction ID: 9d4bf625ffb82997971f9f9dca373cae0424e224163fbd684557545af715d5fd
                                                                                                          • Opcode Fuzzy Hash: 8e5232f7b50deaa9d190a2b8c998c0d908f541569e9c8e9a6815f8553c0d8889
                                                                                                          • Instruction Fuzzy Hash: 0F117734A01212EBDB049F6CEC65B7DB7E4EB89764F0005BBF815D7290DFB08801DA51
                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32(?,00BCCBE8,00BB2674,00BCCBE8,?,?,00BB2213,?,?,00BCCBE8), ref: 00BB6323
                                                                                                          • _free.LIBCMT ref: 00BB6356
                                                                                                          • _free.LIBCMT ref: 00BB637E
                                                                                                          • SetLastError.KERNEL32(00000000,?,00BCCBE8), ref: 00BB638B
                                                                                                          • SetLastError.KERNEL32(00000000,?,00BCCBE8), ref: 00BB6397
                                                                                                          • _abort.LIBCMT ref: 00BB639D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$_free$_abort
                                                                                                          • String ID:
                                                                                                          • API String ID: 3160817290-0
                                                                                                          • Opcode ID: 9fdf1e77f5ec9e8ea006ddb218140b2c41ada9155184214f9c6cb2e5a56ff561
                                                                                                          • Instruction ID: 4c7e1ef5a0d092cde1a91dddd370730aff7ddbb155081830f3da7f076859fbf4
                                                                                                          • Opcode Fuzzy Hash: 9fdf1e77f5ec9e8ea006ddb218140b2c41ada9155184214f9c6cb2e5a56ff561
                                                                                                          • Instruction Fuzzy Hash: 63F0F432645A0067C7213B2D6C4AFFA23E9DBC1771B2501A4F524A3191EFE98C014266
                                                                                                          APIs
                                                                                                            • Part of subcall function 00B912E7: GetDlgItem.USER32(00000000,00003021), ref: 00B9132B
                                                                                                            • Part of subcall function 00B912E7: SetWindowTextW.USER32(00000000,00BC02E4), ref: 00B91341
                                                                                                          • EndDialog.USER32(?,00000001), ref: 00BAB86B
                                                                                                          • GetDlgItemTextW.USER32(?,00000066,00000800), ref: 00BAB881
                                                                                                          • SetDlgItemTextW.USER32(?,00000065,?), ref: 00BAB89B
                                                                                                          • SetDlgItemTextW.USER32(?,00000066), ref: 00BAB8A6
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemText$DialogWindow
                                                                                                          • String ID: RENAMEDLG
                                                                                                          • API String ID: 445417207-3299779563
                                                                                                          • Opcode ID: ec71849f8174edfa808842a6343e17bc7e98a0e7b774cc45ba6d3342e3c321a5
                                                                                                          • Instruction ID: f889377cb1e58a6797e0304ffb1292e3f49459ac578014739e4476da510cd097
                                                                                                          • Opcode Fuzzy Hash: ec71849f8174edfa808842a6343e17bc7e98a0e7b774cc45ba6d3342e3c321a5
                                                                                                          • Instruction Fuzzy Hash: 560128339482157AD1118F6D9E88F377BACEB8BF41F000459F214B70A2CB6AAC049772
                                                                                                          APIs
                                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00BB4A90,?,?,00BB4A30,?,00BC7F68,0000000C,00BB4B87,?,00000002), ref: 00BB4AFF
                                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00BB4B12
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00BB4A90,?,?,00BB4A30,?,00BC7F68,0000000C,00BB4B87,?,00000002,00000000), ref: 00BB4B35
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                                          • API String ID: 4061214504-1276376045
                                                                                                          • Opcode ID: e66111a4e8ed0ad65224d1f1b74c3746d3d75348c9f859a1233ec2c1d9efcf83
                                                                                                          • Instruction ID: 010527f67ba2edd842c3a295ee34ef9ea0544b01182fd3a7b244286741844b8c
                                                                                                          • Opcode Fuzzy Hash: e66111a4e8ed0ad65224d1f1b74c3746d3d75348c9f859a1233ec2c1d9efcf83
                                                                                                          • Instruction Fuzzy Hash: 93F03C30A14208EFCB15AF95DC49FAEBFF9EB48715F0001A9B905A7161DF748D40CA94
                                                                                                          APIs
                                                                                                            • Part of subcall function 00B9F309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B9F324
                                                                                                            • Part of subcall function 00B9F309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00B9DEC8,Crypt32.dll,?,00B9DF4A,?,00B9DF2E,?,?,?,?), ref: 00B9F346
                                                                                                          • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00B9DED4
                                                                                                          • GetProcAddress.KERNEL32(00BD1E58,CryptUnprotectMemory), ref: 00B9DEE4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                                                          • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                                                          • API String ID: 2141747552-1753850145
                                                                                                          • Opcode ID: da16555c23ee2f54c1489a3d503bf77b799d84f860c73ca0e83bfc12c31dce19
                                                                                                          • Instruction ID: 3922399356096e13caa87aaf897a7a77632fd93a2331c0c392434a4b53bcd450
                                                                                                          • Opcode Fuzzy Hash: da16555c23ee2f54c1489a3d503bf77b799d84f860c73ca0e83bfc12c31dce19
                                                                                                          • Instruction Fuzzy Hash: 07E01AB0514A47EADF406F759808F15BAD4BB55710F1486B9A054C3650DBB4D0A48B60
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free
                                                                                                          • String ID:
                                                                                                          • API String ID: 269201875-0
                                                                                                          • Opcode ID: 36d2df3e6061fa3130bd76bb4887a638adbbd89911bed9f18432b1eebc8366f6
                                                                                                          • Instruction ID: 2d9c74449c4ee4cdb37543f22ad645a8cd2d4ec9c858a62044226bd28dad2985
                                                                                                          • Opcode Fuzzy Hash: 36d2df3e6061fa3130bd76bb4887a638adbbd89911bed9f18432b1eebc8366f6
                                                                                                          • Instruction Fuzzy Hash: E041D272A006049FCB20DF78C891BAEB3F5EF89314F1545A9E556EB381DBB1AD01CB81
                                                                                                          APIs
                                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 00BB89B8
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BB89DB
                                                                                                            • Part of subcall function 00BB59FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,00BB23AA,?,0000015D,?,?,?,?,00BB2F29,000000FF,00000000,?,?), ref: 00BB5A2E
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00BB8A01
                                                                                                          • _free.LIBCMT ref: 00BB8A14
                                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BB8A23
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                          • String ID:
                                                                                                          • API String ID: 336800556-0
                                                                                                          • Opcode ID: 0dcf773ff127cd244175bde39e2e75253462ab0ba5dfeb690ecd47e7a8b2e539
                                                                                                          • Instruction ID: bb86c83ca4014faaa40826defa5ebe3d3cea0c089c8f5af3fbe9b1bfcef899cb
                                                                                                          • Opcode Fuzzy Hash: 0dcf773ff127cd244175bde39e2e75253462ab0ba5dfeb690ecd47e7a8b2e539
                                                                                                          • Instruction Fuzzy Hash: DB018872601619BB273276BA5C8CCFB6DEDDAC7F61314016AF904E7101DEA08C01C1B1
                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32(?,?,?,00BB5E43,00BB5ADF,?,00BB634D,00000001,00000364,?,00BB2213,?,?,00BCCBE8), ref: 00BB63A8
                                                                                                          • _free.LIBCMT ref: 00BB63DD
                                                                                                          • _free.LIBCMT ref: 00BB6404
                                                                                                          • SetLastError.KERNEL32(00000000,?,00BCCBE8), ref: 00BB6411
                                                                                                          • SetLastError.KERNEL32(00000000,?,00BCCBE8), ref: 00BB641A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$_free
                                                                                                          • String ID:
                                                                                                          • API String ID: 3170660625-0
                                                                                                          • Opcode ID: 4e7d7987f61c7e6807633ddc69765fe07913cdc100cc0ba2c83379b59095e123
                                                                                                          • Instruction ID: c58095365dbd7445f8b86266d4b46faff501ab2c75dd82c4f0250a02f3b55143
                                                                                                          • Opcode Fuzzy Hash: 4e7d7987f61c7e6807633ddc69765fe07913cdc100cc0ba2c83379b59095e123
                                                                                                          • Instruction Fuzzy Hash: DD01F976245B0067871137282C86FFB27DDDBD577573141B4F514A3292EFF98C014165
                                                                                                          APIs
                                                                                                          • _free.LIBCMT ref: 00BB9282
                                                                                                            • Part of subcall function 00BB59C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00BB9301,?,00000000,?,00000000,?,00BB9328,?,00000007,?,?,00BB9725,?), ref: 00BB59D8
                                                                                                            • Part of subcall function 00BB59C2: GetLastError.KERNEL32(?,?,00BB9301,?,00000000,?,00000000,?,00BB9328,?,00000007,?,?,00BB9725,?,?), ref: 00BB59EA
                                                                                                          • _free.LIBCMT ref: 00BB9294
                                                                                                          • _free.LIBCMT ref: 00BB92A6
                                                                                                          • _free.LIBCMT ref: 00BB92B8
                                                                                                          • _free.LIBCMT ref: 00BB92CA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 776569668-0
                                                                                                          • Opcode ID: 38b22e23bdda1ee47857b247d9f8c1af02e590e30973bc88d22616267a2522d6
                                                                                                          • Instruction ID: 15dcaaa2643034bf5aa0d4b9182fc794f3343a7a3f9306404f61ae9786d84d44
                                                                                                          • Opcode Fuzzy Hash: 38b22e23bdda1ee47857b247d9f8c1af02e590e30973bc88d22616267a2522d6
                                                                                                          • Instruction Fuzzy Hash: 0DF01232A05708FB8A24EB5CF986DAA77E9EA047207544885F588D7551CBF4FC808655
                                                                                                          APIs
                                                                                                          • _free.LIBCMT ref: 00BB555D
                                                                                                            • Part of subcall function 00BB59C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00BB9301,?,00000000,?,00000000,?,00BB9328,?,00000007,?,?,00BB9725,?), ref: 00BB59D8
                                                                                                            • Part of subcall function 00BB59C2: GetLastError.KERNEL32(?,?,00BB9301,?,00000000,?,00000000,?,00BB9328,?,00000007,?,?,00BB9725,?,?), ref: 00BB59EA
                                                                                                          • _free.LIBCMT ref: 00BB556F
                                                                                                          • _free.LIBCMT ref: 00BB5582
                                                                                                          • _free.LIBCMT ref: 00BB5593
                                                                                                          • _free.LIBCMT ref: 00BB55A4
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 776569668-0
                                                                                                          • Opcode ID: 753a6c228ae204175b43f8967956d1e034509effb7869102eea37f9f796dc001
                                                                                                          • Instruction ID: efaab42208d6250f164f302dbda20a77fd39b4fff1784f6de79a0fd41db1ee73
                                                                                                          • Opcode Fuzzy Hash: 753a6c228ae204175b43f8967956d1e034509effb7869102eea37f9f796dc001
                                                                                                          • Instruction Fuzzy Hash: C4F0D0B1621654DB8B217F1CBC82A993BE5F718722345028AF4909B271CFB559019BC7
                                                                                                          APIs
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00BB4C1A
                                                                                                          • _free.LIBCMT ref: 00BB4CE5
                                                                                                          • _free.LIBCMT ref: 00BB4CEF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$FileModuleName
                                                                                                          • String ID: C:\Users\user\Desktop\file.exe
                                                                                                          • API String ID: 2506810119-1957095476
                                                                                                          • Opcode ID: c5317624d5790edb18ab30fe078b04d378fe786cb825e7855e3c728f4a1f6cdf
                                                                                                          • Instruction ID: 3c77dc1e4931f8130d81d5364964fa76effb71ff13ad8ad42fb53e67d9a1cacd
                                                                                                          • Opcode Fuzzy Hash: c5317624d5790edb18ab30fe078b04d378fe786cb825e7855e3c728f4a1f6cdf
                                                                                                          • Instruction Fuzzy Hash: 4F315E71A01258AFDB21DB999D81DEEBFFCFB85B10B1040A6F80497212DBB08E44CB91
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B97468
                                                                                                            • Part of subcall function 00B93AA3: __EH_prolog.LIBCMT ref: 00B93AA8
                                                                                                          • GetLastError.KERNEL32(00000052,?,?,?,?,00000800,?,?,?,00000000), ref: 00B9752E
                                                                                                            • Part of subcall function 00B97A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 00B97AAC
                                                                                                            • Part of subcall function 00B97A9D: GetLastError.KERNEL32 ref: 00B97AF2
                                                                                                            • Part of subcall function 00B97A9D: CloseHandle.KERNEL32(?), ref: 00B97B01
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                                                                          • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                                          • API String ID: 3813983858-639343689
                                                                                                          • Opcode ID: 81773014d4bb11f918a34aee4c2e5848a36f2d6a666d0a040bf0affe6b1939aa
                                                                                                          • Instruction ID: 3b006a8c7dbbe90ad98f0095a95ae819c1cbb8c1d81bc9349a55b8c3ff17b3dd
                                                                                                          • Opcode Fuzzy Hash: 81773014d4bb11f918a34aee4c2e5848a36f2d6a666d0a040bf0affe6b1939aa
                                                                                                          • Instruction Fuzzy Hash: 3331AF71A54208AADF10EFA8DC42FEE7BE8EF59314F0140B9F449A7292DB705E44C761
                                                                                                          APIs
                                                                                                          • CharUpperW.USER32(?,?,?,?,00001000), ref: 00BAA92C
                                                                                                          • CharUpperW.USER32(?,?,?,?,?,00001000), ref: 00BAA953
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CharUpper
                                                                                                          • String ID: -
                                                                                                          • API String ID: 9403516-2547889144
                                                                                                          • Opcode ID: 8dff310e36f1d9c584ee747fbc6a9412d11698f4bdee32bdc405a86ace1060cd
                                                                                                          • Instruction ID: ed8533164077e20973c8825d0ee08840b44721a477913e939b5d3870fa4ed86f
                                                                                                          • Opcode Fuzzy Hash: 8dff310e36f1d9c584ee747fbc6a9412d11698f4bdee32bdc405a86ace1060cd
                                                                                                          • Instruction Fuzzy Hash: AD21E27240C3466AD720AB688949BBBEBD8E757314F0244ABF484D2941EB74D898D373
                                                                                                          APIs
                                                                                                            • Part of subcall function 00B912E7: GetDlgItem.USER32(00000000,00003021), ref: 00B9132B
                                                                                                            • Part of subcall function 00B912E7: SetWindowTextW.USER32(00000000,00BC02E4), ref: 00B91341
                                                                                                          • EndDialog.USER32(?,00000001), ref: 00BA91AB
                                                                                                          • GetDlgItemTextW.USER32(?,00000065,00000000,?), ref: 00BA91C0
                                                                                                          • SetDlgItemTextW.USER32(?,00000065,?), ref: 00BA91D5
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemText$DialogWindow
                                                                                                          • String ID: ASKNEXTVOL
                                                                                                          • API String ID: 445417207-3402441367
                                                                                                          • Opcode ID: 8d0f134b9fd5c43d8f3c0af6c35cdf47b40c67b3f8f01019b1ede010bb650164
                                                                                                          • Instruction ID: 6e99a6496d2e5cb491cc0328ab875d54f36a5aff6f1bcfd22826f7c8e6ee2280
                                                                                                          • Opcode Fuzzy Hash: 8d0f134b9fd5c43d8f3c0af6c35cdf47b40c67b3f8f01019b1ede010bb650164
                                                                                                          • Instruction Fuzzy Hash: 1A119A322491467FD6119B68DDCDF5637DDEF4B701F004490F201BB0A1C6659C11EB25
                                                                                                          APIs
                                                                                                            • Part of subcall function 00B912E7: GetDlgItem.USER32(00000000,00003021), ref: 00B9132B
                                                                                                            • Part of subcall function 00B912E7: SetWindowTextW.USER32(00000000,00BC02E4), ref: 00B91341
                                                                                                          • EndDialog.USER32(?,00000001), ref: 00BA9694
                                                                                                          • GetDlgItemTextW.USER32(?,00000065,?,00000080), ref: 00BA96AC
                                                                                                          • SetDlgItemTextW.USER32(?,00000066,?), ref: 00BA96DA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemText$DialogWindow
                                                                                                          • String ID: GETPASSWORD1
                                                                                                          • API String ID: 445417207-3292211884
                                                                                                          • Opcode ID: 08e8dce05c6482bc218878e0fe3a7903f1b02f3fbd0cc0ae213222d8c9f18da3
                                                                                                          • Instruction ID: 77f4f60e1938e366a0cb6fc8fced4d69b5bae92ce56f4832e3013536829af387
                                                                                                          • Opcode Fuzzy Hash: 08e8dce05c6482bc218878e0fe3a7903f1b02f3fbd0cc0ae213222d8c9f18da3
                                                                                                          • Instruction Fuzzy Hash: EC11C43290811877DB219E7D9D89FFA37ECEF4A750F0100A1FA49F3580C6A5AD50A6B1
                                                                                                          APIs
                                                                                                          • _swprintf.LIBCMT ref: 00B9B127
                                                                                                            • Part of subcall function 00B93F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B93F6E
                                                                                                          • _wcschr.LIBVCRUNTIME ref: 00B9B145
                                                                                                          • _wcschr.LIBVCRUNTIME ref: 00B9B155
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcschr$__vswprintf_c_l_swprintf
                                                                                                          • String ID: %c:\
                                                                                                          • API String ID: 525462905-3142399695
                                                                                                          • Opcode ID: 30bd69b2872ff002dc45140f979b466af85579c90f0f3c06f073a3582320857c
                                                                                                          • Instruction ID: d97cedc8c882f68d8d0433187784e5c22a197fa70e1e7b89cc4a85e6dededcca
                                                                                                          • Opcode Fuzzy Hash: 30bd69b2872ff002dc45140f979b466af85579c90f0f3c06f073a3582320857c
                                                                                                          • Instruction Fuzzy Hash: 4D01F91751432277CF30A765AD81D7BB7ECEE55760B5444ABF844E2081FB30D850C2A1
                                                                                                          APIs
                                                                                                          • InitializeCriticalSection.KERNEL32(000001A0,00BD1E74,00000000,?,?,00B9FB88,00000020,?,00B9A7C2,?,00B9C74B,?,00000000,?,00000001,?), ref: 00B9F969
                                                                                                          • CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,00B9A7C2,?,00B9C74B,?,00000000,?,00000001,?,?,?,00BA3AFF), ref: 00B9F973
                                                                                                          • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,00B9A7C2,?,00B9C74B,?,00000000,?,00000001,?,?,?,00BA3AFF), ref: 00B9F983
                                                                                                          Strings
                                                                                                          • Thread pool initialization failed., xrefs: 00B9F99B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                                          • String ID: Thread pool initialization failed.
                                                                                                          • API String ID: 3340455307-2182114853
                                                                                                          • Opcode ID: ed4c9964fbffa984c894362dcf29733951d28329e30cbdd63cd96d5e3f8a55d3
                                                                                                          • Instruction ID: ff487d96c70a621f1c1db00fd63af172e84eda23a8bb39c7bc231a81e7545585
                                                                                                          • Opcode Fuzzy Hash: ed4c9964fbffa984c894362dcf29733951d28329e30cbdd63cd96d5e3f8a55d3
                                                                                                          • Instruction Fuzzy Hash: BE115EB1600706AFD7206F659889BA7FBECFF65355F10487EE2EAC3200DA716880CB50
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                                          • API String ID: 0-56093855
                                                                                                          • Opcode ID: e72e70957a40586fe10ee91df9d8c9cd2b3622a5bbfe6cd58bfa0ae726da34d6
                                                                                                          • Instruction ID: 80ba8d3ac9a6b60699b9854f479e64e351268fc18e07cde98701af59df813d66
                                                                                                          • Opcode Fuzzy Hash: e72e70957a40586fe10ee91df9d8c9cd2b3622a5bbfe6cd58bfa0ae726da34d6
                                                                                                          • Instruction Fuzzy Hash: 8801B53260E285BFC3019B18EC40E26BBE9E79A354F0404A6F56593132EB329C01DF61
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00B9CE57
                                                                                                          • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 00B9CE66
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FindHandleModuleResource
                                                                                                          • String ID: LTR$RTL
                                                                                                          • API String ID: 3537982541-719208805
                                                                                                          • Opcode ID: 1dbc3d439963f0ec06f603d45e14b7a68ee21d882c278145962259074331b6ac
                                                                                                          • Instruction ID: 89efc38b146c458066883443723824d64bbd530438f1f0439ba930684f6cb9e6
                                                                                                          • Opcode Fuzzy Hash: 1dbc3d439963f0ec06f603d45e14b7a68ee21d882c278145962259074331b6ac
                                                                                                          • Instruction Fuzzy Hash: 8AF02B31614318A7E72476755C0AFA73BECE785700F1042FDF646871C0DFA1A90887B4
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __alldvrm$_strrchr
                                                                                                          • String ID:
                                                                                                          • API String ID: 1036877536-0
                                                                                                          • Opcode ID: 2f430cb2a74aa859eafc5ddd4affd14cc97d35a892c3f37a2c0f3c52710f6d69
                                                                                                          • Instruction ID: 4d0dbd96c777593e05c1dce64e9bd961c68dd204b78a5c2a3fabde9fc45e75a6
                                                                                                          • Opcode Fuzzy Hash: 2f430cb2a74aa859eafc5ddd4affd14cc97d35a892c3f37a2c0f3c52710f6d69
                                                                                                          • Instruction Fuzzy Hash: EEA14772A042869FEB218F18C891BFEBBE5EF25314F1441EEE9959B281C6BC9D41C750
                                                                                                          APIs
                                                                                                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,00B97F55,?,?,?), ref: 00B99FD0
                                                                                                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,00B97F55,?,?), ref: 00B9A014
                                                                                                          • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,00B97F55,?,?,?,?,?,?,?,?), ref: 00B9A095
                                                                                                          • CloseHandle.KERNEL32(?,?,00000000,?,00B97F55,?,?,?,?,?,?,?,?,?,?,?), ref: 00B9A09C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$Create$CloseHandleTime
                                                                                                          • String ID:
                                                                                                          • API String ID: 2287278272-0
                                                                                                          • Opcode ID: e43b9a985c660ca2a6cd305a6623599fb788fcdc791d752306877716677873a9
                                                                                                          • Instruction ID: d1697f673f0fd497923598ecda1007ea0412ac4808c55f564b5aa025579c35e2
                                                                                                          • Opcode Fuzzy Hash: e43b9a985c660ca2a6cd305a6623599fb788fcdc791d752306877716677873a9
                                                                                                          • Instruction Fuzzy Hash: 5341E1312483859ADB31EF28CC45FAEBBE8EB85700F0409ADB5D5D31C1D674AA089793
                                                                                                          APIs
                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,F5E85006,00BB2794,00000000,00000000,00BB2FC2,?,00BB2FC2,?,00000001,00BB2794,F5E85006,00000001,00BB2FC2,00BB2FC2), ref: 00BB9440
                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00BB94C9
                                                                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00BB94DB
                                                                                                          • __freea.LIBCMT ref: 00BB94E4
                                                                                                            • Part of subcall function 00BB59FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,00BB23AA,?,0000015D,?,?,?,?,00BB2F29,000000FF,00000000,?,?), ref: 00BB5A2E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                          • String ID:
                                                                                                          • API String ID: 2652629310-0
                                                                                                          • Opcode ID: 3b9bfc109b65df3dbf9f81fe2c94b3e1b358857f84b39b53cb9a7d81e3adf0c9
                                                                                                          • Instruction ID: b7c0aa46cc689251593fd6dac8f7d26911590680787da46ddb84bc387158e878
                                                                                                          • Opcode Fuzzy Hash: 3b9bfc109b65df3dbf9f81fe2c94b3e1b358857f84b39b53cb9a7d81e3adf0c9
                                                                                                          • Instruction Fuzzy Hash: 7A31AC32A0020AABDB299F68DC85EFE7BE5EB40310F0441A8FD0597250EB75CD51CB90
                                                                                                          APIs
                                                                                                          • LoadBitmapW.USER32(00000065), ref: 00BA9A86
                                                                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 00BA9AA7
                                                                                                          • DeleteObject.GDI32(00000000), ref: 00BA9ACF
                                                                                                          • DeleteObject.GDI32(00000000), ref: 00BA9AEE
                                                                                                            • Part of subcall function 00BA8BD0: FindResourceW.KERNELBASE(00000066,PNG,?,?,00BA9AC8,00000066), ref: 00BA8BE1
                                                                                                            • Part of subcall function 00BA8BD0: SizeofResource.KERNEL32(00000000,75295780,?,?,00BA9AC8,00000066), ref: 00BA8BF9
                                                                                                            • Part of subcall function 00BA8BD0: LoadResource.KERNEL32(00000000,?,?,00BA9AC8,00000066), ref: 00BA8C0C
                                                                                                            • Part of subcall function 00BA8BD0: LockResource.KERNEL32(00000000,?,?,00BA9AC8,00000066), ref: 00BA8C17
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                                                                                                          • String ID:
                                                                                                          • API String ID: 142272564-0
                                                                                                          • Opcode ID: 5d82a1ec1e613ba148dce864c17db3dd3e125a0f5107afb89f8f88e8b8e40bcf
                                                                                                          • Instruction ID: 0b9b704cc9b753d15d35b117a9d95c818c5068fd0e46cad12761fa435465fe36
                                                                                                          • Opcode Fuzzy Hash: 5d82a1ec1e613ba148dce864c17db3dd3e125a0f5107afb89f8f88e8b8e40bcf
                                                                                                          • Instruction Fuzzy Hash: 5601F73264421837C6117774DC46F7FB6EEDF8AB51F480091F904E7551DE128C0691B1
                                                                                                          APIs
                                                                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 00BB1020
                                                                                                            • Part of subcall function 00BB1658: ___AdjustPointer.LIBCMT ref: 00BB16A2
                                                                                                          • _UnwindNestedFrames.LIBCMT ref: 00BB1037
                                                                                                          • ___FrameUnwindToState.LIBVCRUNTIME ref: 00BB1049
                                                                                                          • CallCatchBlock.LIBVCRUNTIME ref: 00BB106D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                                          • String ID:
                                                                                                          • API String ID: 2633735394-0
                                                                                                          • Opcode ID: 7d12082e9d69d4eb274960970e4ac3fc094051ebbb053271e04eeb65a8542b8b
                                                                                                          • Instruction ID: 904f6ed85eea62f0e7278d6ad03a734fc2f9ef16b2d851109b7eeb6e1cff8b9e
                                                                                                          • Opcode Fuzzy Hash: 7d12082e9d69d4eb274960970e4ac3fc094051ebbb053271e04eeb65a8542b8b
                                                                                                          • Instruction Fuzzy Hash: 76014832400148FBCF226F59CC51EEA3BFAFF49754F558455FA1866120C3B2E8A1EBA0
                                                                                                          APIs
                                                                                                          • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00BB0B66
                                                                                                          • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00BB0B6B
                                                                                                          • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00BB0B70
                                                                                                            • Part of subcall function 00BB1C0E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 00BB1C1F
                                                                                                          • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00BB0B85
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                                                          • String ID:
                                                                                                          • API String ID: 1761009282-0
                                                                                                          • Opcode ID: e1efccc91d6ca86c87a370a4cfe5ee176f52a00580c29e2aebafd7fd9b0014c7
                                                                                                          • Instruction ID: a0431e35d6f9d4872b39c174db95ddf7c071a5d9e2e8044eef8a53fc2aa83206
                                                                                                          • Opcode Fuzzy Hash: e1efccc91d6ca86c87a370a4cfe5ee176f52a00580c29e2aebafd7fd9b0014c7
                                                                                                          • Instruction Fuzzy Hash: FCC04C641642405B1C303AB925221FF07D48E667D9BC019C5E8911B0175FC6444AA036
                                                                                                          APIs
                                                                                                            • Part of subcall function 00BA8BA5: GetDC.USER32(00000000), ref: 00BA8BA9
                                                                                                            • Part of subcall function 00BA8BA5: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00BA8BB4
                                                                                                            • Part of subcall function 00BA8BA5: ReleaseDC.USER32(00000000,00000000), ref: 00BA8BBF
                                                                                                          • GetObjectW.GDI32(?,00000018,?), ref: 00BA8D24
                                                                                                            • Part of subcall function 00BA8EEA: GetDC.USER32(00000000), ref: 00BA8EF3
                                                                                                            • Part of subcall function 00BA8EEA: GetObjectW.GDI32(?,00000018,?), ref: 00BA8F22
                                                                                                            • Part of subcall function 00BA8EEA: ReleaseDC.USER32(00000000,?), ref: 00BA8FB6
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ObjectRelease$CapsDevice
                                                                                                          • String ID: (
                                                                                                          • API String ID: 1061551593-3887548279
                                                                                                          • Opcode ID: f7ec54e13bf6be98553cd942c062149b271a989324e63d2abe4f63cf09d07c8c
                                                                                                          • Instruction ID: c8cd15d62111864dda370d62b2b31824339a271660ae462197cde30e8348a84c
                                                                                                          • Opcode Fuzzy Hash: f7ec54e13bf6be98553cd942c062149b271a989324e63d2abe4f63cf09d07c8c
                                                                                                          • Instruction Fuzzy Hash: CE6103B1208205AFD210DF64C888E6BBBE9FF89704F10496DF599C7260DB31E805CB62
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _swprintf
                                                                                                          • String ID: %ls$%s: %s
                                                                                                          • API String ID: 589789837-2259941744
                                                                                                          • Opcode ID: 14b36af266bc9b27d01a94be302a4c2db2ef6a6de50c0d63e94d19e8db40090a
                                                                                                          • Instruction ID: a0e4c3ce60af025bb89f87e9d83ca3b8c0ff26ca917cb31c823e15878a8d94de
                                                                                                          • Opcode Fuzzy Hash: 14b36af266bc9b27d01a94be302a4c2db2ef6a6de50c0d63e94d19e8db40090a
                                                                                                          • Instruction Fuzzy Hash: 95518B351AC300FAEE2136948DCAF3576E5FB0BF00F6085DAF396744E5C9E168646616
                                                                                                          APIs
                                                                                                          • __EH_prolog.LIBCMT ref: 00B9761E
                                                                                                          • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00B97799
                                                                                                            • Part of subcall function 00B9A0C3: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00B99EF9,?,?,?,00B99D92,?,00000001,00000000,?,?), ref: 00B9A0D7
                                                                                                            • Part of subcall function 00B9A0C3: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00B99EF9,?,?,?,00B99D92,?,00000001,00000000,?,?), ref: 00B9A108
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$Attributes$H_prologTime
                                                                                                          • String ID: :
                                                                                                          • API String ID: 1861295151-336475711
                                                                                                          • Opcode ID: 0a1008a1980c0486ffb1782a8d1ef3db071e294505f681065abe3fd9ad20ee7e
                                                                                                          • Instruction ID: a673ea13a7ff520c04504b896f2aa66ebc9e709be7a0a01f1408e2017b4e58a6
                                                                                                          • Opcode Fuzzy Hash: 0a1008a1980c0486ffb1782a8d1ef3db071e294505f681065abe3fd9ad20ee7e
                                                                                                          • Instruction Fuzzy Hash: 43418D71814658AAEF25EBA4DC46EEE77FCEF45300F0040F9B645A2182DB745F89CBA1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: UNC$\\?\
                                                                                                          • API String ID: 0-253988292
                                                                                                          • Opcode ID: 372f06b5f910c7aba907a6bf36b1a6f8c72998816017131e3ad7698be0e66add
                                                                                                          • Instruction ID: e8d05eec008daa97c0d8b555eb63e3fe2ed84ff0ace8d433b599f01a57ec023b
                                                                                                          • Opcode Fuzzy Hash: 372f06b5f910c7aba907a6bf36b1a6f8c72998816017131e3ad7698be0e66add
                                                                                                          • Instruction Fuzzy Hash: 5D41923140421AA7DF21EF21ED86EEE7BE9EF15350F2045F6F854A3152E770D990CAA4
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: Shell.Explorer$about:blank
                                                                                                          • API String ID: 0-874089819
                                                                                                          • Opcode ID: 4d905578baa44aac0ead8389c923e502029d64fdc3a607dbc7de5c2add1c346f
                                                                                                          • Instruction ID: 0cb31b362b64ee0560749b4c1df100bbeac496048b5e78191373c951ed9075ed
                                                                                                          • Opcode Fuzzy Hash: 4d905578baa44aac0ead8389c923e502029d64fdc3a607dbc7de5c2add1c346f
                                                                                                          • Instruction Fuzzy Hash: 83219F75308606AFD7249F64C894E26B7E9FF86710B14C5AEF1058BA92CF71EC44CBA0
                                                                                                          APIs
                                                                                                            • Part of subcall function 00B9DEB5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00B9DED4
                                                                                                            • Part of subcall function 00B9DEB5: GetProcAddress.KERNEL32(00BD1E58,CryptUnprotectMemory), ref: 00B9DEE4
                                                                                                          • GetCurrentProcessId.KERNEL32(?,?,?,00B9DF2E), ref: 00B9DFB5
                                                                                                          Strings
                                                                                                          • CryptProtectMemory failed, xrefs: 00B9DF75
                                                                                                          • CryptUnprotectMemory failed, xrefs: 00B9DFAD
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$CurrentProcess
                                                                                                          • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                                                          • API String ID: 2190909847-396321323
                                                                                                          • Opcode ID: 909acc7a200aab4ed02331e42ad2ee721f8e2ee2ecd1191c53284cdaea8b4c89
                                                                                                          • Instruction ID: fdb010afb4aba7dd538c7998b122ed14ad2fd34b9279dbccd1649571a59faf1c
                                                                                                          • Opcode Fuzzy Hash: 909acc7a200aab4ed02331e42ad2ee721f8e2ee2ecd1191c53284cdaea8b4c89
                                                                                                          • Instruction Fuzzy Hash: 5E1123713092166BEF119B7ACC52F6A77D9EF95B14B0441FAF806DB192EF60ED0082A0
                                                                                                          APIs
                                                                                                            • Part of subcall function 00B9CED7: GetWindowRect.USER32(?,?), ref: 00B9CF0E
                                                                                                            • Part of subcall function 00B9CED7: GetClientRect.USER32(?,?), ref: 00B9CF1A
                                                                                                            • Part of subcall function 00B9CED7: GetWindowLongW.USER32(?,000000F0), ref: 00B9CFBB
                                                                                                            • Part of subcall function 00B9CED7: GetWindowRect.USER32(?,?), ref: 00B9CFE8
                                                                                                            • Part of subcall function 00B9CED7: GetWindowTextW.USER32(?,?,00000400), ref: 00B9D007
                                                                                                          • GetDlgItem.USER32(00000000,00003021), ref: 00B9132B
                                                                                                          • SetWindowTextW.USER32(00000000,00BC02E4), ref: 00B91341
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Rect$Text$ClientItemLong
                                                                                                          • String ID: 0
                                                                                                          • API String ID: 660763476-4108050209
                                                                                                          • Opcode ID: d2cd828ed230cb2b7763667d149308b575fdd93c0040bf717079a547f4f596c6
                                                                                                          • Instruction ID: af242152a2193a2f36fd13ccfa3db07e7a4f87c1a93000be86a2c2e2fe86fc40
                                                                                                          • Opcode Fuzzy Hash: d2cd828ed230cb2b7763667d149308b575fdd93c0040bf717079a547f4f596c6
                                                                                                          • Instruction Fuzzy Hash: 27F0D1B104424DBBCF111F648809AA93FE99B14748F4884A8FE4C554A0CB34C850EB18
                                                                                                          APIs
                                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,00B9FD0B,?,?,00B9FD80,?,?,?,?,?,00B9FD6A), ref: 00B9FACD
                                                                                                          • GetLastError.KERNEL32(?,?,00B9FD80,?,?,?,?,?,00B9FD6A), ref: 00B9FAD9
                                                                                                            • Part of subcall function 00B96DD3: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B96DF1
                                                                                                          Strings
                                                                                                          • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00B9FAE2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1727254760.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1727236216.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727278624.0000000000BC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727293413.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1727323938.0000000000BEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b90000_file.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                                                          • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                                          • API String ID: 1091760877-2248577382
                                                                                                          • Opcode ID: 6ade4a1a4804661ebe4bf744f55a267ee2818a9e91f2a02fadc265dfa66437f9
                                                                                                          • Instruction ID: b7131dc308ba2f04c60ff15c0c0cb31ae7a4912d7a1fcb9b1f24dfcb5a5b4a70
                                                                                                          • Opcode Fuzzy Hash: 6ade4a1a4804661ebe4bf744f55a267ee2818a9e91f2a02fadc265dfa66437f9
                                                                                                          • Instruction Fuzzy Hash: 64D05E72618435A7DA0133285C0AF6E3A949F22730F6507BDF139A61F5CF200C9142A1

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:6.2%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:14.9%
                                                                                                          Total number of Nodes:2000
                                                                                                          Total number of Limit Nodes:101
                                                                                                          execution_graph 59535 11108d30 59578 1110f420 59535->59578 59538 11108da9 OpenEventA 59541 11108ed1 GetStockObject GetObjectA InitializeCriticalSection InitializeCriticalSection 59538->59541 59542 11108e18 CloseHandle GetSystemDirectoryA 59538->59542 59543 1110f420 std::locale::facet::_Facet_Register 272 API calls 59541->59543 59544 11108e38 59542->59544 59545 11108f23 59543->59545 59544->59544 59546 11108e40 LoadLibraryA 59544->59546 59547 11108f3c 59545->59547 59649 110f4680 275 API calls std::locale::facet::_Facet_Register 59545->59649 59546->59541 59548 11108e71 59546->59548 59606 1110f2b0 59547->59606 59622 111450a0 59548->59622 59552 11108e7b 59553 11108e82 GetProcAddress 59552->59553 59554 11108e9a GetProcAddress 59552->59554 59553->59554 59556 11108ec4 FreeLibrary 59554->59556 59557 11108eb6 59554->59557 59556->59541 59557->59541 59560 11109005 59652 11161d01 59560->59652 59561 1110f420 std::locale::facet::_Facet_Register 272 API calls 59563 11108f73 59561->59563 59565 11108f84 59563->59565 59566 11108f8d 59563->59566 59564 1110901f 59650 110f4680 275 API calls std::locale::facet::_Facet_Register 59565->59650 59568 1110f2b0 415 API calls 59566->59568 59569 11108fa9 CloseHandle 59568->59569 59570 111450a0 std::locale::facet::_Facet_Register 93 API calls 59569->59570 59571 11108fba 59570->59571 59571->59560 59572 1110f420 std::locale::facet::_Facet_Register 272 API calls 59571->59572 59573 11108fc8 59572->59573 59575 11108fe2 59573->59575 59651 110f4680 275 API calls std::locale::facet::_Facet_Register 59573->59651 59576 1110f2b0 415 API calls 59575->59576 59577 11108ffe CloseHandle 59576->59577 59577->59560 59660 11162b51 59578->59660 59581 1110f473 _memset 59585 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 59581->59585 59582 1110f447 wsprintfA 59677 11029450 272 API calls 2 library calls 59582->59677 59586 11108d91 59585->59586 59586->59538 59587 11107290 59586->59587 59686 1110f520 59587->59686 59590 1110f520 3 API calls 59591 111072dc 59590->59591 59592 1110f520 3 API calls 59591->59592 59593 111072ee 59592->59593 59594 1110f520 3 API calls 59593->59594 59595 111072ff 59594->59595 59596 1110f520 3 API calls 59595->59596 59597 11107310 59596->59597 59598 1110f420 std::locale::facet::_Facet_Register 272 API calls 59597->59598 59599 11107321 59598->59599 59600 1110740a 59599->59600 59601 1110732c LoadLibraryA LoadLibraryA 59599->59601 59693 1116219a 66 API calls std::exception::_Copy_str 59600->59693 59601->59538 59603 11107419 59694 111625f1 RaiseException 59603->59694 59605 1110742e 59607 1110f2d0 CreateThread 59606->59607 59608 1110f2bf CreateEventA 59606->59608 59610 1110f2f6 59607->59610 59611 1110f30d 59607->59611 59698 11102c50 59607->59698 59720 1110fde0 59607->59720 59734 11027270 59607->59734 59759 1102c410 59607->59759 59608->59607 59697 11029450 272 API calls 2 library calls 59610->59697 59613 1110f311 WaitForSingleObject CloseHandle 59611->59613 59614 11108f58 CloseHandle 59611->59614 59613->59614 59616 1109e9e0 59614->59616 59617 1109e9ef GetCurrentProcess OpenProcessToken 59616->59617 59618 1109ea2d 59616->59618 59617->59618 59619 1109ea12 59617->59619 59618->59560 59618->59561 60139 1109e910 59619->60139 59621 1109ea1b CloseHandle 59621->59618 59623 111450c1 GetVersionExA 59622->59623 59631 1114529c 59622->59631 59624 111450e3 59623->59624 59623->59631 59626 111450f0 RegOpenKeyExA 59624->59626 59624->59631 59625 111452a5 59627 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 59625->59627 59629 1114511d _memset 59626->59629 59626->59631 59630 111452b2 59627->59630 59628 11145304 59632 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 59628->59632 60152 11143000 RegQueryValueExA 59629->60152 59630->59552 59631->59625 59631->59628 60159 11081c60 59631->60159 59633 11145314 59632->59633 59633->59552 59637 11143000 std::locale::facet::_Facet_Register RegQueryValueExA 59639 11145189 59637->59639 59638 111452ec 59638->59625 59638->59628 59640 1114528f RegCloseKey 59639->59640 60154 11163a2d 59639->60154 59640->59631 59642 111451ad 59643 11163a2d std::locale::facet::_Facet_Register 78 API calls 59642->59643 59645 111451c6 _strncpy 59642->59645 59643->59642 59644 11145271 59644->59640 59645->59644 59646 11143000 std::locale::facet::_Facet_Register RegQueryValueExA 59645->59646 59647 11145248 59646->59647 59648 11143000 std::locale::facet::_Facet_Register RegQueryValueExA 59647->59648 59648->59644 59649->59547 59650->59566 59651->59575 59653 11161d0b IsDebuggerPresent 59652->59653 59654 11161d09 59652->59654 60172 11177637 59653->60172 59654->59564 59657 1116bc99 SetUnhandledExceptionFilter UnhandledExceptionFilter 59658 1116bcb6 __call_reportfault 59657->59658 59659 1116bcbe GetCurrentProcess TerminateProcess 59657->59659 59658->59659 59659->59564 59661 11162bce 59660->59661 59674 11162b5f 59660->59674 59684 1116d4a8 DecodePointer 59661->59684 59663 11162bd4 59685 111692ef 66 API calls __getptd_noexit 59663->59685 59666 11162b8d RtlAllocateHeap 59666->59674 59676 1110f43e 59666->59676 59668 11162bba 59682 111692ef 66 API calls __getptd_noexit 59668->59682 59672 11162bb8 59683 111692ef 66 API calls __getptd_noexit 59672->59683 59673 11162b6a 59673->59674 59678 1116d99d 66 API calls __NMSG_WRITE 59673->59678 59679 1116d7ee 66 API calls 6 library calls 59673->59679 59680 1116d52d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 59673->59680 59674->59666 59674->59668 59674->59672 59674->59673 59681 1116d4a8 DecodePointer 59674->59681 59676->59581 59676->59582 59678->59673 59679->59673 59681->59674 59682->59672 59683->59676 59684->59663 59685->59676 59687 1110f536 CreateEventA 59686->59687 59688 1110f549 59686->59688 59687->59688 59690 1110f557 59688->59690 59695 1110f260 InterlockedIncrement 59688->59695 59691 111072cc 59690->59691 59696 1110f3c0 InterlockedIncrement 59690->59696 59691->59590 59693->59603 59694->59605 59695->59690 59696->59691 59794 11089280 59698->59794 59700 11102c5d 59701 11102c69 GetCurrentThreadId GetThreadDesktop OpenDesktopA 59700->59701 59702 11102ccf GetLastError 59701->59702 59703 11102c8f SetThreadDesktop 59701->59703 59706 11146450 std::locale::facet::_Facet_Register 21 API calls 59702->59706 59704 11102cb1 GetLastError 59703->59704 59705 11102c9a 59703->59705 59708 11146450 std::locale::facet::_Facet_Register 21 API calls 59704->59708 59805 11146450 59705->59805 59709 11102ce1 59706->59709 59711 11102cc3 CloseDesktop 59708->59711 59799 11102bd0 59709->59799 59711->59709 59713 11102ceb 59811 1110f340 59713->59811 59715 11102cf2 59816 110f4740 16 API calls 59715->59816 59717 11102cf9 59817 1110f370 SetEvent PulseEvent 59717->59817 59719 11102d00 std::ios_base::_Ios_base_dtor 59870 110b7a20 59720->59870 59722 1110fdee GetCurrentThreadId 59723 1110f340 273 API calls 59722->59723 59732 1110fe09 std::ios_base::_Ios_base_dtor 59723->59732 59724 1110fe80 59874 1110f370 SetEvent PulseEvent 59724->59874 59725 1110fe20 WaitForSingleObject 59872 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 59725->59872 59727 1110fe8a 59729 1110fe43 59730 1110fe53 PostMessageA 59729->59730 59731 1110fe58 PostThreadMessageA 59729->59731 59730->59732 59731->59732 59732->59724 59732->59725 59732->59729 59873 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 59732->59873 59735 110272a2 59734->59735 59736 11089280 5 API calls 59735->59736 59737 110272a9 CreateEventA 59736->59737 59738 1110f420 std::locale::facet::_Facet_Register 272 API calls 59737->59738 59739 110272c6 59738->59739 59740 110272e7 59739->59740 59875 111100d0 59739->59875 59742 1110f340 273 API calls 59740->59742 59743 110272ff 59742->59743 59744 11027316 WaitForMultipleObjects 59743->59744 59748 110273f4 59743->59748 59750 11027375 PostMessageA 59743->59750 59756 110273ba GetCurrentThreadId GetThreadDesktop 59743->59756 59903 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 59743->59903 59744->59743 59745 1102732d 59744->59745 59746 11027336 PostMessageA 59745->59746 59747 1102734a SetEvent Sleep 59745->59747 59746->59743 59746->59747 59747->59743 59749 1102740e CloseHandle 59748->59749 59904 1110fc70 285 API calls 2 library calls 59748->59904 59905 1110f370 SetEvent PulseEvent 59749->59905 59750->59743 59754 11027405 std::ios_base::_Ios_base_dtor 59754->59749 59755 11027423 59756->59743 59757 110273c9 SetThreadDesktop 59756->59757 59757->59743 59758 110273d4 CloseDesktop 59757->59758 59758->59743 59760 1102c442 59759->59760 59761 1110f340 273 API calls 59760->59761 59762 1102c44f WaitForSingleObject 59761->59762 59763 1102c466 59762->59763 59764 1102c67d 59762->59764 59766 1102c470 GetTickCount 59763->59766 59767 1102c666 WaitForSingleObject 59763->59767 60003 1110f370 SetEvent PulseEvent 59764->60003 59909 110d1550 59766->59909 59767->59763 59767->59764 59768 1102c684 CloseHandle 60004 1110f580 InterlockedDecrement SetEvent PulseEvent InterlockedDecrement CloseHandle 59768->60004 59771 110d1550 275 API calls 59778 1102c486 59771->59778 59772 1102c695 std::ios_base::_Ios_base_dtor 59774 1102c6b4 60005 11029450 272 API calls 2 library calls 59774->60005 59776 1102c6c8 60006 11029450 272 API calls 2 library calls 59776->60006 59778->59771 59778->59774 59778->59776 59779 1102c6dc 59778->59779 59784 1102c574 GetTickCount 59778->59784 59919 110d0710 59778->59919 59931 11029590 LoadLibraryA 59778->59931 59983 110d1370 276 API calls 2 library calls 59778->59983 60007 11029450 272 API calls 2 library calls 59779->60007 59782 1102c6f0 60008 11029450 272 API calls 2 library calls 59782->60008 59792 1102c571 std::ios_base::_Ios_base_dtor 59784->59792 59786 11146450 std::locale::facet::_Facet_Register 21 API calls 59786->59792 59788 110d07c0 272 API calls 59788->59792 59792->59774 59792->59776 59792->59782 59792->59784 59792->59786 59792->59788 59793 110679c0 288 API calls 59792->59793 59984 11142290 59792->59984 59993 11042530 274 API calls 2 library calls 59792->59993 59994 110d07c0 59792->59994 59793->59792 59818 1110f6c0 59794->59818 59796 11089290 59797 110892b3 59796->59797 59798 110892a2 UnhookWindowsHookEx 59796->59798 59797->59700 59798->59797 59800 1110f420 std::locale::facet::_Facet_Register 272 API calls 59799->59800 59801 11102bfd 59800->59801 59802 11102c30 59801->59802 59824 11102ab0 59801->59824 59802->59713 59804 11102c1d 59804->59713 59806 11146461 59805->59806 59807 1114645c 59805->59807 59844 111458f0 59806->59844 59847 111456a0 18 API calls std::locale::facet::_Facet_Register 59807->59847 59812 1110f360 SetEvent 59811->59812 59813 1110f349 59811->59813 59812->59715 59869 11029450 272 API calls 2 library calls 59813->59869 59816->59717 59817->59719 59819 1110f6d7 EnterCriticalSection 59818->59819 59820 1110f6ce GetCurrentThreadId 59818->59820 59821 1110f6ee ___DllMainCRTStartup 59819->59821 59820->59819 59822 1110f6f5 LeaveCriticalSection 59821->59822 59823 1110f708 LeaveCriticalSection 59821->59823 59822->59796 59823->59796 59831 1115f550 59824->59831 59827 11102b81 CreateWindowExA 59827->59804 59828 11102b17 std::locale::facet::_Facet_Register 59829 11102b50 GetStockObject RegisterClassA 59828->59829 59829->59827 59830 11102b7a 59829->59830 59830->59827 59834 1115e380 GlobalAddAtomA 59831->59834 59835 1115e3b5 GetLastError wsprintfA 59834->59835 59836 1115e407 GlobalAddAtomA GlobalAddAtomA 59834->59836 59843 11029450 272 API calls 2 library calls 59835->59843 59838 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 59836->59838 59840 11102ae1 GlobalAddAtomA 59838->59840 59840->59827 59840->59828 59848 111457a0 59844->59848 59846 11102ca5 CloseDesktop 59846->59709 59847->59806 59849 111457c4 59848->59849 59850 111457c9 59848->59850 59868 111456a0 18 API calls std::locale::facet::_Facet_Register 59849->59868 59852 11145832 59850->59852 59853 111457d2 59850->59853 59854 111458de 59852->59854 59855 1114583f wsprintfA 59852->59855 59856 11145809 59853->59856 59859 111457e0 59853->59859 59857 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 59854->59857 59858 11145862 59855->59858 59862 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 59856->59862 59860 111458ea 59857->59860 59858->59858 59861 11145869 wvsprintfA 59858->59861 59864 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 59859->59864 59860->59846 59867 11145884 59861->59867 59863 1114582e 59862->59863 59863->59846 59865 11145805 59864->59865 59865->59846 59866 111458d1 OutputDebugStringA 59866->59854 59867->59866 59867->59867 59868->59850 59871 110b7a28 std::locale::facet::_Facet_Register 59870->59871 59871->59722 59872->59732 59873->59732 59874->59727 59876 1110f420 std::locale::facet::_Facet_Register 272 API calls 59875->59876 59877 11110101 59876->59877 59878 11110123 GetCurrentThreadId InitializeCriticalSection 59877->59878 59879 1110f420 std::locale::facet::_Facet_Register 272 API calls 59877->59879 59882 11110190 EnterCriticalSection 59878->59882 59883 11110183 InitializeCriticalSection 59878->59883 59881 1111011c 59879->59881 59881->59878 59906 1116219a 66 API calls std::exception::_Copy_str 59881->59906 59884 1111024a LeaveCriticalSection 59882->59884 59885 111101be CreateEventA 59882->59885 59883->59882 59884->59740 59887 111101d1 59885->59887 59888 111101e8 59885->59888 59908 11029450 272 API calls 2 library calls 59887->59908 59889 1110f420 std::locale::facet::_Facet_Register 272 API calls 59888->59889 59892 111101ef 59889->59892 59890 1111013f 59907 111625f1 RaiseException 59890->59907 59895 1111020c 59892->59895 59896 111100d0 409 API calls 59892->59896 59897 1110f420 std::locale::facet::_Facet_Register 272 API calls 59895->59897 59896->59895 59898 1111021c 59897->59898 59899 1111022d 59898->59899 59900 1110f520 3 API calls 59898->59900 59901 1110f2b0 409 API calls 59899->59901 59900->59899 59902 11110245 59901->59902 59902->59884 59903->59743 59904->59754 59905->59755 59906->59890 59907->59878 60009 110d1480 59909->60009 59912 110d159b 59915 110d15b5 59912->59915 59916 110d1598 59912->59916 59913 110d1584 60023 11029450 272 API calls 2 library calls 59913->60023 59915->59778 59916->59912 60024 11029450 272 API calls 2 library calls 59916->60024 59920 110d0724 59919->59920 60064 11163cf8 59920->60064 59927 110d077c 59927->59778 59928 110d0765 60089 11029450 272 API calls 2 library calls 59928->60089 59976 11029621 std::ios_base::_Ios_base_dtor 59931->59976 59932 11029653 GetProcAddress 59936 11029671 SetLastError 59932->59936 59932->59976 59933 11162b51 66 API calls _malloc 59933->59976 59934 11029748 InternetOpenA 59934->59976 59935 1102972f GetProcAddress 59935->59934 59937 11029779 SetLastError 59935->59937 59936->59976 59937->59976 59938 110296a5 GetProcAddress 59939 11029762 SetLastError 59938->59939 59938->59976 59940 110296d2 GetLastError 59939->59940 59940->59976 59941 11142290 std::locale::facet::_Facet_Register 272 API calls 59941->59976 59942 110296f5 GetProcAddress 59944 1102976f SetLastError 59942->59944 59942->59976 59943 11162be5 66 API calls _free 59943->59976 59944->59976 59945 11029a40 59950 11029b76 GetProcAddress 59945->59950 59951 11029a31 59945->59951 59946 11029bb0 59946->59792 59947 11029ba9 FreeLibrary 59947->59946 59948 11081a70 IsDBCSLeadByte 59948->59976 59949 11029a57 GetProcAddress 59953 11029b2e SetLastError 59949->59953 59973 11029a1a std::ios_base::_Ios_base_dtor 59949->59973 59950->59951 59952 11029b97 SetLastError 59950->59952 59951->59946 59951->59947 59952->59951 59971 11029b36 std::ios_base::_Ios_base_dtor 59953->59971 59956 11029b5b 60124 110278a0 GetProcAddress SetLastError 59956->60124 59957 1102982b GetProcAddress 59958 1102983e InternetConnectA 59957->59958 59962 11029881 SetLastError 59957->59962 59958->59976 59960 110297ff GetProcAddress 59964 1102981c SetLastError 59960->59964 59960->59976 59962->59976 59963 11029b6a 59963->59945 59964->59976 59965 11029864 GetProcAddress 59968 11029891 SetLastError 59965->59968 59965->59976 59966 110298a3 GetProcAddress 59967 110298d6 SetLastError 59966->59967 59966->59976 59967->59976 59968->59976 59969 110d1090 275 API calls 59970 11029a80 std::ios_base::_Ios_base_dtor 59969->59970 59970->59969 59970->59971 59970->59973 60115 1110f4a0 59970->60115 60122 11027850 GetProcAddress SetLastError 59970->60122 60123 110278a0 GetProcAddress SetLastError 59971->60123 59972 110298f1 GetProcAddress 59974 11029918 SetLastError 59972->59974 59972->59976 59973->59945 59973->59949 59973->59951 59973->59970 59975 11029922 GetLastError 59974->59975 59975->59976 59977 1102993d GetProcAddress 59975->59977 59976->59932 59976->59933 59976->59934 59976->59935 59976->59938 59976->59940 59976->59941 59976->59942 59976->59943 59976->59948 59976->59957 59976->59958 59976->59960 59976->59965 59976->59966 59976->59972 59976->59973 59976->59975 59979 11029975 GetLastError 59976->59979 59980 1102998c GetDesktopWindow 59976->59980 59977->59976 59978 1102996d SetLastError 59977->59978 59978->59979 59979->59976 59979->59980 59980->59976 59981 1102999a GetProcAddress 59980->59981 59981->59976 59982 110299d6 SetLastError 59981->59982 59982->59976 59983->59778 59985 1114229a 59984->59985 59986 1114229c 59984->59986 59985->59792 59987 1110f4a0 std::locale::facet::_Facet_Register 272 API calls 59986->59987 59988 111422c2 59987->59988 59989 111422cb _strncpy 59988->59989 59990 111422e9 59988->59990 59989->59792 60126 11029450 272 API calls 2 library calls 59990->60126 59993->59792 60127 110d05c0 59994->60127 59997 110d07e9 60132 11162be5 59997->60132 59998 110d07d2 60131 11029450 272 API calls 2 library calls 59998->60131 60002 110d07f2 60002->59767 60003->59768 60004->59772 60010 110d148c 60009->60010 60011 110d14a7 60010->60011 60012 110d1490 60010->60012 60025 110d0190 60011->60025 60054 11029450 272 API calls 2 library calls 60012->60054 60019 110d14de 60019->59912 60019->59913 60020 110d14c7 60055 11029450 272 API calls 2 library calls 60020->60055 60026 110d0199 60025->60026 60027 110d019d 60026->60027 60028 110d01b4 60026->60028 60056 11029450 272 API calls 2 library calls 60027->60056 60030 110d01b1 60028->60030 60031 110d01e8 60028->60031 60030->60028 60057 11029450 272 API calls 2 library calls 60030->60057 60033 110d01e5 60031->60033 60034 110d0206 60031->60034 60033->60031 60058 11029450 272 API calls 2 library calls 60033->60058 60037 110d1090 60034->60037 60038 110d109e 60037->60038 60039 110d10b9 60038->60039 60040 110d10a2 60038->60040 60043 110d10b6 60039->60043 60044 110d10ec 60039->60044 60059 11029450 272 API calls 2 library calls 60040->60059 60042 110d1160 60042->60019 60042->60020 60043->60039 60060 11029450 272 API calls 2 library calls 60043->60060 60044->60042 60044->60044 60061 110d09e0 272 API calls std::locale::facet::_Facet_Register 60044->60061 60046 110d1113 60050 110d111f _memmove 60046->60050 60062 110d0920 275 API calls 2 library calls 60046->60062 60050->60042 60051 110d1149 60050->60051 60063 11029450 272 API calls 2 library calls 60051->60063 60061->60046 60062->60050 60065 110d072f 60064->60065 60066 11163d09 _strlen 60064->60066 60072 110d0450 60065->60072 60067 11162b51 _malloc 66 API calls 60066->60067 60068 11163d1c 60067->60068 60068->60065 60090 1116be9f 60068->60090 60073 110d045b 60072->60073 60074 110d0472 60072->60074 60111 11029450 272 API calls 2 library calls 60073->60111 60077 110cfe70 60074->60077 60078 110cfe7d 60077->60078 60079 110cfe98 60078->60079 60080 110cfe81 60078->60080 60081 110cfe95 60079->60081 60082 110cfeb6 60079->60082 60112 11029450 272 API calls 2 library calls 60080->60112 60081->60079 60113 11029450 272 API calls 2 library calls 60081->60113 60085 110cfeb3 60082->60085 60088 110cfed9 60082->60088 60085->60082 60114 11029450 272 API calls 2 library calls 60085->60114 60088->59927 60088->59928 60091 1116beb4 60090->60091 60092 1116bead 60090->60092 60102 111692ef 66 API calls __getptd_noexit 60091->60102 60092->60091 60097 1116bed2 60092->60097 60094 1116beb9 60103 1116df04 11 API calls strtoxl 60094->60103 60096 11163d2e 60096->60065 60099 1116deb2 60096->60099 60097->60096 60104 111692ef 66 API calls __getptd_noexit 60097->60104 60105 1116dd89 60099->60105 60102->60094 60103->60096 60104->60094 60106 1116dda8 _memset __call_reportfault 60105->60106 60107 1116ddc6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 60106->60107 60108 1116de94 __call_reportfault 60107->60108 60109 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 60108->60109 60110 1116deb0 GetCurrentProcess TerminateProcess 60109->60110 60110->60065 60116 11162b51 _malloc 66 API calls 60115->60116 60117 1110f4ae 60116->60117 60118 1110f4b7 60117->60118 60121 1110f4ce _memset 60117->60121 60125 11029450 272 API calls 2 library calls 60118->60125 60121->59970 60122->59970 60123->59956 60124->59963 60128 110d05ec 60127->60128 60129 110d05d9 60127->60129 60128->59997 60128->59998 60129->60128 60130 110d0450 272 API calls 60129->60130 60130->60128 60133 11162bf0 HeapFree 60132->60133 60134 11162c19 _free 60132->60134 60133->60134 60135 11162c05 60133->60135 60134->60002 60138 111692ef 66 API calls __getptd_noexit 60135->60138 60137 11162c0b GetLastError 60137->60134 60138->60137 60140 1109e9c6 60139->60140 60141 1109e930 GetTokenInformation 60139->60141 60142 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 60140->60142 60143 1109e952 __crtGetStringTypeA_stat 60141->60143 60144 1109e9d8 60142->60144 60143->60140 60145 1109e958 GetTokenInformation 60143->60145 60144->59621 60145->60140 60146 1109e96a 60145->60146 60147 1109e99f EqualSid 60146->60147 60148 1109e973 AllocateAndInitializeSid 60146->60148 60147->60140 60149 1109e9ad 60147->60149 60148->60140 60148->60147 60150 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 60149->60150 60151 1109e9c2 60150->60151 60151->59621 60153 1114302a 60152->60153 60153->59637 60155 11163a4d 60154->60155 60156 11163a3b 60154->60156 60169 111639dc 78 API calls _LocaleUpdate::_LocaleUpdate 60155->60169 60156->59642 60158 11163a57 60158->59642 60160 11081c6d 60159->60160 60161 11081c72 60159->60161 60170 11081990 IsDBCSLeadByte 60160->60170 60163 11081c7b 60161->60163 60168 11081c93 60161->60168 60171 11163784 80 API calls 2 library calls 60163->60171 60165 11081c8c 60165->59638 60166 11081c99 60166->59638 60167 11165797 84 API calls std::locale::facet::_Facet_Register 60167->60168 60168->60166 60168->60167 60169->60158 60170->60161 60171->60165 60172->59657 60173 11115b70 60191 11145320 60173->60191 60176 11115bb5 60177 11115bc4 CoInitialize CoCreateInstance 60176->60177 60178 11115b98 60176->60178 60180 11115bf4 LoadLibraryA 60177->60180 60190 11115be9 60177->60190 60181 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 60178->60181 60179 111450a0 std::locale::facet::_Facet_Register 93 API calls 60179->60176 60183 11115c10 GetProcAddress 60180->60183 60180->60190 60182 11115ba6 60181->60182 60186 11115c20 SHGetSettings 60183->60186 60187 11115c34 FreeLibrary 60183->60187 60184 11115cd1 CoUninitialize 60185 11115cd7 60184->60185 60188 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 60185->60188 60186->60187 60187->60190 60189 11115ce6 60188->60189 60190->60184 60190->60185 60192 111450a0 std::locale::facet::_Facet_Register 93 API calls 60191->60192 60193 11115b8e 60192->60193 60193->60176 60193->60178 60193->60179 60194 11173a35 60217 1116b7b5 60194->60217 60196 11173a52 _LcidFromHexString 60197 11173a5f GetLocaleInfoA 60196->60197 60198 11173a86 60197->60198 60199 11173a92 60197->60199 60201 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 60198->60201 60222 111646ce 79 API calls 2 library calls 60199->60222 60203 11173c02 60201->60203 60202 11173a9e 60204 11173aa8 GetLocaleInfoA 60202->60204 60215 11173ad8 _CountryEnumProc@4 _strlen 60202->60215 60204->60198 60205 11173ac7 60204->60205 60223 111646ce 79 API calls 2 library calls 60205->60223 60206 11173b4b GetLocaleInfoA 60206->60198 60208 11173b6e 60206->60208 60225 111646ce 79 API calls 2 library calls 60208->60225 60210 11173b81 _strlen 60210->60198 60227 111739da GetLocaleInfoW _GetPrimaryLen _strlen 60210->60227 60211 11173ad2 60211->60215 60224 11163784 80 API calls 2 library calls 60211->60224 60213 11173b79 60213->60198 60213->60210 60226 111646ce 79 API calls 2 library calls 60213->60226 60215->60198 60215->60206 60228 1116b73c GetLastError 60217->60228 60219 1116b7bd 60220 1116b7ca 60219->60220 60242 1116d7aa 66 API calls 3 library calls 60219->60242 60220->60196 60222->60202 60223->60211 60224->60215 60225->60213 60226->60210 60227->60198 60243 1116b5fa TlsGetValue 60228->60243 60231 1116b7a9 SetLastError 60231->60219 60234 1116b76f DecodePointer 60235 1116b784 60234->60235 60236 1116b7a0 60235->60236 60237 1116b788 60235->60237 60239 11162be5 _free 62 API calls 60236->60239 60252 1116b688 66 API calls 4 library calls 60237->60252 60241 1116b7a6 60239->60241 60240 1116b790 GetCurrentThreadId 60240->60231 60241->60231 60244 1116b60f DecodePointer TlsSetValue 60243->60244 60245 1116b62a 60243->60245 60244->60245 60245->60231 60246 11169dbe 60245->60246 60249 11169dc7 60246->60249 60248 11169e04 60248->60231 60248->60234 60249->60248 60250 11169de5 Sleep 60249->60250 60253 11170166 60249->60253 60251 11169dfa 60250->60251 60251->60248 60251->60249 60252->60240 60254 11170172 60253->60254 60259 1117018d 60253->60259 60255 1117017e 60254->60255 60254->60259 60262 111692ef 66 API calls __getptd_noexit 60255->60262 60256 111701a0 RtlAllocateHeap 60258 111701c7 60256->60258 60256->60259 60258->60249 60259->60256 60259->60258 60263 1116d4a8 DecodePointer 60259->60263 60260 11170183 60260->60249 60262->60260 60263->60259 60264 1102e640 60265 1102e683 60264->60265 60266 1110f420 std::locale::facet::_Facet_Register 272 API calls 60265->60266 60267 1102e68a 60266->60267 60269 1102e6aa 60267->60269 61301 11142a60 60267->61301 60653 11142bb0 60269->60653 60272 1102e701 60275 11142bb0 85 API calls 60272->60275 60274 1102e6e6 60276 11081bb0 87 API calls 60274->60276 60280 1102e72a 60275->60280 60276->60272 60277 1102e766 60278 1102e7e5 CreateEventA 60277->60278 60279 1102e7bf GetSystemMetrics 60277->60279 60286 1102e805 60278->60286 60287 1102e819 60278->60287 60279->60278 60281 1102e7ce 60279->60281 60280->60277 60284 111450a0 std::locale::facet::_Facet_Register 93 API calls 60280->60284 60282 11146450 std::locale::facet::_Facet_Register 21 API calls 60281->60282 60285 1102e7d8 60282->60285 60284->60277 61319 1102d330 60285->61319 61463 11029450 272 API calls 2 library calls 60286->61463 60290 1110f420 std::locale::facet::_Facet_Register 272 API calls 60287->60290 60291 1102e820 60290->60291 60292 1102e840 60291->60292 60293 111100d0 415 API calls 60291->60293 60294 1110f420 std::locale::facet::_Facet_Register 272 API calls 60292->60294 60293->60292 60295 1102e854 60294->60295 60296 111100d0 415 API calls 60295->60296 60297 1102e874 60295->60297 60296->60297 60298 1110f420 std::locale::facet::_Facet_Register 272 API calls 60297->60298 60299 1102e8f3 60298->60299 60300 1110f420 std::locale::facet::_Facet_Register 272 API calls 60299->60300 60301 1102e93d 60300->60301 60302 1102e962 FindWindowA 60301->60302 61464 11060be0 278 API calls std::locale::facet::_Facet_Register 60301->61464 60305 1102eab7 60302->60305 60306 1102e99b 60302->60306 60659 110613d0 60305->60659 60306->60305 60309 1102e9b3 GetWindowThreadProcessId 60306->60309 60311 11146450 std::locale::facet::_Facet_Register 21 API calls 60309->60311 60310 110613d0 274 API calls 60312 1102ead5 60310->60312 60313 1102e9d9 OpenProcess 60311->60313 60314 110613d0 274 API calls 60312->60314 60313->60305 60315 1102e9f9 60313->60315 60316 1102eae1 60314->60316 61465 11094b30 100 API calls 60315->61465 60318 1102eaf8 60316->60318 60319 1102eaef 60316->60319 60666 11145910 60318->60666 61466 11027d60 120 API calls 2 library calls 60319->61466 60320 1102ea18 60323 11146450 std::locale::facet::_Facet_Register 21 API calls 60320->60323 60325 1102ea2c 60323->60325 60324 1102eaf4 60324->60318 60326 1102ea6b CloseHandle FindWindowA 60325->60326 60329 11146450 std::locale::facet::_Facet_Register 21 API calls 60325->60329 60327 1102ea93 GetWindowThreadProcessId 60326->60327 60328 1102eaa7 60326->60328 60327->60328 60330 11146450 std::locale::facet::_Facet_Register 21 API calls 60328->60330 60332 1102ea3e SendMessageA WaitForSingleObject 60329->60332 60333 1102eab4 60330->60333 60331 1102eb07 60681 11143230 60331->60681 60332->60326 60335 1102ea5e 60332->60335 60333->60305 60337 11146450 std::locale::facet::_Facet_Register 21 API calls 60335->60337 60336 1102eb2a 60338 1102ec01 60336->60338 60692 11062d60 60336->60692 60339 1102ea68 60337->60339 60707 110274c0 60338->60707 60339->60326 60343 110b7920 std::locale::facet::_Facet_Register 9 API calls 60345 1102ec26 60355 1102ec41 60345->60355 60726 1102a620 60345->60726 60353 1102a620 std::locale::facet::_Facet_Register 143 API calls 60353->60355 60729 110281a0 60355->60729 61526 11142ac0 60653->61526 60655 11142bc5 60656 1102e6d4 60655->60656 60657 11142ac0 IsDBCSLeadByte 60655->60657 60658 11165797 84 API calls std::locale::facet::_Facet_Register 60655->60658 60656->60272 61309 11081bb0 60656->61309 60657->60655 60658->60655 60660 11061446 60659->60660 60661 110613f7 60659->60661 60662 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 60660->60662 60661->60660 60663 11081bb0 87 API calls 60661->60663 61538 110612f0 274 API calls 4 library calls 60661->61538 60665 1102eac9 60662->60665 60663->60661 60665->60310 61539 11144bd0 60666->61539 60669 11144bd0 std::locale::facet::_Facet_Register 272 API calls 60670 11145947 wsprintfA 60669->60670 60671 11143230 std::locale::facet::_Facet_Register 8 API calls 60670->60671 60672 11145964 60671->60672 60673 11145990 60672->60673 60674 11143230 std::locale::facet::_Facet_Register 8 API calls 60672->60674 60675 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 60673->60675 60677 11145979 60674->60677 60676 1114599c 60675->60676 60676->60331 60677->60673 60678 11145980 60677->60678 60679 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 60678->60679 60680 1114598c 60679->60680 60680->60331 60682 11143251 CreateFileA 60681->60682 60684 111432ee CloseHandle 60682->60684 60685 111432ce 60682->60685 60688 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 60684->60688 60686 111432d2 CreateFileA 60685->60686 60687 1114330b 60685->60687 60686->60684 60686->60687 60690 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 60687->60690 60689 11143307 60688->60689 60689->60336 60691 1114331a 60690->60691 60691->60336 60693 1105dd10 78 API calls 60692->60693 60694 11062d88 60693->60694 61588 11061c90 60694->61588 60696 1102eb51 60696->60338 60696->60343 60698 1105de40 5 API calls 60699 11062de9 60698->60699 60700 1105dd10 78 API calls 60699->60700 60708 110274f4 60707->60708 60709 1105dd10 78 API calls 60708->60709 60712 11027509 60709->60712 60710 110275d8 60716 1102768c 60710->60716 60724 11081bb0 87 API calls 60710->60724 60725 111450a0 std::locale::facet::_Facet_Register 93 API calls 60710->60725 62391 110612f0 274 API calls 4 library calls 60710->62391 60711 1102755f LoadIconA 60714 11027571 60711->60714 60715 1102757a GetSystemMetrics GetSystemMetrics LoadImageA 60711->60715 60712->60710 60712->60711 60713 11145320 std::locale::facet::_Facet_Register 93 API calls 60712->60713 60720 11027542 LoadLibraryExA 60713->60720 60714->60715 60717 110275b3 60715->60717 60718 1102759f LoadIconA 60715->60718 60719 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 60716->60719 60717->60710 60722 110275b7 GetSystemMetrics GetSystemMetrics LoadImageA 60717->60722 60718->60717 60723 11027699 60719->60723 60720->60711 60720->60718 60722->60710 60723->60345 60724->60710 60725->60710 62392 110285f0 60726->62392 60728 1102a62e 60728->60353 60730 11146450 std::locale::facet::_Facet_Register 21 API calls 60729->60730 60731 110281c6 60730->60731 60732 110282b4 60731->60732 60733 110281dd GetModuleFileNameA 60731->60733 62426 11013830 22 API calls 2 library calls 60732->62426 60735 11081b40 std::locale::facet::_Facet_Register IsDBCSLeadByte 60733->60735 60737 11028201 60735->60737 60736 110282c7 60738 110282cd 60736->60738 60737->60738 60739 1102820e wsprintfA 60737->60739 60740 11146450 std::locale::facet::_Facet_Register 21 API calls 60738->60740 60742 11028242 60739->60742 60742->60738 61302 11142aa8 61301->61302 61305 11142a6e 61301->61305 61303 11142290 std::locale::facet::_Facet_Register 272 API calls 61302->61303 61304 11142ab0 61303->61304 61304->60269 61305->61302 61306 11142a92 61305->61306 63356 11142310 274 API calls std::locale::facet::_Facet_Register 61306->63356 61308 11142a98 61308->60269 61310 11081bbd 61309->61310 61311 11081bc2 61309->61311 63357 11081990 IsDBCSLeadByte 61310->63357 61313 11081bcb 61311->61313 61318 11081bdf 61311->61318 63358 111646ce 79 API calls 2 library calls 61313->63358 61315 11081c43 61315->60274 61316 11081bd8 61316->60274 61317 11165797 84 API calls std::locale::facet::_Facet_Register 61317->61318 61318->61315 61318->61317 61320 11146450 std::locale::facet::_Facet_Register 21 API calls 61319->61320 61321 1102d36c 61320->61321 61322 11145320 std::locale::facet::_Facet_Register 93 API calls 61321->61322 61323 1102d374 61322->61323 61324 1102d3a9 GetCurrentProcess SetPriorityClass 61323->61324 61325 1102d37d InterlockedIncrement 61323->61325 61327 1102d3dd 61324->61327 61325->61324 61326 1102d38c 61325->61326 61328 11146450 std::locale::facet::_Facet_Register 21 API calls 61326->61328 61329 1102d3e6 SetEvent 61327->61329 61333 1102d3ed 61327->61333 61330 1102d396 61328->61330 61329->61333 61331 1102d3a0 Sleep 61330->61331 61331->61331 61332 1102d424 61337 1102d452 61332->61337 63378 1109f1d0 280 API calls std::locale::facet::_Facet_Register 61332->63378 61333->61332 63376 11029370 278 API calls 2 library calls 61333->63376 61336 1102d40d 63377 110ff6c0 277 API calls 2 library calls 61336->63377 63359 11028090 SetEvent 61337->63359 61340 1102d468 61341 1102d47d 61340->61341 63379 110ec980 289 API calls 61340->63379 61343 1102d49f 61341->61343 63380 110594a0 SetEvent 61341->63380 61345 1102d4de 61343->61345 61346 1102d4b3 Sleep 61343->61346 61347 11146450 std::locale::facet::_Facet_Register 21 API calls 61345->61347 61346->61345 61348 1102d4e8 61347->61348 61349 1102d518 61348->61349 61350 1105dd10 78 API calls 61348->61350 61352 1102d53f 61349->61352 61355 1102d58a 61349->61355 61350->61349 63360 110affa0 61352->63360 61357 1102d5a9 61355->61357 61368 1102d5cb 61355->61368 61360 1102d5af PostThreadMessageA 61357->61360 61357->61368 61358 1102d613 61361 1102d62d 61358->61361 61372 11146450 std::locale::facet::_Facet_Register 21 API calls 61358->61372 63383 1110f3a0 WaitForSingleObject 61360->63383 61364 1102d66b 61361->61364 61365 1102d65c 61361->61365 61362 1102d5f0 63385 11059400 DeleteCriticalSection CloseHandle 61362->63385 61371 1102d681 61364->61371 61378 11075d10 402 API calls 61364->61378 63386 11105420 26 API calls std::locale::facet::_Facet_Register 61365->63386 61368->61358 61368->61362 63384 1110f3a0 WaitForSingleObject 61368->63384 61369 1102d56a 61374 1102d57d 61369->61374 63382 111352b0 304 API calls 5 library calls 61369->63382 61379 11146450 std::locale::facet::_Facet_Register 21 API calls 61371->61379 61372->61361 63405 1100d4e0 FreeLibrary 61374->63405 61376 1102d661 63387 11107b50 623 API calls std::locale::facet::_Facet_Register 61376->63387 61378->61371 61382 1102d68b 61379->61382 61381 1102d889 61385 1102d8a0 61381->61385 63406 1100d200 wsprintfA 61381->63406 61386 1113cc30 307 API calls 61382->61386 61383 1102d666 63388 11105ac0 354 API calls std::locale::facet::_Facet_Register 61383->63388 61394 1102d8c7 GetModuleFileNameA GetFileAttributesA 61385->61394 61407 1102d9fa 61385->61407 61389 1102d690 61386->61389 61391 11146450 std::locale::facet::_Facet_Register 21 API calls 61389->61391 61390 1102d895 61393 11146450 std::locale::facet::_Facet_Register 21 API calls 61390->61393 61392 1102d69a 61391->61392 61395 1102d6b7 61392->61395 61396 1102d6a9 61392->61396 61393->61385 61398 1102d8ef 61394->61398 61394->61407 61402 11146450 std::locale::facet::_Facet_Register 21 API calls 61395->61402 63389 1109d920 WaitForSingleObject SetEvent WaitForSingleObject CloseHandle 61396->63389 61397 11146450 std::locale::facet::_Facet_Register 21 API calls 61401 1102da92 61397->61401 61399 1110f420 std::locale::facet::_Facet_Register 272 API calls 61398->61399 61403 1102d8f6 61399->61403 63409 11146410 FreeLibrary 61401->63409 61406 1102d6c1 61402->61406 61409 11142a60 274 API calls 61403->61409 61422 1102d918 61403->61422 61415 1102d6d5 std::ios_base::_Ios_base_dtor 61406->61415 63390 1110e5c0 DeleteCriticalSection std::ios_base::_Ios_base_dtor 61406->63390 61407->61397 61408 1102da9a 61410 1102dad6 61408->61410 61413 1102dac4 ExitWindowsEx 61408->61413 61414 1102dab4 ExitWindowsEx Sleep 61408->61414 61409->61422 61416 1102dae6 61410->61416 61417 1102dadb Sleep 61410->61417 61412 1102d74f 61419 1102d75b 61412->61419 61420 1102d769 61412->61420 61413->61410 61414->61413 61415->61412 63391 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 61415->63391 61418 11146450 std::locale::facet::_Facet_Register 21 API calls 61416->61418 61417->61416 61424 1102daf0 ExitProcess 61418->61424 63393 1110fc70 285 API calls 2 library calls 61419->63393 61426 1102d7e2 61420->61426 61438 1102d760 std::ios_base::_Ios_base_dtor 61420->61438 61427 11142bb0 85 API calls 61422->61427 61429 11146450 std::locale::facet::_Facet_Register 21 API calls 61426->61429 61430 1102d93d 61427->61430 61431 1102d7ec 61429->61431 61432 1102d9e3 61430->61432 61435 11081b40 std::locale::facet::_Facet_Register IsDBCSLeadByte 61430->61435 61433 1102d7fb 61431->61433 61434 1102d809 CloseHandle 61431->61434 61432->61407 63395 1108a570 61433->63395 61440 1102d824 61434->61440 61441 1102d82a 61434->61441 61439 1102d953 61435->61439 61436 11146450 std::locale::facet::_Facet_Register 21 API calls 61454 1102d6ff std::ios_base::_Ios_base_dtor 61436->61454 61438->61420 61438->61426 63394 1110fc70 285 API calls 2 library calls 61438->63394 61443 1102d96e _memset 61439->61443 63407 11029450 272 API calls 2 library calls 61439->63407 61444 11162be5 _free 66 API calls 61440->61444 61462 1102d869 std::ios_base::_Ios_base_dtor 61441->61462 63402 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 61441->63402 61442 1102d800 std::ios_base::_Ios_base_dtor 61442->61434 61447 1102d988 FindFirstFileA 61443->61447 61444->61441 61449 1102d9d4 61447->61449 61451 1102d858 61451->61462 63404 1110fc70 285 API calls 2 library calls 61451->63404 61452 1102d7d9 std::ios_base::_Ios_base_dtor 61452->61426 61453 11162be5 _free 66 API calls 61456 1102d83c 61453->61456 61454->61412 61454->61436 63392 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 61454->63392 61456->61451 61456->61453 63403 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 61456->63403 61462->61374 61464->60302 61465->60320 61466->60324 61527 11142ad6 61526->61527 61528 11142b93 61527->61528 61533 11081a70 61527->61533 61528->60655 61530 11142afb 61531 11081a70 IsDBCSLeadByte 61530->61531 61532 11142b2b _memmove 61531->61532 61532->60655 61534 11081a7c 61533->61534 61536 11081a81 __mbschr_l std::locale::facet::_Facet_Register 61533->61536 61537 11081990 IsDBCSLeadByte 61534->61537 61536->61530 61537->61536 61538->60661 61540 11144bf2 61539->61540 61544 11144c09 std::locale::facet::_Facet_Register 61539->61544 61585 11029450 272 API calls 2 library calls 61540->61585 61543 11144d97 61545 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 61543->61545 61544->61543 61546 11144c3c GetModuleFileNameA 61544->61546 61547 11144db3 wsprintfA 61545->61547 61563 11081b40 61546->61563 61547->60669 61549 11144c51 61550 11144c61 SHGetFolderPathA 61549->61550 61551 11144d48 61549->61551 61553 11144c8e 61550->61553 61554 11144cad SHGetFolderPathA 61550->61554 61552 11142290 std::locale::facet::_Facet_Register 269 API calls 61551->61552 61552->61543 61553->61554 61557 11144c94 61553->61557 61556 11144ce2 61554->61556 61560 1102a620 std::locale::facet::_Facet_Register 143 API calls 61556->61560 61586 11029450 272 API calls 2 library calls 61557->61586 61561 11144cf3 61560->61561 61567 11144670 61561->61567 61564 11081b53 _strrchr 61563->61564 61566 11081b6a std::locale::facet::_Facet_Register 61564->61566 61587 11081990 IsDBCSLeadByte 61564->61587 61566->61549 61568 111446fa 61567->61568 61569 1114467b 61567->61569 61568->61551 61569->61568 61570 1114468b GetFileAttributesA 61569->61570 61571 111446a5 61570->61571 61572 11144697 61570->61572 61573 11163cf8 __strdup 66 API calls 61571->61573 61572->61551 61574 111446ac 61573->61574 61575 11081b40 std::locale::facet::_Facet_Register IsDBCSLeadByte 61574->61575 61576 111446b6 61575->61576 61577 11144670 std::locale::facet::_Facet_Register 67 API calls 61576->61577 61583 111446d3 61576->61583 61578 111446c6 61577->61578 61579 111446dc 61578->61579 61580 111446ce 61578->61580 61582 11162be5 _free 66 API calls 61579->61582 61581 11162be5 _free 66 API calls 61580->61581 61581->61583 61584 111446e1 CreateDirectoryA 61582->61584 61583->61551 61584->61583 61587->61566 61698 11144ea0 61588->61698 61590 11061d1c 61591 110d1550 275 API calls 61590->61591 61592 11061d30 61591->61592 61594 11061f17 61592->61594 61638 11061d44 std::ios_base::_Ios_base_dtor 61592->61638 61706 1116449d 61592->61706 61593 11062c88 61597 110d07c0 272 API calls 61593->61597 61596 1116449d _fgets 81 API calls 61594->61596 61595 11163db7 std::locale::facet::_Facet_Register 103 API calls 61595->61593 61600 11061f31 61596->61600 61630 11061e11 std::ios_base::_Ios_base_dtor 61597->61630 61599 11061dc7 61601 11061dce 61599->61601 61614 11061e1d _strpbrk std::locale::facet::_Facet_Register 61599->61614 61603 11061f38 61600->61603 61607 11061f97 _strpbrk 61600->61607 61602 11061e03 61601->61602 61754 11163db7 61601->61754 61606 110d07c0 272 API calls 61602->61606 61604 11061f7d 61603->61604 61609 11163db7 std::locale::facet::_Facet_Register 103 API calls 61603->61609 61610 110d07c0 272 API calls 61604->61610 61606->61630 61725 11163676 61607->61725 61608 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 61612 11062cbf 61608->61612 61609->61604 61610->61630 61612->60696 61612->60698 61612->60699 61614->61594 61618 11061eb8 61614->61618 61619 11061efd 61618->61619 61621 11163db7 std::locale::facet::_Facet_Register 103 API calls 61618->61621 61621->61619 61630->61608 61638->61593 61638->61595 61699 11144eb3 std::ios_base::_Ios_base_dtor 61698->61699 61701 11144ed5 GetLastError 61699->61701 61702 11144f1a std::ios_base::_Ios_base_dtor 61699->61702 61791 11163fed 61699->61791 61701->61699 61703 11144ee0 Sleep 61701->61703 61702->61590 61704 11163fed std::locale::facet::_Facet_Register 138 API calls 61703->61704 61705 11144ef2 61704->61705 61705->61699 61705->61702 61708 111644a9 _doexit 61706->61708 61707 111644bc 62200 111692ef 66 API calls __getptd_noexit 61707->62200 61708->61707 61710 111644ed 61708->61710 61712 111644f2 __lock_file 61710->61712 61718 111644cc _doexit 61710->61718 61711 111644c1 62201 1116df04 11 API calls strtoxl 61711->62201 61714 11164506 61712->61714 61720 11164571 61712->61720 62202 11169287 61714->62202 61716 1116459e 62211 111645cd LeaveCriticalSection LeaveCriticalSection __fsopen 61716->62211 61718->61599 61720->61716 62180 11171a25 61720->62180 61721 1116450c 61721->61720 61726 1116368f 61725->61726 62270 11163420 61726->62270 61755 11163dc3 _doexit 61754->61755 61794 11163f31 61791->61794 61793 11163fff 61793->61699 61796 11163f3d _doexit 61794->61796 61795 11163f50 61851 111692ef 66 API calls __getptd_noexit 61795->61851 61796->61795 61798 11163f7d 61796->61798 61813 111716f8 61798->61813 61799 11163f55 61852 1116df04 11 API calls strtoxl 61799->61852 61808 11163f60 _doexit @_EH4_CallFilterFunc@8 61808->61793 61814 11171704 _doexit 61813->61814 61856 1117373c 61814->61856 61816 11171787 61863 11171822 61816->61863 61817 1117178e 61894 11169d79 61817->61894 61827 11171712 61827->61816 61827->61817 61866 1117367a 61827->61866 61893 1116b048 LeaveCriticalSection LeaveCriticalSection _doexit 61827->61893 61851->61799 61852->61808 61857 11173764 EnterCriticalSection 61856->61857 61858 11173751 61856->61858 61857->61827 61859 1117367a __mtinitlocknum 65 API calls 61858->61859 61860 11173757 61859->61860 61860->61857 61900 1116d7aa 66 API calls 3 library calls 61860->61900 61901 11173663 LeaveCriticalSection 61863->61901 61867 11173686 _doexit 61866->61867 61868 11173696 61867->61868 61869 111736ae 61867->61869 61893->61827 61896 11169d82 61894->61896 62181 11171a32 62180->62181 62185 11171a47 62180->62185 62245 111692ef 66 API calls __getptd_noexit 62181->62245 62183 11171a37 62186 11171a7c 62185->62186 62191 11171a42 62185->62191 62212 1117712e 62185->62212 62191->61720 62200->61711 62201->61718 62203 11169293 62202->62203 62204 111692a8 62202->62204 62268 111692ef 66 API calls __getptd_noexit 62203->62268 62204->61721 62211->61718 62213 11169d79 __malloc_crt 66 API calls 62212->62213 62245->62183 62282 11163399 62270->62282 62391->60710 62393 11028613 62392->62393 62394 11028c5b 62392->62394 62395 110286d0 GetModuleFileNameA 62393->62395 62404 11028648 62393->62404 62397 11028cf7 62394->62397 62398 11028d0a 62394->62398 62396 110286f1 _strrchr 62395->62396 62402 11163fed std::locale::facet::_Facet_Register 138 API calls 62396->62402 62400 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 62397->62400 62399 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 62398->62399 62401 11028d1b 62399->62401 62403 11028d06 62400->62403 62401->60728 62405 110286cb 62402->62405 62403->60728 62406 11163fed std::locale::facet::_Facet_Register 138 API calls 62404->62406 62405->62394 62420 11026890 81 API calls 2 library calls 62405->62420 62406->62405 62409 11028744 62420->62409 62426->60736 63356->61308 63357->61311 63358->61316 63359->61340 63410 110805f0 63360->63410 63365 1102d54a 63369 110eb080 63365->63369 63366 110affe7 63422 11029450 272 API calls 2 library calls 63366->63422 63370 110affa0 274 API calls 63369->63370 63371 110eb0ad 63370->63371 63438 110ea450 63371->63438 63373 110eb0f1 63448 110b0190 274 API calls std::locale::facet::_Facet_Register 63373->63448 63375 1102d555 63381 110b0190 274 API calls std::locale::facet::_Facet_Register 63375->63381 63376->61336 63377->61332 63378->61337 63379->61341 63380->61343 63381->61369 63382->61374 63383->61357 63384->61368 63386->61376 63387->61383 63388->61364 63390->61415 63391->61454 63392->61454 63393->61438 63394->61452 63396 1108a617 63395->63396 63399 1108a5aa std::ios_base::_Ios_base_dtor 63395->63399 63397 1108a61e DeleteCriticalSection 63396->63397 63451 1106e1b0 63397->63451 63398 1108a5be CloseHandle 63398->63399 63399->63396 63399->63398 63401 1108a644 std::ios_base::_Ios_base_dtor 63401->61442 63402->61456 63403->61456 63404->61462 63405->61381 63406->61390 63409->61408 63411 11080614 63410->63411 63412 11080618 63411->63412 63413 1108062f 63411->63413 63423 11029450 272 API calls 2 library calls 63412->63423 63415 11080648 63413->63415 63416 1108062c 63413->63416 63419 110aff90 63415->63419 63416->63413 63424 11029450 272 API calls 2 library calls 63416->63424 63425 110812d0 63419->63425 63426 1108131d 63425->63426 63427 110812f1 63425->63427 63429 1108136a wsprintfA 63426->63429 63430 11081345 wsprintfA 63426->63430 63427->63426 63428 1108130b 63427->63428 63431 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 63428->63431 63437 11029450 272 API calls 2 library calls 63429->63437 63430->63426 63433 11081319 63431->63433 63433->63365 63433->63366 63440 110ea45b 63438->63440 63439 110ea4f5 63439->63373 63440->63439 63441 110ea47e 63440->63441 63442 110ea495 63440->63442 63449 11029450 272 API calls 2 library calls 63441->63449 63444 110ea492 63442->63444 63445 110ea4c2 SendMessageTimeoutA 63442->63445 63444->63442 63450 11029450 272 API calls 2 library calls 63444->63450 63445->63439 63448->63375 63454 1106e1c4 63451->63454 63452 1106e1c8 63452->63401 63454->63452 63455 1106d9a0 67 API calls 2 library calls 63454->63455 63455->63454 63470 11022aa0 63471 11022aba 63470->63471 63472 11022bad 63470->63472 63477 11022b83 63471->63477 63478 11022ada 63471->63478 63481 11022b97 63471->63481 63487 11022b31 63471->63487 63491 11022afa 63471->63491 63473 11022c07 63472->63473 63474 11022bb5 63472->63474 63473->63487 63505 11022a70 418 API calls _free 63473->63505 63475 11022bfc 63474->63475 63483 11022bb7 63474->63483 63504 1101e5b0 308 API calls 2 library calls 63475->63504 63503 1101e8c0 274 API calls 63477->63503 63485 11022aeb SetFocus 63478->63485 63478->63487 63482 11022c32 63483->63487 63489 11022bd5 63483->63489 63493 11089a40 63483->63493 63485->63487 63486 11022c05 63486->63487 63490 11022b4b 63487->63490 63506 110cb890 7 API calls 63487->63506 63491->63487 63502 1101f9e0 338 API calls 2 library calls 63491->63502 63494 1110f6c0 ___DllMainCRTStartup 4 API calls 63493->63494 63496 11089a53 63494->63496 63495 11089a5d 63498 11089a84 63495->63498 63511 11089150 275 API calls std::locale::facet::_Facet_Register 63495->63511 63496->63495 63510 11089150 275 API calls std::locale::facet::_Facet_Register 63496->63510 63501 11089a93 63498->63501 63507 11089a10 63498->63507 63501->63487 63502->63487 63503->63487 63504->63486 63505->63487 63506->63482 63512 110896a0 63507->63512 63510->63495 63511->63498 63549 11088970 6 API calls ___DllMainCRTStartup 63512->63549 63514 110896d9 GetParent 63515 110896ec 63514->63515 63516 110896fd 63514->63516 63517 110896f0 GetParent 63515->63517 63518 11163fed std::locale::facet::_Facet_Register 138 API calls 63516->63518 63517->63516 63517->63517 63519 11089716 std::ios_base::_Ios_base_dtor 63518->63519 63550 11013830 22 API calls 2 library calls 63519->63550 63521 1108974a 63521->63521 63522 11143230 std::locale::facet::_Facet_Register 8 API calls 63521->63522 63524 1108978a std::ios_base::_Ios_base_dtor 63522->63524 63523 110897a5 63525 11163db7 std::locale::facet::_Facet_Register 103 API calls 63523->63525 63527 110897c3 63523->63527 63524->63523 63526 11142290 std::locale::facet::_Facet_Register 272 API calls 63524->63526 63525->63527 63526->63523 63529 1102a620 std::locale::facet::_Facet_Register 143 API calls 63527->63529 63540 11089874 std::ios_base::_Ios_base_dtor 63527->63540 63528 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 63530 11089962 63528->63530 63531 11089813 63529->63531 63530->63501 63532 11142290 std::locale::facet::_Facet_Register 272 API calls 63531->63532 63533 1108981b 63532->63533 63534 11081b40 std::locale::facet::_Facet_Register IsDBCSLeadByte 63533->63534 63535 11089832 63534->63535 63536 11081bb0 87 API calls 63535->63536 63535->63540 63537 1108984a 63536->63537 63538 1108988e 63537->63538 63539 11089851 63537->63539 63542 11081bb0 87 API calls 63538->63542 63551 110b75d0 63539->63551 63540->63528 63544 11089899 63542->63544 63544->63540 63546 110b75d0 68 API calls 63544->63546 63545 110b75d0 68 API calls 63545->63540 63547 110898a6 63546->63547 63547->63540 63548 110b75d0 68 API calls 63547->63548 63548->63540 63549->63514 63550->63521 63554 110b75b0 63551->63554 63557 111672e3 63554->63557 63560 11167264 63557->63560 63561 11167271 63560->63561 63562 1116728b 63560->63562 63578 11169302 66 API calls __getptd_noexit 63561->63578 63562->63561 63563 11167294 GetFileAttributesA 63562->63563 63566 111672a2 GetLastError 63563->63566 63572 111672b8 63563->63572 63565 11167276 63579 111692ef 66 API calls __getptd_noexit 63565->63579 63581 11169315 66 API calls 3 library calls 63566->63581 63569 11089857 63569->63540 63569->63545 63570 1116727d 63580 1116df04 11 API calls strtoxl 63570->63580 63571 111672ae 63582 111692ef 66 API calls __getptd_noexit 63571->63582 63572->63569 63583 11169302 66 API calls __getptd_noexit 63572->63583 63576 111672cb 63584 111692ef 66 API calls __getptd_noexit 63576->63584 63578->63565 63579->63570 63580->63569 63581->63571 63582->63569 63583->63576 63584->63571 63585 11134d10 63586 11134d48 63585->63586 63587 11134d19 63585->63587 63588 11145320 std::locale::facet::_Facet_Register 93 API calls 63587->63588 63589 11134d1e 63588->63589 63589->63586 63590 11132bf0 280 API calls 63589->63590 63591 11134d27 63590->63591 63591->63586 63592 1105dd10 78 API calls 63591->63592 63592->63586 63593 110310c0 63594 110310ce 63593->63594 63595 11145e80 272 API calls 63594->63595 63596 110310df SetUnhandledExceptionFilter 63595->63596 63597 110310ef std::locale::facet::_Facet_Register 63596->63597 63598 11040860 63599 11040892 63598->63599 63600 11040898 63599->63600 63605 110408b4 63599->63605 63602 110facc0 15 API calls 63600->63602 63601 110409c8 63603 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 63601->63603 63604 110408aa CloseHandle 63602->63604 63607 110409d5 63603->63607 63604->63605 63605->63601 63612 110408ed 63605->63612 63630 11087ee0 304 API calls 5 library calls 63605->63630 63606 11040948 63620 110facc0 GetTokenInformation 63606->63620 63610 1104095a 63611 11040962 CloseHandle 63610->63611 63615 11040969 63610->63615 63611->63615 63612->63601 63612->63606 63613 110409ab 63616 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 63613->63616 63614 11040991 63617 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 63614->63617 63615->63613 63615->63614 63618 110409c4 63616->63618 63619 110409a7 63617->63619 63621 110fad08 63620->63621 63622 110facf7 63620->63622 63631 110f1f50 9 API calls 63621->63631 63623 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 63622->63623 63625 110fad04 63623->63625 63625->63610 63626 110fad2c 63626->63622 63627 110fad34 63626->63627 63628 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 63627->63628 63629 110fad5a 63628->63629 63629->63610 63630->63612 63631->63626 63632 111071e0 63633 111071ec 63632->63633 63634 1110721d 63633->63634 63635 111450a0 std::locale::facet::_Facet_Register 93 API calls 63633->63635 63679 11106100 284 API calls std::locale::facet::_Facet_Register 63634->63679 63638 11107201 63635->63638 63637 11107223 63638->63634 63642 111062e0 63638->63642 63641 11107218 63680 11163180 63642->63680 63644 111062fb LoadLibraryA 63691 11137340 283 API calls 2 library calls 63644->63691 63646 11106361 63647 11106365 63646->63647 63648 1110637d 63646->63648 63647->63648 63649 1110636a 63647->63649 63650 111450a0 std::locale::facet::_Facet_Register 93 API calls 63648->63650 63651 11106375 63649->63651 63652 1110636e FreeLibrary 63649->63652 63653 11106386 63650->63653 63656 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 63651->63656 63652->63651 63654 111063a1 LoadLibraryA GetProcAddress 63653->63654 63655 11106397 63653->63655 63657 111064d1 SetLastError 63654->63657 63667 11106443 63654->63667 63655->63654 63658 11106665 63656->63658 63659 1110660f 63657->63659 63658->63634 63658->63641 63660 111450a0 std::locale::facet::_Facet_Register 93 API calls 63659->63660 63661 11106624 63660->63661 63662 11106635 FreeLibrary 63661->63662 63663 1110663c 63661->63663 63662->63663 63663->63651 63664 11106640 FreeLibrary 63663->63664 63664->63651 63665 111064f2 OpenProcess 63665->63667 63672 11106497 63665->63672 63666 111064a5 GetProcAddress 63668 111064de SetLastError 63666->63668 63666->63672 63667->63659 63667->63665 63667->63672 63681 11025d00 63667->63681 63668->63672 63670 111065e5 CloseHandle 63670->63659 63670->63672 63671 11081b40 std::locale::facet::_Facet_Register IsDBCSLeadByte 63671->63672 63672->63659 63672->63665 63672->63666 63672->63667 63672->63670 63672->63671 63673 11081bb0 87 API calls 63672->63673 63674 11106556 OpenProcessToken 63672->63674 63675 11106574 GetTokenInformation 63672->63675 63676 111065d8 CloseHandle 63672->63676 63692 11106100 284 API calls std::locale::facet::_Facet_Register 63672->63692 63693 110f5e90 25 API calls std::locale::facet::_Facet_Register 63672->63693 63673->63672 63674->63670 63674->63672 63675->63672 63675->63676 63676->63670 63679->63637 63680->63644 63682 11025d0e GetProcAddress 63681->63682 63683 11025d1f 63681->63683 63682->63683 63684 11025d38 63683->63684 63685 11025d2c K32GetProcessImageFileNameA 63683->63685 63687 11025d3e GetProcAddress 63684->63687 63688 11025d4f 63684->63688 63685->63684 63686 11025d71 63685->63686 63686->63672 63687->63688 63689 11025d56 63688->63689 63690 11025d67 SetLastError 63688->63690 63689->63672 63690->63686 63691->63646 63692->63672 63693->63672 63694 110173f0 GetTickCount 63701 11017300 63694->63701 63699 11146450 std::locale::facet::_Facet_Register 21 API calls 63700 11017437 63699->63700 63702 11017320 63701->63702 63703 110173d6 63701->63703 63704 11017342 CoInitialize _GetRawWMIStringW 63702->63704 63706 11017339 WaitForSingleObject 63702->63706 63705 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 63703->63705 63707 110173c2 63704->63707 63710 11017375 63704->63710 63708 110173e5 63705->63708 63706->63704 63707->63703 63709 110173d0 CoUninitialize 63707->63709 63714 11017220 63708->63714 63709->63703 63710->63707 63711 110173bc 63710->63711 63713 11163a2d std::locale::facet::_Facet_Register 78 API calls 63710->63713 63727 11163837 __fassign 63711->63727 63713->63710 63715 11017240 63714->63715 63722 110172e6 63714->63722 63716 11017258 CoInitialize _GetRawWMIStringW 63715->63716 63718 1101724f WaitForSingleObject 63715->63718 63719 110172d2 63716->63719 63723 1101728b 63716->63723 63717 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 63720 110172f5 SetEvent GetTickCount 63717->63720 63718->63716 63721 110172e0 CoUninitialize 63719->63721 63719->63722 63720->63699 63721->63722 63722->63717 63723->63719 63724 110172cc 63723->63724 63726 11163a2d std::locale::facet::_Facet_Register 78 API calls 63723->63726 63728 11163837 __fassign 63724->63728 63726->63723 63727->63707 63728->63719 63729 11025cd0 LoadLibraryA 63730 1113cd60 63731 1113cd69 63730->63731 63732 1113cd6e 63730->63732 63734 11139090 63731->63734 63735 111390d2 63734->63735 63736 111390c7 GetCurrentThreadId 63734->63736 63737 111390e0 63735->63737 63861 11029330 63735->63861 63736->63735 63868 11133920 63737->63868 63743 111391d1 63749 11139202 FindWindowA 63743->63749 63752 1113929a 63743->63752 63744 1113974a 63745 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 63744->63745 63747 11139772 63745->63747 63747->63732 63748 1113911c IsWindow IsWindowVisible 63750 11146450 std::locale::facet::_Facet_Register 21 API calls 63748->63750 63751 11139217 IsWindowVisible 63749->63751 63749->63752 63753 11139147 63750->63753 63751->63752 63754 1113921e 63751->63754 63755 1105dd10 78 API calls 63752->63755 63764 111392bf 63752->63764 63756 1105dd10 78 API calls 63753->63756 63754->63752 63757 11138c30 352 API calls 63754->63757 63774 111392e7 63755->63774 63759 11139163 IsWindowVisible 63756->63759 63762 1113923f IsWindowVisible 63757->63762 63758 1105dd10 78 API calls 63768 1113945f 63758->63768 63759->63743 63765 11139171 63759->63765 63760 1113948a 63763 111394a7 63760->63763 64097 1106b860 288 API calls 63760->64097 63761 11138c30 352 API calls 63761->63760 63762->63752 63766 1113924e IsIconic 63762->63766 63776 111394b4 63763->63776 63777 111394bd 63763->63777 63764->63758 63764->63768 63765->63743 63769 11139179 63765->63769 63766->63752 63770 1113925f GetForegroundWindow 63766->63770 63768->63760 63768->63761 63771 11146450 std::locale::facet::_Facet_Register 21 API calls 63769->63771 64095 11131210 145 API calls 63770->64095 63772 11139183 GetForegroundWindow 63771->63772 63778 11139192 EnableWindow 63772->63778 63779 111391be 63772->63779 63774->63764 63775 11139334 63774->63775 63781 11081a70 IsDBCSLeadByte 63774->63781 63783 11143230 std::locale::facet::_Facet_Register 8 API calls 63775->63783 64098 11131b00 89 API calls 2 library calls 63776->64098 63784 111394d4 63777->63784 63785 111394c8 63777->63785 64093 11131210 145 API calls 63778->64093 63779->63743 63795 111391ca SetForegroundWindow 63779->63795 63780 1113926e 64096 11131210 145 API calls 63780->64096 63781->63775 63790 11139346 63783->63790 64100 111317a0 290 API calls std::locale::facet::_Facet_Register 63784->64100 63791 111394d9 63785->63791 63792 111394cd 63785->63792 63789 111394ba 63789->63777 63797 11139353 GetLastError 63790->63797 63810 11139361 63790->63810 63794 11139599 63791->63794 63800 111394f1 63791->63800 63801 1113959b 63791->63801 64099 11131870 290 API calls std::locale::facet::_Facet_Register 63792->64099 63793 111391a9 64094 11131210 145 API calls 63793->64094 63802 111386b0 306 API calls 63794->63802 63795->63743 63796 11139275 63803 1113928b EnableWindow 63796->63803 63807 11139284 SetForegroundWindow 63796->63807 63804 11146450 std::locale::facet::_Facet_Register 21 API calls 63797->63804 63800->63794 63812 1110f420 std::locale::facet::_Facet_Register 272 API calls 63800->63812 63801->63794 64106 1103f000 68 API calls 63801->64106 63823 111395ee 63802->63823 63803->63752 63804->63810 63805 111394d2 63805->63791 63806 111391b0 EnableWindow 63806->63779 63807->63803 63808 11139615 63808->63744 63819 1105dd10 78 API calls 63808->63819 63810->63764 63811 111393b2 63810->63811 63814 11081a70 IsDBCSLeadByte 63810->63814 63816 11143230 std::locale::facet::_Facet_Register 8 API calls 63811->63816 63815 11139512 63812->63815 63813 111395aa 64107 1103f040 68 API calls 63813->64107 63814->63811 63820 11139544 63815->63820 63821 11139524 63815->63821 63822 111393c4 63816->63822 63818 111395b5 64108 1103f060 68 API calls 63818->64108 63825 11139645 63819->63825 64102 1110f260 InterlockedIncrement 63820->64102 64101 110573b0 294 API calls std::locale::facet::_Facet_Register 63821->64101 63822->63764 63827 111393cb GetLastError 63822->63827 63823->63808 64011 11142210 63823->64011 63825->63744 63837 11139662 63825->63837 63838 1113968d 63825->63838 63831 11146450 std::locale::facet::_Facet_Register 21 API calls 63827->63831 63829 111395c0 64109 1103f020 68 API calls 63829->64109 63830 11139533 63830->63820 63831->63764 63834 11139558 64103 1104e340 279 API calls 63834->64103 63835 111395cb 64110 1110f270 InterlockedDecrement 63835->64110 63840 1113966a 63837->63840 63841 11139699 GetTickCount 63837->63841 63838->63744 63838->63841 63843 11146450 std::locale::facet::_Facet_Register 21 API calls 63840->63843 63841->63744 63844 111396ab 63841->63844 63842 1113956e 64104 1104e3b0 279 API calls 63842->64104 63846 11139675 GetTickCount 63843->63846 63847 11142e80 143 API calls 63844->63847 63846->63744 63848 111396b7 63847->63848 63849 11146ee0 274 API calls 63848->63849 63850 111396c2 63849->63850 63851 11142e80 143 API calls 63850->63851 63853 111396d5 63851->63853 63852 11139579 63852->63794 64105 110ebf30 293 API calls 63852->64105 64111 11025bb0 LoadLibraryA 63853->64111 63856 111396e2 63856->63856 64112 1112c7a0 GetProcAddress SetLastError 63856->64112 63858 11139729 63859 11139733 FreeLibrary 63858->63859 63860 1113973a std::ios_base::_Ios_base_dtor 63858->63860 63859->63860 63860->63744 64113 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 63861->64113 63863 1102933e 63864 11029353 63863->63864 64114 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 63863->64114 64115 11089cc0 276 API calls 2 library calls 63864->64115 63867 1102935e 63867->63737 63869 11133962 63868->63869 63870 11133c84 63868->63870 63872 1105dd10 78 API calls 63869->63872 63871 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 63870->63871 63874 11133c9c 63871->63874 63873 11133982 63872->63873 63873->63870 63875 1113398a GetLocalTime 63873->63875 63916 11133400 63874->63916 63876 111339c1 LoadLibraryA 63875->63876 63877 111339a0 63875->63877 64116 110098c0 LoadLibraryA 63876->64116 63878 11146450 std::locale::facet::_Facet_Register 21 API calls 63877->63878 63880 111339b5 63878->63880 63880->63876 63881 11133a15 64117 11015c30 LoadLibraryA 63881->64117 63883 11133a20 GetCurrentProcess 63884 11133a45 GetProcAddress 63883->63884 63885 11133a5d GetProcessHandleCount 63883->63885 63884->63885 63886 11133a66 SetLastError 63884->63886 63887 11133a6e 63885->63887 63886->63887 63888 11133a92 63887->63888 63889 11133a78 GetProcAddress 63887->63889 63891 11133aa0 GetProcAddress 63888->63891 63894 11133aba 63888->63894 63889->63888 63890 11133ac7 SetLastError 63889->63890 63890->63891 63892 11133ad4 SetLastError 63891->63892 63891->63894 63893 11133adf GetProcAddress 63892->63893 63895 11133af1 K32GetProcessMemoryInfo 63893->63895 63896 11133aff SetLastError 63893->63896 63894->63893 63897 11133b07 63895->63897 63896->63897 63898 11146450 std::locale::facet::_Facet_Register 21 API calls 63897->63898 63902 11133b7d 63897->63902 63898->63902 63899 11133c5a 63900 11133c6a FreeLibrary 63899->63900 63901 11133c6d 63899->63901 63900->63901 63903 11133c77 FreeLibrary 63901->63903 63904 11133c7a 63901->63904 63902->63899 63906 1105dd10 78 API calls 63902->63906 63903->63904 63904->63870 63905 11133c81 FreeLibrary 63904->63905 63905->63870 63907 11133bce 63906->63907 63908 1105dd10 78 API calls 63907->63908 63909 11133bf6 63908->63909 63910 1105dd10 78 API calls 63909->63910 63911 11133c1d 63910->63911 63912 1105dd10 78 API calls 63911->63912 63913 11133c44 63912->63913 63913->63899 63914 11133c55 63913->63914 64118 11027780 272 API calls 2 library calls 63914->64118 63918 1113342d 63916->63918 63917 111338e9 63917->63743 63917->63744 64015 11138c30 63917->64015 63918->63917 63919 110d1550 275 API calls 63918->63919 63920 1113348e 63919->63920 63921 110d1550 275 API calls 63920->63921 63922 11133499 63921->63922 63923 111334c7 63922->63923 63924 111334de 63922->63924 64119 11029450 272 API calls 2 library calls 63923->64119 63926 11146450 std::locale::facet::_Facet_Register 21 API calls 63924->63926 63928 111334ec 63926->63928 63929 11133505 63928->63929 63930 1113351c 63928->63930 64120 11029450 272 API calls 2 library calls 63929->64120 63932 11081bb0 87 API calls 63930->63932 63934 1113352a 63932->63934 63935 11133541 63934->63935 64121 11009450 272 API calls std::locale::facet::_Facet_Register 63934->64121 63937 11146450 std::locale::facet::_Facet_Register 21 API calls 63935->63937 63941 111335e5 63935->63941 63938 11133556 63937->63938 63938->63941 63942 11146450 std::locale::facet::_Facet_Register 21 API calls 63938->63942 63939 1113353b 63940 11081a70 IsDBCSLeadByte 63939->63940 63940->63935 63943 11146450 std::locale::facet::_Facet_Register 21 API calls 63941->63943 63958 1113368e 63941->63958 63944 11133580 63942->63944 63952 111335f7 63943->63952 64122 110ed7a0 RegCloseKey 63944->64122 63946 11133598 64123 110ed430 277 API calls 3 library calls 63946->64123 63947 110ed1a0 2 API calls 63947->63952 63949 111335a9 64124 1102a0b0 272 API calls std::locale::facet::_Facet_Register 63949->64124 63952->63947 63954 1113365b 63952->63954 63952->63958 64126 110ed430 277 API calls 3 library calls 63952->64126 63953 111335b3 63955 11146450 std::locale::facet::_Facet_Register 21 API calls 63953->63955 63956 111335ca 63953->63956 63954->63952 64127 11029450 272 API calls 2 library calls 63954->64127 63955->63956 63956->63941 64125 1102a0b0 272 API calls std::locale::facet::_Facet_Register 63956->64125 63959 111336c1 63958->63959 63960 111336aa 63958->63960 63963 111336be 63959->63963 63967 111336ec 63959->63967 63972 11133734 63959->63972 64128 11029450 272 API calls 2 library calls 63960->64128 63963->63959 64129 11029450 272 API calls 2 library calls 63963->64129 63964 111337cc 63969 11133816 63964->63969 63970 111337ff 63964->63970 63965 11133779 63965->63964 63966 11162be5 _free 66 API calls 63965->63966 63968 1113378b 63966->63968 63973 11081b40 std::locale::facet::_Facet_Register IsDBCSLeadByte 63967->63973 63984 111337b3 63968->63984 63985 1113379c 63968->63985 63981 11133813 63969->63981 63990 11133845 63969->63990 64002 111338a1 63969->64002 64134 11029450 272 API calls 2 library calls 63970->64134 63972->63964 63972->63965 63976 11133752 63972->63976 63977 11133769 63972->63977 63978 111336f7 63973->63978 64132 11029450 272 API calls 2 library calls 63976->64132 63979 11081bb0 87 API calls 63977->63979 63978->63972 63992 11133725 63978->63992 63993 1113370e 63978->63993 63979->63965 63980 110d07c0 272 API calls 63983 111338da 63980->63983 63981->63969 64135 11029450 272 API calls 2 library calls 63981->64135 63987 110d07c0 272 API calls 63983->63987 63989 11163cf8 __strdup 66 API calls 63984->63989 64133 11029450 272 API calls 2 library calls 63985->64133 63987->63917 63995 111337bc 63989->63995 63991 11081bb0 87 API calls 63990->63991 63997 11133853 63991->63997 64131 110d0800 272 API calls 2 library calls 63992->64131 64130 11029450 272 API calls 2 library calls 63993->64130 64000 11146450 std::locale::facet::_Facet_Register 21 API calls 63995->64000 63997->64002 64004 11133868 63997->64004 64005 1113387f 63997->64005 64000->63964 64002->63980 64136 11029450 272 API calls 2 library calls 64004->64136 64007 11081a70 IsDBCSLeadByte 64005->64007 64009 1113388a 64007->64009 64009->64002 64137 11009450 272 API calls std::locale::facet::_Facet_Register 64009->64137 64012 1114221a 64011->64012 64014 1114222f 64011->64014 64138 11141890 64012->64138 64014->63808 64018 11138c4d 64015->64018 64069 1113906f 64015->64069 64016 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 64017 1113907e 64016->64017 64017->63748 64019 111450a0 std::locale::facet::_Facet_Register 93 API calls 64018->64019 64018->64069 64020 11138c8c 64019->64020 64021 1105dd10 78 API calls 64020->64021 64020->64069 64022 11138cbb 64021->64022 64270 1112c920 64022->64270 64024 11138e00 PostMessageA 64026 11138e15 64024->64026 64025 1105dd10 78 API calls 64028 11138dfc 64025->64028 64027 11138e25 64026->64027 64279 1110f270 InterlockedDecrement 64026->64279 64030 11138e2b 64027->64030 64031 11138e4d 64027->64031 64028->64024 64028->64026 64033 11138e83 std::ios_base::_Ios_base_dtor 64030->64033 64034 11138e9e 64030->64034 64280 11130410 294 API calls std::locale::facet::_Facet_Register 64031->64280 64039 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 64033->64039 64036 11142e80 143 API calls 64034->64036 64035 11138e55 64281 1112cb20 SetDlgItemTextA 64035->64281 64038 11138ea3 64036->64038 64040 11146ee0 274 API calls 64038->64040 64042 11138e9a 64039->64042 64043 11138eaa SetWindowTextA 64040->64043 64042->63748 64045 11138ec6 64043->64045 64051 11138ecd std::ios_base::_Ios_base_dtor 64043->64051 64044 11138e70 std::ios_base::_Ios_base_dtor 64044->64030 64282 111352b0 304 API calls 5 library calls 64045->64282 64046 11145b40 278 API calls 64048 11138dab 64046->64048 64048->64024 64048->64025 64049 11138f24 64052 11138f38 64049->64052 64053 11138ffc 64049->64053 64050 11138ef7 64050->64049 64056 11138f0c 64050->64056 64051->64049 64051->64050 64283 111352b0 304 API calls 5 library calls 64051->64283 64057 11138f5c 64052->64057 64285 111352b0 304 API calls 5 library calls 64052->64285 64055 1113901d 64053->64055 64059 1113900b 64053->64059 64060 11139004 64053->64060 64291 110f8640 88 API calls 64055->64291 64284 11131210 145 API calls 64056->64284 64287 110f8640 88 API calls 64057->64287 64290 11131210 145 API calls 64059->64290 64289 111352b0 304 API calls 5 library calls 64060->64289 64063 11139028 64063->64069 64070 1113902c IsWindowVisible 64063->64070 64065 11138f67 64065->64069 64072 11138f6f IsWindowVisible 64065->64072 64067 11138f1c 64067->64049 64069->64016 64070->64069 64074 1113903e IsWindowVisible 64070->64074 64071 11138f46 64071->64057 64075 11138f52 64071->64075 64072->64069 64076 11138f86 64072->64076 64073 1113901a 64073->64055 64074->64069 64077 1113904b EnableWindow 64074->64077 64286 11131210 145 API calls 64075->64286 64079 111450a0 std::locale::facet::_Facet_Register 93 API calls 64076->64079 64292 11131210 145 API calls 64077->64292 64082 11138f91 64079->64082 64081 11138f59 64081->64057 64082->64069 64084 11138f9c GetForegroundWindow IsWindowVisible 64082->64084 64083 11139062 EnableWindow 64083->64069 64085 11138fc1 64084->64085 64086 11138fb6 EnableWindow 64084->64086 64288 11131210 145 API calls 64085->64288 64086->64085 64088 11138fc8 64089 11138fde EnableWindow 64088->64089 64090 11138fd7 SetForegroundWindow 64088->64090 64091 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 64089->64091 64090->64089 64092 11138ff8 64091->64092 64092->63748 64093->63793 64094->63806 64095->63780 64096->63796 64097->63763 64098->63789 64099->63805 64100->63791 64101->63830 64102->63834 64103->63842 64104->63852 64105->63794 64106->63813 64107->63818 64108->63829 64109->63835 64110->63794 64111->63856 64112->63858 64113->63863 64114->63863 64115->63867 64116->63881 64117->63883 64118->63899 64121->63939 64122->63946 64123->63949 64124->63953 64125->63941 64126->63952 64131->63972 64137->64002 64139 111418cf 64138->64139 64182 111418c8 std::ios_base::_Ios_base_dtor 64138->64182 64140 1110f420 std::locale::facet::_Facet_Register 272 API calls 64139->64140 64143 111418d6 64140->64143 64141 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 64142 1114220a 64141->64142 64142->64014 64144 11061700 96 API calls 64143->64144 64145 11141942 64144->64145 64146 11141949 RegCloseKey 64145->64146 64147 11141950 64145->64147 64146->64147 64148 11143230 std::locale::facet::_Facet_Register 8 API calls 64147->64148 64149 11141980 64148->64149 64150 11141997 64149->64150 64151 11062d60 319 API calls 64149->64151 64152 1110f420 std::locale::facet::_Facet_Register 272 API calls 64150->64152 64151->64150 64153 1114199e 64152->64153 64154 111419ba 64153->64154 64255 11060be0 278 API calls std::locale::facet::_Facet_Register 64153->64255 64156 1110f420 std::locale::facet::_Facet_Register 272 API calls 64154->64156 64157 111419d3 64156->64157 64158 111419ef 64157->64158 64256 11060be0 278 API calls std::locale::facet::_Facet_Register 64157->64256 64160 1110f420 std::locale::facet::_Facet_Register 272 API calls 64158->64160 64161 11141a08 64160->64161 64162 11141a24 64161->64162 64257 11060be0 278 API calls std::locale::facet::_Facet_Register 64161->64257 64164 11060760 275 API calls 64162->64164 64165 11141a4d 64164->64165 64166 11060760 275 API calls 64165->64166 64199 11141a67 64166->64199 64167 11141d95 64169 110d1550 275 API calls 64167->64169 64171 11142179 64167->64171 64168 110607f0 281 API calls 64168->64199 64170 11141db3 64169->64170 64175 1105dd10 78 API calls 64170->64175 64268 11060640 69 API calls std::ios_base::_Ios_base_dtor 64171->64268 64172 11141d85 64174 11146450 std::locale::facet::_Facet_Register 21 API calls 64172->64174 64173 11146450 21 API calls std::locale::facet::_Facet_Register 64173->64199 64174->64167 64176 11141df0 64175->64176 64179 11060760 275 API calls 64176->64179 64184 11141f3d 64176->64184 64178 111421d2 64269 11060640 69 API calls std::ios_base::_Ios_base_dtor 64178->64269 64181 11141e0e 64179->64181 64183 110607f0 281 API calls 64181->64183 64182->64141 64192 11141e1d 64183->64192 64261 110679c0 288 API calls std::locale::facet::_Facet_Register 64184->64261 64186 11141e52 64187 11060760 275 API calls 64186->64187 64190 11141e68 64187->64190 64188 11141f83 64191 11141fb3 EnterCriticalSection 64188->64191 64201 11141f87 64188->64201 64189 11146450 std::locale::facet::_Facet_Register 21 API calls 64189->64192 64193 110607f0 281 API calls 64190->64193 64195 11060420 278 API calls 64191->64195 64192->64186 64192->64189 64196 110607f0 281 API calls 64192->64196 64211 11141e78 64193->64211 64194 111319f0 87 API calls 64194->64199 64205 11141fd0 64195->64205 64196->64192 64197 11081c60 88 API calls std::locale::facet::_Facet_Register 64197->64199 64199->64167 64199->64168 64199->64172 64199->64173 64199->64194 64199->64197 64202 11081bb0 87 API calls 64199->64202 64200 11141eb1 64203 11060760 275 API calls 64200->64203 64201->64191 64262 110508e0 353 API calls 4 library calls 64201->64262 64263 110679c0 288 API calls std::locale::facet::_Facet_Register 64201->64263 64202->64199 64207 11141ec7 64203->64207 64204 11141ffa LeaveCriticalSection 64209 1114204e 64204->64209 64210 1114200e 64204->64210 64205->64204 64208 1102a9f0 290 API calls 64205->64208 64206 11146450 std::locale::facet::_Facet_Register 21 API calls 64206->64211 64213 110607f0 281 API calls 64207->64213 64214 11141ff7 64208->64214 64215 11133400 279 API calls 64209->64215 64210->64209 64218 11146450 std::locale::facet::_Facet_Register 21 API calls 64210->64218 64211->64200 64211->64206 64216 110607f0 281 API calls 64211->64216 64227 11141ed6 64213->64227 64214->64204 64217 11142058 64215->64217 64216->64211 64220 110d1550 275 API calls 64217->64220 64222 1114201c 64218->64222 64219 11141f11 64258 11060640 69 API calls std::ios_base::_Ios_base_dtor 64219->64258 64224 11142066 64220->64224 64226 1113cc30 307 API calls 64222->64226 64223 11146450 std::locale::facet::_Facet_Register 21 API calls 64223->64227 64264 110cff20 272 API calls std::locale::facet::_Facet_Register 64224->64264 64225 11141f1f 64259 11060640 69 API calls std::ios_base::_Ios_base_dtor 64225->64259 64229 11142021 64226->64229 64227->64219 64227->64223 64230 110607f0 281 API calls 64227->64230 64232 111414a0 969 API calls 64229->64232 64230->64227 64231 11141f2e 64260 11060640 69 API calls std::ios_base::_Ios_base_dtor 64231->64260 64235 11142027 64232->64235 64235->64209 64236 11146450 std::locale::facet::_Facet_Register 21 API calls 64235->64236 64238 11142040 64236->64238 64237 110d07c0 272 API calls 64239 1114215b 64237->64239 64241 11026ba0 404 API calls 64238->64241 64242 110d07c0 272 API calls 64239->64242 64240 1114209c 64243 111420c3 64240->64243 64244 111420da 64240->64244 64249 1114211f 64240->64249 64241->64209 64242->64171 64265 11029450 272 API calls 2 library calls 64243->64265 64246 11081bb0 87 API calls 64244->64246 64248 111420eb 64246->64248 64248->64249 64266 11009450 272 API calls std::locale::facet::_Facet_Register 64248->64266 64249->64237 64251 111420ff 64252 11081a70 IsDBCSLeadByte 64251->64252 64253 11142105 64252->64253 64253->64249 64267 11009450 272 API calls std::locale::facet::_Facet_Register 64253->64267 64255->64154 64256->64158 64257->64162 64258->64225 64259->64231 64260->64184 64261->64188 64262->64201 64263->64201 64264->64240 64266->64251 64267->64249 64268->64178 64269->64182 64271 1112c93c 64270->64271 64272 1112c977 64271->64272 64273 1112c964 64271->64273 64293 1106b860 288 API calls 64272->64293 64275 11146ee0 274 API calls 64273->64275 64276 1112c96f 64275->64276 64277 1112c9c3 64276->64277 64278 11142290 std::locale::facet::_Facet_Register 272 API calls 64276->64278 64277->64046 64277->64048 64278->64277 64279->64027 64280->64035 64281->64044 64282->64051 64283->64050 64284->64067 64285->64071 64286->64081 64287->64065 64288->64088 64289->64059 64290->64073 64291->64063 64292->64083 64293->64276 64294 11144200 64295 11144211 64294->64295 64308 11143c20 64295->64308 64299 11144295 64301 111442b2 64299->64301 64304 11144294 64299->64304 64300 1114425b 64302 11144262 ResetEvent 64300->64302 64316 11143de0 272 API calls 2 library calls 64302->64316 64304->64299 64317 11143de0 272 API calls 2 library calls 64304->64317 64305 11144276 SetEvent WaitForMultipleObjects 64305->64302 64305->64304 64307 111442af 64307->64301 64309 11143c2c GetCurrentProcess 64308->64309 64310 11143c4f 64308->64310 64309->64310 64311 11143c3d GetModuleFileNameA 64309->64311 64312 1110f420 std::locale::facet::_Facet_Register 270 API calls 64310->64312 64314 11143c79 WaitForMultipleObjects 64310->64314 64311->64310 64313 11143c6b 64312->64313 64313->64314 64318 11143570 GetModuleFileNameA 64313->64318 64314->64299 64314->64300 64316->64305 64317->64307 64319 111435f3 64318->64319 64320 111435b3 64318->64320 64323 111435ff LoadLibraryA 64319->64323 64324 11143619 GetModuleHandleA GetProcAddress 64319->64324 64321 11081b40 std::locale::facet::_Facet_Register IsDBCSLeadByte 64320->64321 64322 111435c1 64321->64322 64322->64319 64327 111435c8 LoadLibraryA 64322->64327 64323->64324 64328 1114360e LoadLibraryA 64323->64328 64325 11143647 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 64324->64325 64326 11143639 64324->64326 64329 11143673 10 API calls 64325->64329 64326->64329 64327->64319 64328->64324 64330 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 64329->64330 64331 111436f0 64330->64331 64331->64314 64332 1115bde0 64333 1115bdf4 64332->64333 64334 1115bdec 64332->64334 64344 111631ab 64333->64344 64337 1115be14 64339 1115bf40 64340 11162be5 _free 66 API calls 64339->64340 64341 1115bf68 64340->64341 64342 1115bf24 SetLastError 64343 1115be31 64342->64343 64343->64339 64343->64342 64343->64343 64345 11170166 __calloc_crt 66 API calls 64344->64345 64346 111631c5 64345->64346 64350 1115be08 64346->64350 64368 111692ef 66 API calls __getptd_noexit 64346->64368 64348 111631d8 64348->64350 64369 111692ef 66 API calls __getptd_noexit 64348->64369 64350->64337 64350->64339 64351 1115ba20 CoInitializeSecurity CoCreateInstance 64350->64351 64352 1115ba95 wsprintfW SysAllocString 64351->64352 64353 1115bc14 64351->64353 64354 1115badb 64352->64354 64355 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 64353->64355 64357 1115bc01 SysFreeString 64354->64357 64358 1115bbe9 64354->64358 64359 1115bb6c 64354->64359 64360 1115bb5a wsprintfW 64354->64360 64356 1115bc40 64355->64356 64356->64343 64357->64353 64358->64357 64370 110974a0 64359->64370 64360->64359 64362 1115bb7e 64363 110974a0 273 API calls 64362->64363 64364 1115bb93 64363->64364 64375 11097550 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 64364->64375 64366 1115bbd7 64376 11097550 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 64366->64376 64368->64348 64369->64350 64371 1110f420 std::locale::facet::_Facet_Register 272 API calls 64370->64371 64372 110974d3 64371->64372 64373 110974e6 SysAllocString 64372->64373 64374 11097504 64372->64374 64373->64374 64374->64362 64375->64366 64376->64358 64377 1116970d 64378 1116971d 64377->64378 64379 11169718 64377->64379 64383 11169617 64378->64383 64395 11177075 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 64379->64395 64382 1116972b 64384 11169623 _doexit 64383->64384 64385 11169670 64384->64385 64387 111696c0 _doexit 64384->64387 64396 111694b3 64384->64396 64385->64387 64443 11025e20 64385->64443 64387->64382 64389 11169683 64390 11025e20 ___DllMainCRTStartup 7 API calls 64389->64390 64394 111696a0 64389->64394 64392 11169697 64390->64392 64391 111694b3 __CRT_INIT@12 117 API calls 64391->64387 64393 111694b3 __CRT_INIT@12 117 API calls 64392->64393 64393->64394 64394->64387 64394->64391 64395->64378 64397 111694bf _doexit 64396->64397 64398 111694c7 64397->64398 64399 11169541 64397->64399 64452 1116d4d0 HeapCreate 64398->64452 64400 11169547 64399->64400 64401 111695a2 64399->64401 64407 11169565 64400->64407 64411 111694d0 _doexit 64400->64411 64498 1116d79b 66 API calls _doexit 64400->64498 64403 111695a7 64401->64403 64404 11169600 64401->64404 64406 1116b5fa ___set_flsgetvalue 3 API calls 64403->64406 64404->64411 64504 1116b8fe 80 API calls __freefls@4 64404->64504 64405 111694cc 64405->64411 64453 1116b96c GetModuleHandleW 64405->64453 64410 111695ac 64406->64410 64413 11169579 64407->64413 64499 1117140e 67 API calls _free 64407->64499 64415 11169dbe __calloc_crt 66 API calls 64410->64415 64411->64385 64502 1116958c 70 API calls __mtterm 64413->64502 64417 111695b8 64415->64417 64417->64411 64422 111695c4 DecodePointer 64417->64422 64418 1116956f 64500 1116b64b 70 API calls _free 64418->64500 64421 111694dc __RTC_Initialize 64424 111694ec GetCommandLineA ___crtGetEnvironmentStringsA 64421->64424 64441 111694e0 64421->64441 64427 111695d9 64422->64427 64423 11169574 64501 1116d4ee HeapDestroy 64423->64501 64478 111711c9 GetStartupInfoW 64424->64478 64429 111695f4 64427->64429 64430 111695dd 64427->64430 64432 11162be5 _free 66 API calls 64429->64432 64503 1116b688 66 API calls 4 library calls 64430->64503 64432->64411 64433 11169511 __setargv 64437 1116952a 64433->64437 64438 1116951a __setenvp 64433->64438 64434 1116950a 64496 1116b64b 70 API calls _free 64434->64496 64435 111695e4 GetCurrentThreadId 64435->64411 64437->64411 64497 1117140e 67 API calls _free 64437->64497 64438->64437 64439 11169523 64438->64439 64491 1116d5ae 64439->64491 64495 1116d4ee HeapDestroy 64441->64495 64444 1110f7d0 64443->64444 64445 1110f804 ___DllMainCRTStartup 64444->64445 64446 1110f7f1 64444->64446 64447 1110f7dc 64444->64447 64445->64389 64511 1110f720 64446->64511 64447->64445 64449 1110f720 ___DllMainCRTStartup 7 API calls 64447->64449 64451 1110f7e5 64449->64451 64450 1110f7f8 64450->64389 64451->64389 64452->64405 64454 1116b980 64453->64454 64455 1116b989 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 64453->64455 64505 1116b64b 70 API calls _free 64454->64505 64457 1116b9d3 TlsAlloc 64455->64457 64460 1116ba21 TlsSetValue 64457->64460 64462 1116bae2 64457->64462 64459 1116b985 64459->64421 64461 1116ba32 64460->64461 64460->64462 64506 1116d557 EncodePointer EncodePointer __init_pointers _doexit __initp_misc_winsig 64461->64506 64462->64421 64464 1116ba37 EncodePointer EncodePointer EncodePointer EncodePointer 64507 111735c2 InitializeCriticalSectionAndSpinCount 64464->64507 64466 1116ba76 64467 1116badd 64466->64467 64468 1116ba7a DecodePointer 64466->64468 64509 1116b64b 70 API calls _free 64467->64509 64470 1116ba8f 64468->64470 64470->64467 64471 11169dbe __calloc_crt 66 API calls 64470->64471 64472 1116baa5 64471->64472 64472->64467 64473 1116baad DecodePointer 64472->64473 64474 1116babe 64473->64474 64474->64467 64475 1116bac2 64474->64475 64508 1116b688 66 API calls 4 library calls 64475->64508 64477 1116baca GetCurrentThreadId 64477->64462 64479 11169dbe __calloc_crt 66 API calls 64478->64479 64480 111711e7 64479->64480 64480->64480 64481 1117135c 64480->64481 64483 11169dbe __calloc_crt 66 API calls 64480->64483 64485 11169506 64480->64485 64487 111712dc 64480->64487 64482 11171392 GetStdHandle 64481->64482 64484 111713f6 SetHandleCount 64481->64484 64486 111713a4 GetFileType 64481->64486 64490 111713ca InitializeCriticalSectionAndSpinCount 64481->64490 64482->64481 64483->64480 64484->64485 64485->64433 64485->64434 64486->64481 64487->64481 64488 11171313 InitializeCriticalSectionAndSpinCount 64487->64488 64489 11171308 GetFileType 64487->64489 64488->64485 64488->64487 64489->64487 64489->64488 64490->64481 64490->64485 64492 1116d5bc __IsNonwritableInCurrentImage 64491->64492 64510 1116c9cb EncodePointer 64492->64510 64494 1116d5da __initterm_e __IsNonwritableInCurrentImage 64494->64437 64495->64411 64496->64441 64497->64434 64498->64407 64499->64418 64500->64423 64501->64413 64502->64411 64503->64435 64504->64411 64505->64459 64506->64464 64507->64466 64508->64477 64509->64462 64510->64494 64512 1110f764 EnterCriticalSection 64511->64512 64513 1110f74f InitializeCriticalSection 64511->64513 64514 1110f785 64512->64514 64513->64512 64515 1110f7b3 LeaveCriticalSection 64514->64515 64516 1110f6c0 ___DllMainCRTStartup 4 API calls 64514->64516 64515->64450 64516->64514 64517 db1020 GetCommandLineA 64518 db1035 GetStartupInfoA 64517->64518 64520 db108b 64518->64520 64521 db1090 GetModuleHandleA 64518->64521 64520->64521 64524 db1000 _NSMClient32 64521->64524 64523 db10a2 ExitProcess 64524->64523 64525 110304b8 64526 11142a60 274 API calls 64525->64526 64527 110304c6 64526->64527 64528 11142bb0 85 API calls 64527->64528 64529 11030503 64528->64529 64530 11030518 64529->64530 64531 11081bb0 87 API calls 64529->64531 64532 110ed1a0 2 API calls 64530->64532 64531->64530 64533 1103053f 64532->64533 64534 11030589 64533->64534 64597 110ed250 6 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 64533->64597 64538 11142bb0 85 API calls 64534->64538 64536 11030554 64598 110ed250 6 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 64536->64598 64540 110305a0 64538->64540 64539 1103056b 64539->64534 64541 111463d0 19 API calls 64539->64541 64542 1110f420 std::locale::facet::_Facet_Register 272 API calls 64540->64542 64541->64534 64543 110305af 64542->64543 64544 110305d0 64543->64544 64599 11088860 275 API calls 64543->64599 64576 1108a470 64544->64576 64547 110305e3 OpenMutexA 64548 11030603 CreateMutexA 64547->64548 64549 1103071a CloseHandle 64547->64549 64550 11030623 64548->64550 64551 1108a570 69 API calls 64549->64551 64552 1110f420 std::locale::facet::_Facet_Register 272 API calls 64550->64552 64554 11030730 64551->64554 64553 11030638 64552->64553 64555 1103065b 64553->64555 64600 11060be0 278 API calls std::locale::facet::_Facet_Register 64553->64600 64556 11161d01 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 64554->64556 64587 11015c30 LoadLibraryA 64555->64587 64558 110310b3 64556->64558 64560 1103066d 64561 111450a0 std::locale::facet::_Facet_Register 93 API calls 64560->64561 64562 1103067c 64561->64562 64563 11030689 64562->64563 64564 1103069c 64562->64564 64588 11145ae0 64563->64588 64566 110306a6 GetProcAddress 64564->64566 64567 11030690 64564->64567 64566->64567 64568 110306c0 SetLastError 64566->64568 64569 110281a0 47 API calls 64567->64569 64568->64567 64570 110306cd 64569->64570 64601 110092f0 418 API calls std::locale::facet::_Facet_Register 64570->64601 64572 110306dc 64573 110306f0 WaitForSingleObject 64572->64573 64573->64573 64574 11030702 CloseHandle 64573->64574 64574->64549 64575 11030713 FreeLibrary 64574->64575 64575->64549 64577 1110f420 std::locale::facet::_Facet_Register 272 API calls 64576->64577 64578 1108a4a7 64577->64578 64579 1108a4c9 InitializeCriticalSection 64578->64579 64580 1110f420 std::locale::facet::_Facet_Register 272 API calls 64578->64580 64583 1108a52a 64579->64583 64582 1108a4c2 64580->64582 64582->64579 64602 1116219a 66 API calls std::exception::_Copy_str 64582->64602 64583->64547 64585 1108a4f9 64603 111625f1 RaiseException 64585->64603 64587->64560 64589 111450a0 std::locale::facet::_Facet_Register 93 API calls 64588->64589 64590 11145af2 64589->64590 64591 11145b30 64590->64591 64592 11145af9 LoadLibraryA 64590->64592 64591->64567 64593 11145b2a 64592->64593 64594 11145b0b GetProcAddress 64592->64594 64593->64567 64595 11145b23 FreeLibrary 64594->64595 64596 11145b1b 64594->64596 64595->64593 64596->64595 64597->64536 64598->64539 64599->64544 64600->64555 64601->64572 64602->64585 64603->64579

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 716 1109e190-1109e1f2 call 1109d980 719 1109e1f8-1109e21b call 1109d440 716->719 720 1109e810 716->720 725 1109e221-1109e235 LocalAlloc 719->725 726 1109e384-1109e386 719->726 721 1109e812-1109e82d call 11161d01 720->721 728 1109e23b-1109e26d InitializeSecurityDescriptor SetSecurityDescriptorDacl GetVersionExA 725->728 729 1109e805-1109e80b call 1109d4d0 725->729 730 1109e316-1109e33b CreateFileMappingA 726->730 731 1109e2fa-1109e310 728->731 732 1109e273-1109e29e call 1109d3a0 call 1109d3f0 728->732 729->720 734 1109e388-1109e39b GetLastError 730->734 735 1109e33d-1109e35d GetLastError call 1112ef20 730->735 731->730 762 1109e2e9-1109e2f1 732->762 763 1109e2a0-1109e2d6 GetSecurityDescriptorSacl 732->763 737 1109e39d 734->737 738 1109e3a2-1109e3b9 MapViewOfFile 734->738 746 1109e368-1109e370 735->746 747 1109e35f-1109e366 LocalFree 735->747 737->738 741 1109e3bb-1109e3d6 call 1112ef20 738->741 742 1109e3f7-1109e3ff 738->742 765 1109e3d8-1109e3d9 LocalFree 741->765 766 1109e3db-1109e3e3 741->766 744 1109e4a1-1109e4b3 742->744 745 1109e405-1109e41e GetModuleFileNameA 742->745 750 1109e4f9-1109e512 call 11161d20 GetTickCount 744->750 751 1109e4b5-1109e4b8 744->751 752 1109e4bd-1109e4d8 call 1112ef20 745->752 753 1109e424-1109e42d 745->753 754 1109e372-1109e373 LocalFree 746->754 755 1109e375-1109e37f 746->755 747->746 781 1109e514-1109e519 750->781 758 1109e59f-1109e603 GetCurrentProcessId GetModuleFileNameA call 1109d810 751->758 779 1109e4da-1109e4db LocalFree 752->779 780 1109e4dd-1109e4e5 752->780 753->752 759 1109e433-1109e436 753->759 754->755 761 1109e7fe-1109e800 call 1109d8c0 755->761 783 1109e60b-1109e622 CreateEventA 758->783 784 1109e605 758->784 768 1109e479-1109e49c call 1112ef20 call 1109d8c0 759->768 769 1109e438-1109e43c 759->769 761->729 762->731 773 1109e2f3-1109e2f4 FreeLibrary 762->773 763->762 772 1109e2d8-1109e2e3 SetSecurityDescriptorSacl 763->772 765->766 775 1109e3e8-1109e3f2 766->775 776 1109e3e5-1109e3e6 LocalFree 766->776 768->744 769->768 778 1109e43e-1109e449 769->778 772->762 773->731 775->761 776->775 785 1109e450-1109e454 778->785 779->780 786 1109e4ea-1109e4f4 780->786 787 1109e4e7-1109e4e8 LocalFree 780->787 788 1109e51b-1109e52a 781->788 789 1109e52c 781->789 793 1109e624-1109e643 GetLastError * 2 call 1112ef20 783->793 794 1109e646-1109e64e 783->794 784->783 791 1109e470-1109e472 785->791 792 1109e456-1109e458 785->792 786->761 787->786 788->781 788->789 795 1109e52e-1109e534 789->795 802 1109e475-1109e477 791->802 799 1109e45a-1109e460 792->799 800 1109e46c-1109e46e 792->800 793->794 803 1109e650 794->803 804 1109e656-1109e667 CreateEventA 794->804 797 1109e545-1109e59d 795->797 798 1109e536-1109e543 795->798 797->758 798->795 798->797 799->791 805 1109e462-1109e46a 799->805 800->802 802->752 802->768 803->804 807 1109e669-1109e688 GetLastError * 2 call 1112ef20 804->807 808 1109e68b-1109e693 804->808 805->785 805->800 807->808 809 1109e69b-1109e6ad CreateEventA 808->809 810 1109e695 808->810 812 1109e6af-1109e6ce GetLastError * 2 call 1112ef20 809->812 813 1109e6d1-1109e6d9 809->813 810->809 812->813 816 1109e6db 813->816 817 1109e6e1-1109e6f2 CreateEventA 813->817 816->817 819 1109e714-1109e722 817->819 820 1109e6f4-1109e711 GetLastError * 2 call 1112ef20 817->820 822 1109e724-1109e725 LocalFree 819->822 823 1109e727-1109e72f 819->823 820->819 822->823 825 1109e731-1109e732 LocalFree 823->825 826 1109e734-1109e73d 823->826 825->826 827 1109e743-1109e746 826->827 828 1109e7e7-1109e7f9 call 1112ef20 826->828 827->828 830 1109e74c-1109e74f 827->830 828->761 830->828 832 1109e755-1109e758 830->832 832->828 833 1109e75e-1109e761 832->833 834 1109e76c-1109e788 CreateThread 833->834 835 1109e763-1109e769 GetCurrentThreadId 833->835 836 1109e78a-1109e794 834->836 837 1109e796-1109e7a0 834->837 835->834 836->761 838 1109e7ba-1109e7e5 SetEvent call 1112ef20 call 1109d4d0 837->838 839 1109e7a2-1109e7b8 ResetEvent * 3 837->839 838->721 839->838
                                                                                                          APIs
                                                                                                            • Part of subcall function 1109D440: GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,C213C15D,00080000,00000000,00000000), ref: 1109D46D
                                                                                                            • Part of subcall function 1109D440: OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                                            • Part of subcall function 1109D440: LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                                            • Part of subcall function 1109D440: AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                                          • LocalAlloc.KERNEL32(00000040,00000014,SeSecurityPrivilege,?,00080000,C213C15D,00080000,00000000,00000000), ref: 1109E225
                                                                                                          • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 1109E23E
                                                                                                          • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 1109E249
                                                                                                          • GetVersionExA.KERNEL32(?), ref: 1109E260
                                                                                                          • GetSecurityDescriptorSacl.ADVAPI32(?,?,?,?,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2CE
                                                                                                          • SetSecurityDescriptorSacl.ADVAPI32(00000000,00000001,?,00000000), ref: 1109E2E3
                                                                                                          • FreeLibrary.KERNEL32(00000001,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2F4
                                                                                                          • CreateFileMappingA.KERNEL32(000000FF,11030063,00000004,00000000,?,?), ref: 1109E330
                                                                                                          • GetLastError.KERNEL32 ref: 1109E33D
                                                                                                          • LocalFree.KERNEL32(?), ref: 1109E366
                                                                                                          • LocalFree.KERNEL32(?), ref: 1109E373
                                                                                                          • GetLastError.KERNEL32 ref: 1109E390
                                                                                                          • MapViewOfFile.KERNEL32(?,000F001F,00000000,00000000,00000000), ref: 1109E3AE
                                                                                                          • LocalFree.KERNEL32(?), ref: 1109E3D9
                                                                                                          • LocalFree.KERNEL32(?), ref: 1109E3E6
                                                                                                            • Part of subcall function 1109D3A0: LoadLibraryA.KERNEL32(Advapi32.dll,00000000,1109E27E), ref: 1109D3A8
                                                                                                            • Part of subcall function 1109D3F0: GetProcAddress.KERNEL32(00000000,ConvertStringSecurityDescriptorToSecurityDescriptorA), ref: 1109D404
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E412
                                                                                                          • LocalFree.KERNEL32(?), ref: 1109E4DB
                                                                                                          • LocalFree.KERNEL32(?), ref: 1109E4E8
                                                                                                          • _memset.LIBCMT ref: 1109E500
                                                                                                          • GetTickCount.KERNEL32 ref: 1109E508
                                                                                                          • GetCurrentProcessId.KERNEL32 ref: 1109E5B4
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E5CF
                                                                                                          • CreateEventA.KERNEL32(?,00000000,00000000,?,?,?,?,?,?), ref: 1109E61B
                                                                                                          • GetLastError.KERNEL32 ref: 1109E624
                                                                                                          • GetLastError.KERNEL32(00000000), ref: 1109E62B
                                                                                                          • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E660
                                                                                                          • GetLastError.KERNEL32 ref: 1109E669
                                                                                                          • GetLastError.KERNEL32(00000000), ref: 1109E670
                                                                                                          • CreateEventA.KERNEL32(?,00000001,00000000,?), ref: 1109E6A6
                                                                                                          • GetLastError.KERNEL32 ref: 1109E6AF
                                                                                                          • GetLastError.KERNEL32(00000000), ref: 1109E6B6
                                                                                                          • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E6EB
                                                                                                          • GetLastError.KERNEL32 ref: 1109E6FA
                                                                                                          • GetLastError.KERNEL32(00000000), ref: 1109E6FD
                                                                                                          • LocalFree.KERNEL32(?), ref: 1109E725
                                                                                                          • LocalFree.KERNEL32(?), ref: 1109E732
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 1109E763
                                                                                                          • CreateThread.KERNEL32(00000000,00002000,Function_0009DD20,00000000,00000000,00000030), ref: 1109E77D
                                                                                                          • ResetEvent.KERNEL32(?), ref: 1109E7AC
                                                                                                          • ResetEvent.KERNEL32(?), ref: 1109E7B2
                                                                                                          • ResetEvent.KERNEL32(?), ref: 1109E7B8
                                                                                                          • SetEvent.KERNEL32(?), ref: 1109E7BE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$FreeLocal$Event$Create$DescriptorFileSecurity$CurrentProcessReset$LibraryModuleNameSaclThreadToken$AddressAdjustAllocCountDaclInitializeLoadLookupMappingOpenPrivilegePrivilegesProcTickValueVersionView_memset
                                                                                                          • String ID: Cant create event %s, e=%d (x%x)$Error cant create events$Error cant map view$Error creating filemap (%d)$Error filemap exists$IPC(%s) created$Info - reusing existing filemap$S:(ML;;NW;;;LW)$SeSecurityPrivilege$cant create events$cant create filemap$cant create thread$cant map$map exists$warning map exists
                                                                                                          • API String ID: 3291243470-2792520954
                                                                                                          • Opcode ID: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                                          • Instruction ID: e0f3534def007632db5cc521867dfefedb1bc63d92e862916d16df31d0e36df5
                                                                                                          • Opcode Fuzzy Hash: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                                          • Instruction Fuzzy Hash: 221282B590026D9FE724DF61CCD4EAEF7BABB88308F0049A9E11997244D771AD84CF51

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 844 11029590-1102961e LoadLibraryA 845 11029621-11029626 844->845 846 11029628-1102962b 845->846 847 1102962d-11029630 845->847 848 11029645-1102964a 846->848 849 11029632-11029635 847->849 850 11029637-11029642 847->850 851 11029679-11029685 848->851 852 1102964c-11029651 848->852 849->848 850->848 853 1102972a-1102972d 851->853 854 1102968b-110296a3 call 11162b51 851->854 855 11029653-1102966a GetProcAddress 852->855 856 1102966c-1102966f 852->856 858 11029748-11029760 InternetOpenA 853->858 859 1102972f-11029746 GetProcAddress 853->859 865 110296c4-110296d0 854->865 866 110296a5-110296be GetProcAddress 854->866 855->856 860 11029671-11029673 SetLastError 855->860 856->851 864 11029784-11029790 call 11162be5 858->864 859->858 863 11029779-11029781 SetLastError 859->863 860->851 863->864 870 11029796-110297c7 call 11142290 call 11164390 864->870 871 11029a0a-11029a14 864->871 873 110296d2-110296db GetLastError 865->873 876 110296f1-110296f3 865->876 866->865 868 11029762-1102976a SetLastError 866->868 868->873 895 110297c9-110297cc 870->895 896 110297cf-110297e4 call 11081a70 * 2 870->896 871->845 875 11029a1a 871->875 873->876 877 110296dd-110296ef call 11162be5 call 11162b51 873->877 879 11029a2c-11029a2f 875->879 880 11029710-1102971c 876->880 881 110296f5-1102970e GetProcAddress 876->881 877->876 885 11029a31-11029a36 879->885 886 11029a3b-11029a3e 879->886 880->853 899 1102971e-11029727 880->899 881->880 884 1102976f-11029777 SetLastError 881->884 884->853 890 11029b9f-11029ba7 885->890 891 11029a40-11029a45 886->891 892 11029a4a 886->892 897 11029bb0-11029bc3 890->897 898 11029ba9-11029baa FreeLibrary 890->898 900 11029b6f-11029b74 891->900 901 11029a4d-11029a55 892->901 895->896 919 110297e6-110297ea 896->919 920 110297ed-110297f9 896->920 898->897 899->853 905 11029b76-11029b8d GetProcAddress 900->905 906 11029b8f-11029b95 900->906 903 11029a57-11029a6e GetProcAddress 901->903 904 11029a74-11029a7d 901->904 903->904 909 11029b2e-11029b30 SetLastError 903->909 913 11029a80-11029a82 904->913 905->906 907 11029b97-11029b99 SetLastError 905->907 906->890 907->890 911 11029b36-11029b3d 909->911 914 11029b4c-11029b6d call 110278a0 * 2 911->914 913->911 916 11029a88-11029a8d 913->916 914->900 916->914 917 11029a93-11029acf call 1110f4a0 call 11027850 916->917 942 11029ae1-11029ae3 917->942 943 11029ad1-11029ad4 917->943 919->920 923 11029824-11029829 920->923 924 110297fb-110297fd 920->924 926 1102982b-1102983c GetProcAddress 923->926 927 1102983e-11029855 InternetConnectA 923->927 929 11029814-1102981a 924->929 930 110297ff-11029812 GetProcAddress 924->930 926->927 932 11029881-1102988c SetLastError 926->932 933 110299f7-11029a07 call 111618c1 927->933 934 1102985b-1102985e 927->934 929->923 930->929 936 1102981c-1102981e SetLastError 930->936 932->933 933->871 939 11029860-11029862 934->939 940 11029899-110298a1 934->940 936->923 944 11029864-11029877 GetProcAddress 939->944 945 11029879-1102987f 939->945 946 110298a3-110298b7 GetProcAddress 940->946 947 110298b9-110298d4 940->947 951 11029ae5 942->951 952 11029aec-11029af1 942->952 943->942 950 11029ad6-11029ada 943->950 944->945 953 11029891-11029893 SetLastError 944->953 945->940 946->947 949 110298d6-110298de SetLastError 946->949 955 110298e1-110298e4 947->955 949->955 950->942 956 11029adc 950->956 951->952 957 11029af3-11029b09 call 110d1090 952->957 958 11029b0c-11029b0e 952->958 953->940 960 110299f2-110299f5 955->960 961 110298ea-110298ef 955->961 956->942 957->958 963 11029b10-11029b12 958->963 964 11029b14-11029b25 call 111618c1 958->964 960->933 969 11029a1c-11029a29 call 111618c1 960->969 967 110298f1-11029908 GetProcAddress 961->967 968 1102990a-11029916 961->968 963->964 965 11029b3f-11029b49 call 111618c1 963->965 964->914 975 11029b27-11029b29 964->975 965->914 967->968 974 11029918-11029920 SetLastError 967->974 979 11029922-1102993b GetLastError 968->979 969->879 974->979 975->901 980 11029956-1102996b 979->980 981 1102993d-11029954 GetProcAddress 979->981 983 11029975-11029983 GetLastError 980->983 981->980 982 1102996d-1102996f SetLastError 981->982 982->983 985 11029985-1102998a 983->985 986 1102998c-11029998 GetDesktopWindow 983->986 985->986 987 110299e2-110299e7 985->987 988 110299b3-110299cf 986->988 989 1102999a-110299b1 GetProcAddress 986->989 987->960 991 110299e9-110299ef 987->991 988->960 993 110299d1 988->993 989->988 990 110299d6-110299e0 SetLastError 989->990 990->960 991->960 993->955
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(WinInet.dll,C213C15D,74DF23A0,?,00000000), ref: 110295C5
                                                                                                          • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102965F
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 11029673
                                                                                                          • _malloc.LIBCMT ref: 11029697
                                                                                                          • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 110296B1
                                                                                                          • GetLastError.KERNEL32 ref: 110296D2
                                                                                                          • _free.LIBCMT ref: 110296DE
                                                                                                          • _malloc.LIBCMT ref: 110296E7
                                                                                                          • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 11029701
                                                                                                          • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 1102973B
                                                                                                          • InternetOpenA.WININET(11194244,?,?,000000FF,00000000), ref: 1102975A
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 11029764
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 11029771
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 1102977B
                                                                                                          • _free.LIBCMT ref: 11029785
                                                                                                            • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                                            • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                                          • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029805
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 1102981E
                                                                                                          • GetProcAddress.KERNEL32(?,InternetConnectA), ref: 11029831
                                                                                                          • InternetConnectA.WININET(000000FF,11199690,00000050,00000000,00000000,00000003,00000000,00000000), ref: 1102984E
                                                                                                          • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102986A
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 11029883
                                                                                                          • GetProcAddress.KERNEL32(?,HttpOpenRequestA), ref: 110298A9
                                                                                                          • GetProcAddress.KERNEL32(?,HttpSendRequestA), ref: 110298FD
                                                                                                          • GetProcAddress.KERNEL32(?,InternetQueryDataAvailable), ref: 11029A63
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 11029B30
                                                                                                          • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029B82
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 11029B99
                                                                                                          • FreeLibrary.KERNEL32(?), ref: 11029BAA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$ErrorLast$FreeInternetLibrary_free_malloc$ConnectHeapLoadOpen
                                                                                                          • String ID: ://$GET$HttpOpenRequestA$HttpQueryInfoA$HttpSendRequestA$InternetCloseHandle$InternetConnectA$InternetErrorDlg$InternetOpenA$InternetQueryDataAvailable$InternetQueryOptionA$WinInet.dll
                                                                                                          • API String ID: 921868004-913974648
                                                                                                          • Opcode ID: 2d2eeaad931a34bca1b43c66b17deac4db3cf30db8dfadc355f34a03c0ad81b1
                                                                                                          • Instruction ID: e81a0880bf89439be6f70403065d0babe3f5b16467f55efefddb7e1ac6149969
                                                                                                          • Opcode Fuzzy Hash: 2d2eeaad931a34bca1b43c66b17deac4db3cf30db8dfadc355f34a03c0ad81b1
                                                                                                          • Instruction Fuzzy Hash: 5E127FB0D04269EBEB11CFA9CC88A9EFBF9FF88754F604569E465E7240E7705940CB60
                                                                                                          APIs
                                                                                                            • Part of subcall function 11144EA0: GetLastError.KERNEL32(?,00D9B878,000000FF,?), ref: 11144ED5
                                                                                                            • Part of subcall function 11144EA0: Sleep.KERNEL32(000000C8,?,?,?,?,?,?,00D9B878,000000FF,?), ref: 11144EE5
                                                                                                          • _fgets.LIBCMT ref: 11061DC2
                                                                                                          • _strpbrk.LIBCMT ref: 11061E29
                                                                                                          • _fgets.LIBCMT ref: 11061F2C
                                                                                                          • _strpbrk.LIBCMT ref: 11061FA3
                                                                                                          • __wcstoui64.LIBCMT ref: 11061FBC
                                                                                                          • _fgets.LIBCMT ref: 11062035
                                                                                                          • _strpbrk.LIBCMT ref: 1106205B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: _fgets_strpbrk$ErrorLastSleep__wcstoui64
                                                                                                          • String ID: %c%04d%s$%s.%04d.%s$/- $?expirY$?starT$ACM$Client$Expired$_License$_checksum$_include$_version$cd_install$defaults$enforce$expiry$inactive$licensee$product$shrink_wrap$start
                                                                                                          • API String ID: 716802716-1571441106
                                                                                                          • Opcode ID: 32dce6010c3087015648dbee5c865c0eda81171851eef29cc693b610d01e18e4
                                                                                                          • Instruction ID: 9b454a0e08db4b844aa329f9a873b431930d9d904307df7fc69ae15b9a8492e5
                                                                                                          • Opcode Fuzzy Hash: 32dce6010c3087015648dbee5c865c0eda81171851eef29cc693b610d01e18e4
                                                                                                          • Instruction Fuzzy Hash: 55A2D375E0461A9FEB21CF64CC80BEFB7B9AF44345F0041D9E849A7281EB71AA45CF61

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1646 11143570-111435b1 GetModuleFileNameA 1647 111435f3 1646->1647 1648 111435b3-111435c6 call 11081b40 1646->1648 1650 111435f9-111435fd 1647->1650 1648->1647 1656 111435c8-111435f1 LoadLibraryA 1648->1656 1652 111435ff-1114360c LoadLibraryA 1650->1652 1653 11143619-11143637 GetModuleHandleA GetProcAddress 1650->1653 1652->1653 1657 1114360e-11143616 LoadLibraryA 1652->1657 1654 11143647-11143670 GetProcAddress * 4 1653->1654 1655 11143639-11143645 1653->1655 1658 11143673-111436eb GetProcAddress * 10 call 11161d01 1654->1658 1655->1658 1656->1650 1657->1653 1660 111436f0-111436f3 1658->1660
                                                                                                          APIs
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,8504C483,74DF23A0), ref: 111435A3
                                                                                                          • LoadLibraryA.KERNEL32(?), ref: 111435EC
                                                                                                          • LoadLibraryA.KERNEL32(DBGHELP.DLL), ref: 11143605
                                                                                                          • LoadLibraryA.KERNEL32(IMAGEHLP.DLL), ref: 11143614
                                                                                                          • GetModuleHandleA.KERNEL32(?), ref: 1114361A
                                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetLineFromAddr), ref: 1114362E
                                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetLineFromName), ref: 1114364D
                                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetLineNext), ref: 11143658
                                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetLinePrev), ref: 11143663
                                                                                                          • GetProcAddress.KERNEL32(00000000,SymMatchFileName), ref: 1114366E
                                                                                                          • GetProcAddress.KERNEL32(00000000,StackWalk), ref: 11143679
                                                                                                          • GetProcAddress.KERNEL32(00000000,SymCleanup), ref: 11143684
                                                                                                          • GetProcAddress.KERNEL32(00000000,SymLoadModule), ref: 1114368F
                                                                                                          • GetProcAddress.KERNEL32(00000000,SymInitialize), ref: 1114369A
                                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetOptions), ref: 111436A5
                                                                                                          • GetProcAddress.KERNEL32(00000000,SymSetOptions), ref: 111436B0
                                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetModuleInfo), ref: 111436BB
                                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetSymFromAddr), ref: 111436C6
                                                                                                          • GetProcAddress.KERNEL32(00000000,SymFunctionTableAccess), ref: 111436D1
                                                                                                          • GetProcAddress.KERNEL32(00000000,MiniDumpWriteDump), ref: 111436DC
                                                                                                            • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$LibraryLoad$Module$FileHandleName_strrchr
                                                                                                          • String ID: DBGHELP.DLL$IMAGEHLP.DLL$MiniDumpWriteDump$StackWalk$SymCleanup$SymFunctionTableAccess$SymGetLineFromAddr$SymGetLineFromName$SymGetLineNext$SymGetLinePrev$SymGetModuleInfo$SymGetOptions$SymGetSymFromAddr$SymInitialize$SymLoadModule$SymMatchFileName$SymSetOptions$dbghelp.dll
                                                                                                          • API String ID: 3874234733-2061581830
                                                                                                          • Opcode ID: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                                          • Instruction ID: 707b91cc949213dae1a505c6abf15ec2f20ed18dfa7402eb99b54f6ccfa65761
                                                                                                          • Opcode Fuzzy Hash: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                                          • Instruction Fuzzy Hash: 05411B70A04714AFD7309F768D84A6BFAF8BF55A04B10492EE496D3A10EBB5E8008F5D

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1727 11139090-111390c5 1728 111390d2-111390d9 1727->1728 1729 111390c7-111390cd GetCurrentThreadId 1727->1729 1730 111390e0-111390fc call 11133920 call 11133400 1728->1730 1731 111390db call 11029330 1728->1731 1729->1728 1737 11139102-11139108 1730->1737 1738 111391db-111391e2 1730->1738 1731->1730 1739 1113975a-11139775 call 11161d01 1737->1739 1740 1113910e-1113916f call 11138c30 IsWindow IsWindowVisible call 11146450 call 1105dd10 IsWindowVisible 1737->1740 1741 1113929a-111392b0 1738->1741 1742 111391e8-111391ef 1738->1742 1780 111391d1 1740->1780 1781 11139171-11139177 1740->1781 1752 111392b6-111392bd 1741->1752 1753 111393ef 1741->1753 1742->1741 1745 111391f5-111391fc 1742->1745 1745->1741 1748 11139202-11139211 FindWindowA 1745->1748 1748->1741 1751 11139217-1113921c IsWindowVisible 1748->1751 1751->1741 1759 1113921e-11139225 1751->1759 1754 111392bf-111392c9 1752->1754 1755 111392ce-111392ee call 1105dd10 1752->1755 1756 111393f1-11139402 1753->1756 1757 11139435-11139440 1753->1757 1754->1757 1755->1757 1777 111392f4-11139323 1755->1777 1762 11139404-11139414 1756->1762 1763 1113941a-1113942f 1756->1763 1764 11139442-11139462 call 1105dd10 1757->1764 1765 11139476-1113947c 1757->1765 1759->1741 1760 11139227-1113924c call 11138c30 IsWindowVisible 1759->1760 1760->1741 1783 1113924e-1113925d IsIconic 1760->1783 1762->1763 1763->1757 1786 11139470 1764->1786 1787 11139464-1113946e call 1102cff0 1764->1787 1771 1113947e-1113948a call 11138c30 1765->1771 1772 1113948d-11139495 1765->1772 1771->1772 1775 111394a7-111394b2 call 1112ce90 1772->1775 1776 11139497-111394a2 call 1106b860 1772->1776 1798 111394b4-111394ba call 11131b00 1775->1798 1799 111394bd-111394c6 1775->1799 1776->1775 1796 11139325-11139339 call 11081a70 1777->1796 1797 1113933e-11139351 call 11143230 1777->1797 1780->1738 1781->1780 1788 11139179-11139190 call 11146450 GetForegroundWindow 1781->1788 1783->1741 1789 1113925f-1113927a GetForegroundWindow call 11131210 * 2 1783->1789 1786->1765 1787->1765 1801 11139192-111391bc EnableWindow call 11131210 * 2 EnableWindow 1788->1801 1802 111391be-111391c0 1788->1802 1833 1113928b-11139294 EnableWindow 1789->1833 1834 1113927c-11139282 1789->1834 1796->1797 1823 1113933b 1796->1823 1824 11139353-11139364 GetLastError call 11146450 1797->1824 1825 1113936e-11139375 1797->1825 1798->1799 1807 111394d4 call 111317a0 1799->1807 1808 111394c8-111394cb 1799->1808 1801->1802 1802->1780 1811 111391c2-111391c8 1802->1811 1816 111394d9-111394df 1807->1816 1808->1816 1817 111394cd-111394d2 call 11131870 1808->1817 1811->1780 1821 111391ca-111391cb SetForegroundWindow 1811->1821 1819 111394e5-111394eb 1816->1819 1820 111395e9-111395f4 call 111386b0 1816->1820 1817->1816 1830 111394f1-111394f9 1819->1830 1831 1113959b-111395a3 1819->1831 1845 111395f6-11139608 call 110637c0 1820->1845 1846 11139615-1113961b 1820->1846 1821->1780 1823->1797 1824->1825 1827 11139377-11139392 1825->1827 1828 111393e8 1825->1828 1843 11139395-111393a1 1827->1843 1828->1753 1830->1820 1839 111394ff-11139505 1830->1839 1831->1820 1842 111395a5-111395e3 call 1103f000 call 1103f040 call 1103f060 call 1103f020 call 1110f270 1831->1842 1833->1741 1834->1833 1841 11139284-11139285 SetForegroundWindow 1834->1841 1839->1820 1844 1113950b-11139522 call 1110f420 1839->1844 1841->1833 1842->1820 1850 111393a3-111393b7 call 11081a70 1843->1850 1851 111393bc-111393c9 call 11143230 1843->1851 1864 11139544 1844->1864 1865 11139524-11139542 call 110573b0 1844->1865 1845->1846 1867 1113960a-11139610 call 11142210 1845->1867 1848 11139621-11139628 1846->1848 1849 1113974a-11139752 1846->1849 1848->1849 1855 1113962e-11139647 call 1105dd10 1848->1855 1849->1739 1850->1851 1870 111393b9 1850->1870 1851->1828 1872 111393cb-111393e6 GetLastError call 11146450 1851->1872 1855->1849 1876 1113964d-11139660 1855->1876 1873 11139546-11139592 call 1110f260 call 1104ce00 call 1104e340 call 1104e3b0 call 1104ce40 1864->1873 1865->1873 1867->1846 1870->1851 1872->1757 1873->1820 1907 11139594-11139599 call 110ebf30 1873->1907 1888 11139662-11139668 1876->1888 1889 1113968d-11139693 1876->1889 1892 1113966a-11139688 call 11146450 GetTickCount 1888->1892 1893 11139699-111396a5 GetTickCount 1888->1893 1889->1849 1889->1893 1892->1849 1893->1849 1896 111396ab-111396eb call 11142e80 call 11146ee0 call 11142e80 call 11025bb0 1893->1896 1913 111396f0-111396f5 1896->1913 1907->1820 1913->1913 1914 111396f7-111396fd 1913->1914 1915 11139700-11139705 1914->1915 1915->1915 1916 11139707-11139731 call 1112c7a0 1915->1916 1919 11139733-11139734 FreeLibrary 1916->1919 1920 1113973a-11139747 call 111618c1 1916->1920 1919->1920 1920->1849
                                                                                                          APIs
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 111390C7
                                                                                                          • IsWindow.USER32(00020442), ref: 11139125
                                                                                                          • IsWindowVisible.USER32(00020442), ref: 11139133
                                                                                                          • IsWindowVisible.USER32(00020442), ref: 1113916B
                                                                                                          • GetForegroundWindow.USER32 ref: 11139186
                                                                                                          • EnableWindow.USER32(00020442,00000000), ref: 111391A0
                                                                                                          • EnableWindow.USER32(00020442,00000001), ref: 111391BC
                                                                                                          • SetForegroundWindow.USER32(00000000), ref: 111391CB
                                                                                                          • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 11139209
                                                                                                          • IsWindowVisible.USER32(00000000), ref: 11139218
                                                                                                          • IsWindowVisible.USER32(00020442), ref: 11139248
                                                                                                          • IsIconic.USER32(00020442), ref: 11139255
                                                                                                          • GetForegroundWindow.USER32 ref: 1113925F
                                                                                                            • Part of subcall function 11131210: ShowWindow.USER32(00020442,00000000,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131234
                                                                                                            • Part of subcall function 11131210: ShowWindow.USER32(00020442,11139062,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131246
                                                                                                          • SetForegroundWindow.USER32(00000000), ref: 11139285
                                                                                                          • EnableWindow.USER32(00020442,00000001), ref: 11139294
                                                                                                          • GetLastError.KERNEL32 ref: 11139353
                                                                                                          • GetLastError.KERNEL32 ref: 111393CB
                                                                                                          • GetTickCount.KERNEL32 ref: 11139678
                                                                                                          • GetTickCount.KERNEL32 ref: 11139699
                                                                                                            • Part of subcall function 11025BB0: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,111396E2), ref: 11025BB8
                                                                                                          • FreeLibrary.KERNEL32(?,00000000,000000FF,00000000,00000001,00000000,00000001,00000000,0000000A,?,00000000), ref: 11139734
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Window$ForegroundVisible$Enable$CountErrorLastLibraryShowTick$CurrentFindFreeIconicLoadThread
                                                                                                          • String ID: Audio$Client$File <%s> doesnt exist, e=%d$HideWhenIdle$HookDirectSound$MainWnd = %08x, visible %d, valid %d$NeedsReinstall$Reactivate main window$Shell_TrayWnd$ShowNeedsReinstall in 15, user=%s$disableRunplugin
                                                                                                          • API String ID: 2511061093-2542869446
                                                                                                          • Opcode ID: 0e4ccee009b06b63fab7a686928084bc30871ce576c3106fc105d812773a0109
                                                                                                          • Instruction ID: 168a4b77644d94df8a921335772b55db7e1a21360cf08f879ca3086e41f0bcfd
                                                                                                          • Opcode Fuzzy Hash: 0e4ccee009b06b63fab7a686928084bc30871ce576c3106fc105d812773a0109
                                                                                                          • Instruction Fuzzy Hash: 700229B8A1062ADFE716DFA4CDD4B6AF766BBC071EF500178E4255728CEB30A844CB51
                                                                                                          APIs
                                                                                                          • CoInitialize.OLE32(00000000), ref: 11115BC5
                                                                                                          • CoCreateInstance.OLE32(111C081C,00000000,00000001,111C082C,00000000,?,00000000,Client,silent,00000000,00000000,?,1104BADF), ref: 11115BDF
                                                                                                          • LoadLibraryA.KERNEL32(SHELL32.DLL,?,?,00000000,Client,silent,00000000,00000000), ref: 11115C04
                                                                                                          • GetProcAddress.KERNEL32(00000000,SHGetSettings), ref: 11115C16
                                                                                                          • SHGetSettings.SHELL32(?,00000200,?,00000000,Client,silent,00000000,00000000), ref: 11115C29
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,Client,silent,00000000,00000000), ref: 11115C35
                                                                                                          • CoUninitialize.COMBASE(00000000), ref: 11115CD1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Library$AddressCreateFreeInitializeInstanceLoadProcSettingsUninitialize
                                                                                                          • String ID: SHELL32.DLL$SHGetSettings
                                                                                                          • API String ID: 4195908086-2348320231
                                                                                                          • Opcode ID: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                                          • Instruction ID: 591e2108fd72310e634c09c07143bf968b2bad8d72189eb08e80a39284cb5d12
                                                                                                          • Opcode Fuzzy Hash: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                                          • Instruction Fuzzy Hash: 1751A075A0020A9FDB40DFE5C9C4AAFFBB9FF89304F104629E516AB244E731A941CB61
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: _memset
                                                                                                          • String ID: NBCTL32.DLL$_License$serial_no
                                                                                                          • API String ID: 2102423945-35127696
                                                                                                          • Opcode ID: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                                          • Instruction ID: b704a80906741011c15d1468992a84ddd821d027e1e1ff2b1c0992d848e69eb8
                                                                                                          • Opcode Fuzzy Hash: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                                          • Instruction Fuzzy Hash: 64B18E75E00209AFE714CFA8DC81BAEB7F5FF88304F148169E9499B295DB71A901CB90
                                                                                                          APIs
                                                                                                          • SetUnhandledExceptionFilter.KERNEL32(1102E480,?,00000000), ref: 110310E4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterUnhandled
                                                                                                          • String ID: Client32$NSMWClass$NSMWClass
                                                                                                          • API String ID: 3192549508-611217420
                                                                                                          • Opcode ID: e29b56f4a67aa672c9c3122cce21b876c4d1529a7a373f118b029bff64f70a14
                                                                                                          • Instruction ID: e21dedaf74b0f8cf59cf3be59171af9e644e6a1753dc25f7f597d2ad8de8aca1
                                                                                                          • Opcode Fuzzy Hash: e29b56f4a67aa672c9c3122cce21b876c4d1529a7a373f118b029bff64f70a14
                                                                                                          • Instruction Fuzzy Hash: 44F04F7891112A9FCB06DFA9D890A9EF7E4AB4821CB508165E82587348EB30A605CB95
                                                                                                          APIs
                                                                                                          • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,1102FCB2,?,00000000), ref: 1109E948
                                                                                                          • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109E964
                                                                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,009CDFC0,009CDFC0,009CDFC0,009CDFC0,009CDFC0,009CDFC0,009CDFC0,111EEB64,?,00000001,00000001), ref: 1109E990
                                                                                                          • EqualSid.ADVAPI32(?,009CDFC0,?,00000001,00000001), ref: 1109E9A3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: InformationToken$AllocateEqualInitialize
                                                                                                          • String ID:
                                                                                                          • API String ID: 1878589025-0
                                                                                                          • Opcode ID: df3ee88bcedd232c82b95f826b647b916292d8a5149356288e18f949a5596a8a
                                                                                                          • Instruction ID: 8f268d00a2632c5decc73a479da56acc1190ac8ef7b7f04f8431c56e7d3a1b5e
                                                                                                          • Opcode Fuzzy Hash: df3ee88bcedd232c82b95f826b647b916292d8a5149356288e18f949a5596a8a
                                                                                                          • Instruction Fuzzy Hash: 22217131B0122EABEB10DBA4CC81BBEB7B8EB44708F100469E919D7184E671AD00CBA1
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,C213C15D,00080000,00000000,00000000), ref: 1109D46D
                                                                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                                          • LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                                          • AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                                                          • String ID:
                                                                                                          • API String ID: 2349140579-0
                                                                                                          • Opcode ID: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                                          • Instruction ID: 1acc50509d1dc0efa8f8b8857b060522b21de2b31161cc556941a9c494b785c9
                                                                                                          • Opcode Fuzzy Hash: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                                          • Instruction Fuzzy Hash: AE015EB5640218ABD710DFA4CC89BAAF7BCFF44B05F10452DFA1597280D7B1AA04CB71
                                                                                                          APIs
                                                                                                          • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,?,00000000,00000000,00000000,1109E810,00000244,cant create events), ref: 1109D4EC
                                                                                                          • CloseHandle.KERNEL32(?,00000000,1109E810,00000244,cant create events), ref: 1109D4F5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                          • String ID:
                                                                                                          • API String ID: 81990902-0
                                                                                                          • Opcode ID: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                                          • Instruction ID: ae8e9f792a84aceb39bcb46fd7c9804e810fa9328d8f27f892a8d401e6504800
                                                                                                          • Opcode Fuzzy Hash: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                                          • Instruction Fuzzy Hash: 55E0EC71654614ABE738CF28DC95FA677ECAF09B01F11495DF9A6D6180CA60F8408B64
                                                                                                          APIs
                                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                          • GetSystemMetrics.USER32(00002000), ref: 1102E7C4
                                                                                                          • FindWindowA.USER32(NSMWClass,00000000), ref: 1102E985
                                                                                                            • Part of subcall function 111100D0: GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                                            • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                                            • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                                            • Part of subcall function 111100D0: EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                                            • Part of subcall function 111100D0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                                          • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102E9C1
                                                                                                          • OpenProcess.KERNEL32(00100400,00000000,?), ref: 1102E9E9
                                                                                                          • IsILS.PCICHEK(?,?,View,Client,Bridge), ref: 1102ECAB
                                                                                                            • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000018,00000000,00000000,00000000,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B4C
                                                                                                            • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B59
                                                                                                            • Part of subcall function 11094B30: CloseHandle.KERNEL32(00000000,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B89
                                                                                                          • SendMessageA.USER32(00000000,00000010,00000000,00000000), ref: 1102EA48
                                                                                                          • WaitForSingleObject.KERNEL32(00000000,00007530), ref: 1102EA54
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 1102EA6C
                                                                                                          • FindWindowA.USER32(NSMWClass,00000000), ref: 1102EA79
                                                                                                          • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102EA9B
                                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 1102E7F6
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          • LoadIconA.USER32(11000000,000004C1), ref: 1102EE45
                                                                                                          • LoadIconA.USER32(11000000,000004C2), ref: 1102EE55
                                                                                                          • DestroyCursor.USER32(00000000), ref: 1102EE7E
                                                                                                          • DestroyCursor.USER32(00000000), ref: 1102EE92
                                                                                                          • GetVersion.KERNEL32(?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F45F
                                                                                                          • GetVersionExA.KERNEL32(?,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F4B2
                                                                                                          • Sleep.KERNEL32(00000064,Client,*StartupDelay,00000000,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000), ref: 1102FA52
                                                                                                          • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FA8C
                                                                                                            • Part of subcall function 11132BF0: wsprintfA.USER32 ref: 11132C60
                                                                                                            • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132C91
                                                                                                            • Part of subcall function 11132BF0: SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11132CA4
                                                                                                            • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132CAC
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                          • DispatchMessageA.USER32(?), ref: 1102FA96
                                                                                                          • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FAA8
                                                                                                          • CloseHandle.KERNEL32(00000000,11027270,00000001,00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000), ref: 1102FD40
                                                                                                          • GetCurrentProcess.KERNEL32(00000000,Client,*PriorityClass,00000080,00000000,Client,*ScreenScrape,00000000,00000000,?,?,?,?,?,00000000), ref: 1102FD78
                                                                                                          • SetPriorityClass.KERNEL32(00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000), ref: 1102FD7F
                                                                                                          • SetWindowPos.USER32(00020442,000000FF,00000000,00000000,00000000,00000000,00000013,Client,AlwaysOnTop,00000000,00000000), ref: 1102FDB5
                                                                                                          • CloseHandle.KERNEL32(00000000,11059C10,00000001,00000000,?,?,?,?,?,?,?,?,00000000), ref: 1102FE36
                                                                                                          • wsprintfA.USER32 ref: 1102FFA5
                                                                                                          • PostMessageA.USER32(NSMWControl32,00000000,Default,UseIPC,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 110300F7
                                                                                                          • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103010D
                                                                                                          • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 11030136
                                                                                                          • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103015F
                                                                                                            • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,C213C15D,00000002,74DF2EE0), ref: 1112820A
                                                                                                            • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 11128217
                                                                                                            • Part of subcall function 111281B0: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00000000), ref: 1112825E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Message$Process$Window$CloseCreateEventHandlePostwsprintf$CriticalOpenSectionThread$CountCurrentCursorDestroyFindIconInitializeLoadObjectPeekSingleTickTokenVersionWait$ClassDispatchEnterErrorExitFolderLastMetricsPathPrioritySendSleepSystem__wcstoi64_malloc_memset
                                                                                                          • String ID: *BeepSound$*BeepUsingSpeaker$*ListenPort$*PriorityClass$*ScreenScrape$*StartupDelay$035347$AlwaysOnTop$AssertTimeout$Audio$Bridge$CLIENT32.CPP$CabinetWClass$Client$Default$DisableAudio$DisableAudioFilter$DisableConsoleClient$DisableHelp$DisableJoinClass$DisableJournal$DisableJournalMenu$DisableReplayMenu$DisableRequestHelp$DisableRunplugin$DisableTSAdmin$EnableGradientCaptions$EnableSmartcardAuth$EnableSmartcardLogon$Error x%x reading nsm.lic, sesh=%d$Error. Could not load transports - perhaps another client is running$Error. Wrong hardware. Terminating$Found new explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$Found old explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$General$Global\NSMWClassAdmin$Info. Client already running, pid=%d (x%x)$Info. Client running as user=%s, type=%d$Info. Trying to close client$Intel error "%s"$IsILS returned %d, isvistaservice %d$LSPloaded=%d, WFPloaded=%d$MiniDumpType$NSA.LIC$NSM.LIC$NSMWClass$NSMWClassVista$NSMWControl32$NSSWControl32$NSTWControl32$NeedsReinstall$NoFTWhenLoggedOff$OS2$Ready$RestartAfterError$ScreenScrape$Session shutting down, exiting...$ShowKBEnable$TCPIP$TraceIPC$TracePriv$UseIPC$UseLegacyPrintCapture$UseNTSecurity$V12.00.8$V12.10.8$View$Windows 10$Windows 10 x64$Windows 2000$Windows 2003$Windows 2003 x64$Windows 2008$Windows 2008 x64$Windows 2012$Windows 2012 R2$Windows 2016$Windows 7$Windows 7 x64$Windows 8$Windows 8 x64$Windows 8.1$Windows 8.1 x64$Windows 95$Windows 98$Windows CE$Windows Ding.wav$Windows Millennium$Windows NT$Windows Vista$Windows Vista x64$Windows XP$Windows XP Ding.wav$Windows XP x64$\Explorer.exe$_debug$_debug$cl32main$client32$closed ok$gClient.hNotifyEvent$hClientRunning = %x, pid=%d (x%x)$istaService$istaUI$pcicl32$win8ui
                                                                                                          • API String ID: 1099283604-28099722
                                                                                                          • Opcode ID: a9e638ff69f1124c323ad2d8e1e7c75ea6f1f7704d0975bff64711fd33ab6bf8
                                                                                                          • Instruction ID: 27af1d42f1b4f6ddb2c14770db7fbacfca67435089f052a3aa779117de4136e9
                                                                                                          • Opcode Fuzzy Hash: a9e638ff69f1124c323ad2d8e1e7c75ea6f1f7704d0975bff64711fd33ab6bf8
                                                                                                          • Instruction Fuzzy Hash: 3CE25D75F0022AABEF15DBE4DC80FADF7A5AB4474CF904068E925AB3C4D770A944CB52

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 994 1102db00-1102db50 call 1110f420 997 1102db52-1102db66 call 11142a60 994->997 998 1102db68 994->998 1000 1102db6e-1102dbb3 call 11142290 call 11142ac0 997->1000 998->1000 1006 1102dd53-1102dd62 call 11144dc0 1000->1006 1007 1102dbb9 1000->1007 1013 1102dd68-1102dd78 1006->1013 1009 1102dbc0-1102dbc3 1007->1009 1011 1102dbc5-1102dbc7 1009->1011 1012 1102dbe8-1102dbf1 1009->1012 1014 1102dbd0-1102dbe1 1011->1014 1015 1102dbf7-1102dbfe 1012->1015 1016 1102dd24-1102dd3d call 11142ac0 1012->1016 1017 1102dd7a 1013->1017 1018 1102dd7f-1102dd93 call 1102cc10 1013->1018 1014->1014 1019 1102dbe3 1014->1019 1015->1016 1020 1102dcf3-1102dd08 call 11162de7 1015->1020 1021 1102dc05-1102dc07 1015->1021 1022 1102dd0a-1102dd1f call 11162de7 1015->1022 1023 1102dc9a-1102dccd call 111618c1 call 11142290 1015->1023 1024 1102dcdb-1102dcf1 call 11164010 1015->1024 1025 1102dc8b-1102dc95 1015->1025 1026 1102dccf-1102dcd9 1015->1026 1027 1102dc4c-1102dc52 1015->1027 1028 1102dc7c-1102dc86 1015->1028 1016->1009 1046 1102dd43-1102dd45 1016->1046 1017->1018 1042 1102dd98-1102dd9d 1018->1042 1019->1016 1020->1016 1021->1016 1033 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 1021->1033 1022->1016 1023->1016 1024->1016 1025->1016 1026->1016 1035 1102dc54-1102dc68 call 11162de7 1027->1035 1036 1102dc6d-1102dc77 1027->1036 1028->1016 1033->1016 1035->1016 1036->1016 1048 1102de43-1102de5d call 111463d0 1042->1048 1051 1102dda3-1102ddc8 call 110b7920 call 11146450 1042->1051 1046->1048 1049 1102dd4b-1102dd51 1046->1049 1063 1102deb3-1102debf call 1102b4f0 1048->1063 1064 1102de5f-1102de78 call 1105dd10 1048->1064 1049->1006 1049->1013 1070 1102ddd3-1102ddd9 1051->1070 1071 1102ddca-1102ddd1 1051->1071 1074 1102dec1-1102dec8 1063->1074 1075 1102de98-1102de9f 1063->1075 1064->1063 1073 1102de7a-1102de8c 1064->1073 1076 1102dddb-1102dde2 call 11027d60 1070->1076 1077 1102de39 1070->1077 1071->1048 1073->1063 1090 1102de8e 1073->1090 1079 1102dea5-1102dea8 1074->1079 1081 1102deca-1102ded4 1074->1081 1075->1079 1080 1102e0aa-1102e0cb GetComputerNameA 1075->1080 1076->1077 1089 1102dde4-1102de16 1076->1089 1077->1048 1086 1102deaa-1102deb1 call 110b7920 1079->1086 1087 1102ded9 1079->1087 1083 1102e103-1102e109 1080->1083 1084 1102e0cd-1102e101 call 11027c30 1080->1084 1081->1080 1092 1102e10b-1102e110 1083->1092 1093 1102e13f-1102e152 call 11164010 1083->1093 1084->1083 1113 1102e157-1102e163 1084->1113 1088 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 1086->1088 1087->1088 1142 1102e07a-1102e082 SetLastError 1088->1142 1143 1102dfbc-1102dfd3 1088->1143 1106 1102de20-1102de2f call 110f6080 1089->1106 1107 1102de18-1102de1e 1089->1107 1090->1075 1096 1102e116-1102e11a 1092->1096 1112 1102e347-1102e36a 1093->1112 1103 1102e136-1102e138 1096->1103 1104 1102e11c-1102e11e 1096->1104 1111 1102e13b-1102e13d 1103->1111 1109 1102e132-1102e134 1104->1109 1110 1102e120-1102e126 1104->1110 1115 1102de32-1102de34 call 1102d330 1106->1115 1107->1106 1107->1115 1109->1111 1110->1103 1117 1102e128-1102e130 1110->1117 1111->1093 1111->1113 1127 1102e392-1102e39a 1112->1127 1128 1102e36c-1102e372 1112->1128 1122 1102e165-1102e17a call 110b7920 call 11029bd0 1113->1122 1123 1102e17c-1102e18f call 11081a70 1113->1123 1115->1077 1117->1096 1117->1109 1149 1102e1d3-1102e1ec call 11081a70 1122->1149 1139 1102e191-1102e1b4 1123->1139 1140 1102e1b6-1102e1b8 1123->1140 1131 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 1127->1131 1132 1102e39c-1102e3a9 call 11035dd0 call 111618c1 1127->1132 1128->1127 1130 1102e374-1102e38d call 1102d330 1128->1130 1130->1127 1132->1131 1139->1149 1141 1102e1c0-1102e1d1 1140->1141 1141->1141 1141->1149 1153 1102e043-1102e04f 1142->1153 1143->1153 1164 1102dfd5-1102dfde 1143->1164 1167 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 1149->1167 1168 1102e32c-1102e339 call 11164010 1149->1168 1156 1102e092-1102e0a1 1153->1156 1157 1102e051-1102e05d 1153->1157 1156->1080 1160 1102e0a3-1102e0a4 FreeLibrary 1156->1160 1162 1102e06f-1102e073 1157->1162 1163 1102e05f-1102e06d GetProcAddress 1157->1163 1160->1080 1170 1102e084-1102e086 SetLastError 1162->1170 1171 1102e075-1102e078 1162->1171 1163->1162 1164->1153 1169 1102dfe0-1102e016 call 11146450 call 1112b270 1164->1169 1206 1102e283-1102e299 call 11128ec0 1167->1206 1207 1102e26f-1102e27e call 11029450 1167->1207 1185 1102e33c-1102e341 CharUpperA 1168->1185 1169->1153 1189 1102e018-1102e03e call 11146450 call 11027920 1169->1189 1172 1102e08c 1170->1172 1171->1172 1172->1156 1185->1112 1189->1153 1211 1102e2b2-1102e2ec call 110d0bd0 * 2 1206->1211 1212 1102e29b-1102e2ad call 110d0bd0 1206->1212 1207->1206 1219 1102e302-1102e32a call 11164010 call 110d07c0 1211->1219 1220 1102e2ee-1102e2fd call 11029450 1211->1220 1212->1211 1219->1185 1220->1219
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: _malloc_memsetwsprintf
                                                                                                          • String ID: $$session$$%02d$%s.%02d$%session%$%sessionname%$035347$14/03/16 10:38:31 V12.10F8$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$IsA()$ListenPort$MacAddress$NSM.LIC$NSMWClass$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Warning: Unexpanded clientname=<%s>$Wtsapi32.dll$client32$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                                          • API String ID: 3802068140-4245022730
                                                                                                          • Opcode ID: 8d7e34653a530cc98d4c7b142cb31fa2942002c12a1f4f3c66c79a8befd3f6be
                                                                                                          • Instruction ID: 727bed6a5d63171c4319a8bac454151215a042d106ed124055d9f0508de139ba
                                                                                                          • Opcode Fuzzy Hash: 8d7e34653a530cc98d4c7b142cb31fa2942002c12a1f4f3c66c79a8befd3f6be
                                                                                                          • Instruction Fuzzy Hash: 7932D275D0022A9FDF12DFA4DC84BEDB7B8AB44308F9445E9E55867280EB70AF84CB51

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1661 110a9c90-110a9cf2 LoadLibraryA GetProcAddress 1662 110a9cf8-110a9d09 SetupDiGetClassDevsA 1661->1662 1663 110a9e05-110a9e0d SetLastError 1661->1663 1664 110a9d0f-110a9d1d 1662->1664 1665 110a9f13-110a9f15 1662->1665 1668 110a9e19-110a9e1b SetLastError 1663->1668 1669 110a9d20-110a9d24 1664->1669 1666 110a9f1e-110a9f20 1665->1666 1667 110a9f17-110a9f18 FreeLibrary 1665->1667 1670 110a9f37-110a9f52 call 11161d01 1666->1670 1667->1666 1671 110a9e21-110a9e2c GetLastError 1668->1671 1672 110a9d3d-110a9d55 1669->1672 1673 110a9d26-110a9d37 GetProcAddress 1669->1673 1674 110a9e32-110a9e3d call 11162be5 1671->1674 1675 110a9ec0-110a9ed1 GetProcAddress 1671->1675 1672->1671 1684 110a9d5b-110a9d5d 1672->1684 1673->1668 1673->1672 1674->1669 1678 110a9edb-110a9edd SetLastError 1675->1678 1679 110a9ed3-110a9ed9 SetupDiDestroyDeviceInfoList 1675->1679 1683 110a9ee3-110a9ee5 1678->1683 1679->1683 1683->1665 1685 110a9ee7-110a9f09 CreateFileA 1683->1685 1686 110a9d68-110a9d6a 1684->1686 1687 110a9d5f-110a9d65 call 11162be5 1684->1687 1691 110a9f0b-110a9f10 call 11162be5 1685->1691 1692 110a9f22-110a9f2c call 11162be5 1685->1692 1689 110a9d6c-110a9d7f GetProcAddress 1686->1689 1690 110a9d85-110a9d9b 1686->1690 1687->1686 1689->1690 1694 110a9e42-110a9e4a SetLastError 1689->1694 1700 110a9d9d-110a9da6 GetLastError 1690->1700 1701 110a9dac-110a9dbf call 11162b51 1690->1701 1691->1665 1702 110a9f2e-110a9f2f FreeLibrary 1692->1702 1703 110a9f35 1692->1703 1694->1700 1700->1701 1704 110a9e81-110a9e92 call 110a9c30 1700->1704 1711 110a9ea2-110a9eb3 call 110a9c30 1701->1711 1712 110a9dc5-110a9dcd 1701->1712 1702->1703 1703->1670 1709 110a9e9b-110a9e9d 1704->1709 1710 110a9e94-110a9e95 FreeLibrary 1704->1710 1709->1670 1710->1709 1711->1709 1718 110a9eb5-110a9ebe FreeLibrary 1711->1718 1714 110a9dcf-110a9de2 GetProcAddress 1712->1714 1715 110a9de4-110a9dfb 1712->1715 1714->1715 1717 110a9e4f-110a9e51 SetLastError 1714->1717 1719 110a9e57-110a9e71 call 110a9c30 call 11162be5 1715->1719 1721 110a9dfd-110a9e00 1715->1721 1717->1719 1718->1670 1719->1709 1726 110a9e73-110a9e7c FreeLibrary 1719->1726 1721->1669 1726->1670
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(setupapi.dll,C213C15D,?,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000,11184778), ref: 110A9CC3
                                                                                                          • GetProcAddress.KERNEL32(00000000,SetupDiGetClassDevsA), ref: 110A9CE7
                                                                                                          • SetupDiGetClassDevsA.SETUPAPI(111A6E0C,00000000,00000000,00000012,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF), ref: 110A9D01
                                                                                                          • GetProcAddress.KERNEL32(00000000,SetupDiEnumDeviceInterfaces), ref: 110A9D2C
                                                                                                          • _free.LIBCMT ref: 110A9D60
                                                                                                          • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9D72
                                                                                                          • GetLastError.KERNEL32 ref: 110A9D9D
                                                                                                          • _malloc.LIBCMT ref: 110A9DB3
                                                                                                          • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9DD5
                                                                                                          • SetLastError.KERNEL32(00000078,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9E07
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 110A9E1B
                                                                                                          • GetLastError.KERNEL32 ref: 110A9E21
                                                                                                          • _free.LIBCMT ref: 110A9E33
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 110A9E44
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 110A9E51
                                                                                                          • _free.LIBCMT ref: 110A9E64
                                                                                                          • FreeLibrary.KERNEL32(?,?), ref: 110A9E74
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9F18
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$AddressProc$Library_free$Free$ClassDevsLoadSetup_malloc
                                                                                                          • String ID: SetupDiDestroyDeviceInfoList$SetupDiEnumDeviceInterfaces$SetupDiGetClassDevsA$SetupDiGetDeviceInterfaceDetailA$setupapi.dll
                                                                                                          • API String ID: 3464732724-3340099623
                                                                                                          • Opcode ID: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                                          • Instruction ID: 033bff87456eb4c9bd2d5bbaba34d7345019b106b940800e90953e4c12ebf53e
                                                                                                          • Opcode Fuzzy Hash: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                                          • Instruction Fuzzy Hash: F2816279E14259ABEB04DFF4EC84F9FFBB8AF48704F104528F921A6284EB759905CB50

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1923 11133920-1113395c 1924 11133962-11133984 call 1105dd10 1923->1924 1925 11133c84-11133c9f call 11161d01 1923->1925 1924->1925 1930 1113398a-1113399e GetLocalTime 1924->1930 1931 111339c1-11133a43 LoadLibraryA call 110098c0 call 11015c30 GetCurrentProcess 1930->1931 1932 111339a0-111339bc call 11146450 1930->1932 1939 11133a45-11133a5b GetProcAddress 1931->1939 1940 11133a5d-11133a64 GetProcessHandleCount 1931->1940 1932->1931 1939->1940 1941 11133a66-11133a68 SetLastError 1939->1941 1942 11133a6e-11133a76 1940->1942 1941->1942 1943 11133a92-11133a9e 1942->1943 1944 11133a78-11133a90 GetProcAddress 1942->1944 1947 11133aa0-11133ab8 GetProcAddress 1943->1947 1948 11133aba-11133ac5 1943->1948 1944->1943 1945 11133ac7-11133ad2 SetLastError 1944->1945 1945->1947 1947->1948 1949 11133ad4-11133adc SetLastError 1947->1949 1950 11133adf-11133aef GetProcAddress 1948->1950 1949->1950 1952 11133af1-11133afd K32GetProcessMemoryInfo 1950->1952 1953 11133aff-11133b01 SetLastError 1950->1953 1954 11133b07-11133b15 1952->1954 1953->1954 1955 11133b23-11133b2e 1954->1955 1956 11133b17-11133b1f 1954->1956 1957 11133b30-11133b38 1955->1957 1958 11133b3c-11133b47 1955->1958 1956->1955 1957->1958 1959 11133b55-11133b5f 1958->1959 1960 11133b49-11133b51 1958->1960 1961 11133b61-11133b68 1959->1961 1962 11133b6a-11133b6d 1959->1962 1960->1959 1963 11133b6f-11133b7d call 11146450 1961->1963 1962->1963 1964 11133b80-11133b92 1962->1964 1963->1964 1968 11133c5a-11133c68 1964->1968 1969 11133b98-11133baa call 110637c0 1964->1969 1970 11133c6a-11133c6b FreeLibrary 1968->1970 1971 11133c6d-11133c75 1968->1971 1969->1968 1977 11133bb0-11133bd1 call 1105dd10 1969->1977 1970->1971 1973 11133c77-11133c78 FreeLibrary 1971->1973 1974 11133c7a-11133c7f 1971->1974 1973->1974 1974->1925 1976 11133c81-11133c82 FreeLibrary 1974->1976 1976->1925 1980 11133bd3-11133bd9 1977->1980 1981 11133bdf-11133bfb call 1105dd10 1977->1981 1980->1981 1982 11133bdb 1980->1982 1985 11133c06-11133c22 call 1105dd10 1981->1985 1986 11133bfd-11133c00 1981->1986 1982->1981 1990 11133c24-11133c27 1985->1990 1991 11133c2d-11133c49 call 1105dd10 1985->1991 1986->1985 1987 11133c02 1986->1987 1987->1985 1990->1991 1992 11133c29 1990->1992 1995 11133c50-11133c53 1991->1995 1996 11133c4b-11133c4e 1991->1996 1992->1991 1995->1968 1997 11133c55 call 11027780 1995->1997 1996->1995 1996->1997 1997->1968
                                                                                                          APIs
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                          • GetLocalTime.KERNEL32(?,_debug,CheckLeaks,00000001,00000000,C213C15D), ref: 1113398E
                                                                                                          • LoadLibraryA.KERNEL32(psapi.dll), ref: 111339E6
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 11133A27
                                                                                                          • GetProcAddress.KERNEL32(?,GetProcessHandleCount), ref: 11133A51
                                                                                                          • GetProcessHandleCount.KERNEL32(00000000,?), ref: 11133A62
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 11133A68
                                                                                                          • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133A84
                                                                                                          • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133AAC
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 11133AC9
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 11133AD6
                                                                                                          • GetProcAddress.KERNEL32(?,GetProcessMemoryInfo), ref: 11133AE8
                                                                                                          • K32GetProcessMemoryInfo.KERNEL32(?,?,00000028), ref: 11133AFB
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 11133B01
                                                                                                          • FreeLibrary.KERNEL32(?), ref: 11133C6B
                                                                                                          • FreeLibrary.KERNEL32(?), ref: 11133C78
                                                                                                          • FreeLibrary.KERNEL32(?), ref: 11133C82
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AddressErrorLastLibraryProc$FreeProcess$CountCurrentHandleInfoLoadLocalMemoryTime__wcstoi64
                                                                                                          • String ID: CheckLeaks$Client$Date=%04d-%02d-%02d$GetGuiResources$GetProcessHandleCount$GetProcessMemoryInfo$RestartGdiObj$RestartHandles$RestartMB$RestartUserObj$Used handles=%d, gdiObj=%d, userObj=%d, mem=%u kB$_debug$psapi.dll
                                                                                                          • API String ID: 263027137-1001504656
                                                                                                          • Opcode ID: 87783a789c6862cb7a583f6d0127a67f1abf74d6ca2b18a0a01f6916aa137176
                                                                                                          • Instruction ID: 17d7fdf42b282dadbb05295794651177f64ab9c07d211a437ec733fd2e53fcc2
                                                                                                          • Opcode Fuzzy Hash: 87783a789c6862cb7a583f6d0127a67f1abf74d6ca2b18a0a01f6916aa137176
                                                                                                          • Instruction Fuzzy Hash: A3B1BFB1E242699FDB10DFE9CDC0AADFBB6EB48319F10452AE414E7348DB349844CB65

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1999 1102dbc9 2000 1102dbd0-1102dbe1 1999->2000 2000->2000 2001 1102dbe3 2000->2001 2002 1102dd24-1102dd3d call 11142ac0 2001->2002 2005 1102dd43-1102dd45 2002->2005 2006 1102dbc0-1102dbc3 2002->2006 2009 1102de43-1102de5d call 111463d0 2005->2009 2010 1102dd4b-1102dd51 2005->2010 2007 1102dbc5-1102dbc7 2006->2007 2008 1102dbe8-1102dbf1 2006->2008 2007->2000 2008->2002 2013 1102dbf7-1102dbfe 2008->2013 2032 1102deb3-1102debf call 1102b4f0 2009->2032 2033 1102de5f-1102de78 call 1105dd10 2009->2033 2011 1102dd53-1102dd62 call 11144dc0 2010->2011 2012 1102dd68-1102dd78 2010->2012 2011->2012 2016 1102dd7a 2012->2016 2017 1102dd7f-1102dd9d call 1102cc10 2012->2017 2013->2002 2018 1102dcf3-1102dd08 call 11162de7 2013->2018 2019 1102dc05-1102dc07 2013->2019 2020 1102dd0a-1102dd1f call 11162de7 2013->2020 2021 1102dc9a-1102dccd call 111618c1 call 11142290 2013->2021 2022 1102dcdb-1102dcf1 call 11164010 2013->2022 2023 1102dc8b-1102dc95 2013->2023 2024 1102dccf-1102dcd9 2013->2024 2025 1102dc4c-1102dc52 2013->2025 2026 1102dc7c-1102dc86 2013->2026 2016->2017 2017->2009 2051 1102dda3-1102ddc8 call 110b7920 call 11146450 2017->2051 2018->2002 2019->2002 2031 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 2019->2031 2020->2002 2021->2002 2022->2002 2023->2002 2024->2002 2035 1102dc54-1102dc68 call 11162de7 2025->2035 2036 1102dc6d-1102dc77 2025->2036 2026->2002 2031->2002 2056 1102dec1-1102dec8 2032->2056 2057 1102de98-1102de9f 2032->2057 2033->2032 2054 1102de7a-1102de8c 2033->2054 2035->2002 2036->2002 2085 1102ddd3-1102ddd9 2051->2085 2086 1102ddca-1102ddd1 2051->2086 2054->2032 2077 1102de8e 2054->2077 2061 1102dea5-1102dea8 2056->2061 2064 1102deca-1102ded4 2056->2064 2057->2061 2062 1102e0aa-1102e0cb GetComputerNameA 2057->2062 2070 1102deaa-1102deb1 call 110b7920 2061->2070 2071 1102ded9 2061->2071 2068 1102e103-1102e109 2062->2068 2069 1102e0cd-1102e101 call 11027c30 2062->2069 2064->2062 2074 1102e10b-1102e110 2068->2074 2075 1102e13f-1102e152 call 11164010 2068->2075 2069->2068 2103 1102e157-1102e163 2069->2103 2073 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 2070->2073 2071->2073 2135 1102e07a-1102e082 SetLastError 2073->2135 2136 1102dfbc-1102dfd3 2073->2136 2084 1102e116-1102e11a 2074->2084 2097 1102e347-1102e36a 2075->2097 2077->2057 2089 1102e136-1102e138 2084->2089 2090 1102e11c-1102e11e 2084->2090 2092 1102dddb-1102dde2 call 11027d60 2085->2092 2093 1102de39 2085->2093 2086->2009 2095 1102e13b-1102e13d 2089->2095 2099 1102e132-1102e134 2090->2099 2100 1102e120-1102e126 2090->2100 2092->2093 2105 1102dde4-1102de16 2092->2105 2093->2009 2095->2075 2095->2103 2111 1102e392-1102e39a 2097->2111 2112 1102e36c-1102e372 2097->2112 2099->2095 2100->2089 2104 1102e128-1102e130 2100->2104 2107 1102e165-1102e17a call 110b7920 call 11029bd0 2103->2107 2108 1102e17c-1102e18f call 11081a70 2103->2108 2104->2084 2104->2099 2122 1102de20-1102de2f call 110f6080 2105->2122 2123 1102de18-1102de1e 2105->2123 2140 1102e1d3-1102e1ec call 11081a70 2107->2140 2128 1102e191-1102e1b4 2108->2128 2129 1102e1b6-1102e1b8 2108->2129 2117 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 2111->2117 2118 1102e39c-1102e3a9 call 11035dd0 call 111618c1 2111->2118 2112->2111 2115 1102e374-1102e38d call 1102d330 2112->2115 2115->2111 2118->2117 2132 1102de32-1102de34 call 1102d330 2122->2132 2123->2122 2123->2132 2128->2140 2131 1102e1c0-1102e1d1 2129->2131 2131->2131 2131->2140 2132->2093 2146 1102e043-1102e04f 2135->2146 2136->2146 2155 1102dfd5-1102dfde 2136->2155 2160 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 2140->2160 2161 1102e32c-1102e339 call 11164010 2140->2161 2148 1102e092-1102e0a1 2146->2148 2149 1102e051-1102e05d 2146->2149 2148->2062 2153 1102e0a3-1102e0a4 FreeLibrary 2148->2153 2156 1102e06f-1102e073 2149->2156 2157 1102e05f-1102e06d GetProcAddress 2149->2157 2153->2062 2155->2146 2164 1102dfe0-1102e016 call 11146450 call 1112b270 2155->2164 2162 1102e084-1102e086 SetLastError 2156->2162 2163 1102e075-1102e078 2156->2163 2157->2156 2199 1102e283-1102e299 call 11128ec0 2160->2199 2200 1102e26f-1102e27e call 11029450 2160->2200 2177 1102e33c-1102e341 CharUpperA 2161->2177 2165 1102e08c 2162->2165 2163->2165 2164->2146 2184 1102e018-1102e03e call 11146450 call 11027920 2164->2184 2165->2148 2177->2097 2184->2146 2204 1102e2b2-1102e2ec call 110d0bd0 * 2 2199->2204 2205 1102e29b-1102e2ad call 110d0bd0 2199->2205 2200->2199 2212 1102e302-1102e32a call 11164010 call 110d07c0 2204->2212 2213 1102e2ee-1102e2fd call 11029450 2204->2213 2205->2204 2212->2177 2213->2212
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(Wtsapi32.dll,Client,screenscrape,00000001,00000003,TCPIP,ListenPort,00000000,00000003,00000003,?,?,?,?,?,?), ref: 1102DF31
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad
                                                                                                          • String ID: $035347$14/03/16 10:38:31 V12.10F8$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$ListenPort$MacAddress$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Wtsapi32.dll$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                                          • API String ID: 1029625771-1968949224
                                                                                                          • Opcode ID: efde7a6f29c4b35a1bc2373ff856d498f8aef1b4f42035034b7e6d706e59a609
                                                                                                          • Instruction ID: 8eab5b2d156e186679f92ce27f1e5cdd209b728942572a9b5b46018c3091c824
                                                                                                          • Opcode Fuzzy Hash: efde7a6f29c4b35a1bc2373ff856d498f8aef1b4f42035034b7e6d706e59a609
                                                                                                          • Instruction Fuzzy Hash: 97C1D275E0026AAFDF22DF959C84BEDF7B9AB44308F9440EDE55867280D770AE80CB51

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 2219 111414a0-111414e1 call 11146450 2222 111414e7-11141543 LoadLibraryA 2219->2222 2223 11141569-11141593 call 11142e80 call 11146ee0 LoadLibraryA 2219->2223 2225 11141545-11141550 call 11017450 2222->2225 2226 11141557-11141560 2222->2226 2234 11141595-1114159b 2223->2234 2235 111415c3 2223->2235 2225->2226 2233 11141552 call 110cc7f0 2225->2233 2226->2223 2227 11141562-11141563 FreeLibrary 2226->2227 2227->2223 2233->2226 2234->2235 2237 1114159d-111415a3 2234->2237 2238 111415cd-111415ed GetClassInfoExA 2235->2238 2237->2235 2239 111415a5-111415c1 call 1105dd10 2237->2239 2240 111415f3-1114161a call 11161d20 call 111444b0 2238->2240 2241 1114168e-111416e6 2238->2241 2239->2238 2250 11141633-11141675 call 111444b0 call 111444e0 LoadCursorA GetStockObject RegisterClassExA 2240->2250 2251 1114161c-11141630 call 11029450 2240->2251 2252 11141722-11141728 2241->2252 2253 111416e8-111416ee 2241->2253 2250->2241 2277 11141677-1114168b call 11029450 2250->2277 2251->2250 2257 11141764-11141786 call 1105dd10 2252->2257 2258 1114172a-11141739 call 1110f420 2252->2258 2253->2252 2255 111416f0-111416f6 2253->2255 2255->2252 2261 111416f8-1114170f call 1112c830 LoadLibraryA 2255->2261 2268 11141794-11141799 2257->2268 2269 11141788-11141792 2257->2269 2272 1114175d 2258->2272 2273 1114173b-1114175b 2258->2273 2261->2252 2276 11141711-1114171d GetProcAddress 2261->2276 2274 111417a5-111417ab 2268->2274 2275 1114179b 2268->2275 2269->2274 2278 1114175f 2272->2278 2273->2278 2279 111417ad-111417b3 call 110f7d00 2274->2279 2280 111417b8-111417d1 call 1113cd80 2274->2280 2275->2274 2276->2252 2277->2241 2278->2257 2279->2280 2287 111417d7-111417dd 2280->2287 2288 11141879-1114188a 2280->2288 2289 111417df-111417f1 call 1110f420 2287->2289 2290 11141819-1114181f 2287->2290 2299 111417f3-11141809 call 1115d6d0 2289->2299 2300 1114180b 2289->2300 2292 11141845-11141851 2290->2292 2293 11141821-11141827 2290->2293 2297 11141853-11141859 2292->2297 2298 11141868-11141873 #17 LoadLibraryA 2292->2298 2295 1114182e-11141840 SetTimer 2293->2295 2296 11141829 call 11134930 2293->2296 2295->2292 2296->2295 2297->2298 2302 1114185b-11141861 2297->2302 2298->2288 2304 1114180d-11141814 2299->2304 2300->2304 2302->2298 2305 11141863 call 1112d6a0 2302->2305 2304->2290 2305->2298
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(User32.dll,00000000,00000000), ref: 111414F3
                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 11141563
                                                                                                          • LoadLibraryA.KERNEL32(imm32,?,?,00000000,00000000), ref: 11141586
                                                                                                          • GetClassInfoExA.USER32(11000000,NSMWClass,?), ref: 111415E5
                                                                                                          • _memset.LIBCMT ref: 111415F9
                                                                                                          • LoadCursorA.USER32(00000000,00007F00), ref: 11141649
                                                                                                          • GetStockObject.GDI32(00000000), ref: 11141653
                                                                                                          • RegisterClassExA.USER32(?), ref: 1114166A
                                                                                                          • LoadLibraryA.KERNEL32(pcihooks,?,?,00000000,00000000), ref: 11141702
                                                                                                          • GetProcAddress.KERNEL32(00000000,HookKeyboard), ref: 11141717
                                                                                                          • SetTimer.USER32(00000000,00000000,000003E8,1113CD60), ref: 1114183A
                                                                                                          • #17.COMCTL32(?,?,?,00000000,00000000), ref: 11141868
                                                                                                          • LoadLibraryA.KERNEL32(riched32.dll,?,?,?,00000000,00000000), ref: 11141873
                                                                                                            • Part of subcall function 11017450: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,C213C15D,1102FCB2,00000000), ref: 1101747E
                                                                                                            • Part of subcall function 11017450: LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1101748E
                                                                                                            • Part of subcall function 11017450: GetProcAddress.KERNEL32(00000000,QueueUserWorkItem), ref: 110174D2
                                                                                                            • Part of subcall function 11017450: FreeLibrary.KERNEL32(00000000), ref: 110174F8
                                                                                                            • Part of subcall function 110CC7F0: CreateWindowExA.USER32(00000000,button,11194244,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000000,00000000), ref: 110CC829
                                                                                                            • Part of subcall function 110CC7F0: SetClassLongA.USER32(00000000,000000E8,110CC570), ref: 110CC840
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Library$Load$Class$AddressCreateFreeProc$CursorEventInfoLongObjectRegisterStockTimerWindow_memset
                                                                                                          • String ID: *quiet$HookKeyboard$InitUI (%d)$NSMGetAppIcon()$NSMWClass$TraceCopyData$UI.CPP$User32.dll$View$_License$_debug$imm32$pcihooks$riched32.dll
                                                                                                          • API String ID: 3706574701-3145203681
                                                                                                          • Opcode ID: bf77d67e3ec3500b8f2db5927d4705f1cc154319e5a682cee20025d48f6291c1
                                                                                                          • Instruction ID: 9b294397b9efa9119a6c3372e39ca87a41eafe2d9b680e3b49ce131b24699399
                                                                                                          • Opcode Fuzzy Hash: bf77d67e3ec3500b8f2db5927d4705f1cc154319e5a682cee20025d48f6291c1
                                                                                                          • Instruction Fuzzy Hash: 6EA19DB4E0126AAFDB01DFE9C9C4AADFBB4FB4870DB60413EE52997644EB306440CB55

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 2308 110285f0-1102860d 2309 11028613-11028642 2308->2309 2310 11028cd8-11028cdf 2308->2310 2311 110286d0-11028718 GetModuleFileNameA call 111631f0 call 11163fed 2309->2311 2312 11028648-1102864e 2309->2312 2313 11028cf1-11028cf5 2310->2313 2314 11028ce1-11028cea 2310->2314 2328 1102871d 2311->2328 2316 11028650-11028658 2312->2316 2318 11028cf7-11028d09 call 11161d01 2313->2318 2319 11028d0a-11028d1e call 11161d01 2313->2319 2314->2313 2317 11028cec 2314->2317 2316->2316 2322 1102865a-11028660 2316->2322 2317->2313 2326 11028663-11028668 2322->2326 2326->2326 2329 1102866a-11028674 2326->2329 2330 11028720-1102872a 2328->2330 2331 11028691-11028697 2329->2331 2332 11028676-1102867d 2329->2332 2333 11028730-11028733 2330->2333 2334 11028ccf-11028cd7 2330->2334 2336 11028698-1102869e 2331->2336 2335 11028680-11028686 2332->2335 2333->2334 2338 11028739-11028747 call 11026890 2333->2338 2334->2310 2335->2335 2339 11028688-1102868e 2335->2339 2336->2336 2337 110286a0-110286ce call 11163fed 2336->2337 2337->2330 2344 11028c55-11028c6a call 11163db7 2338->2344 2345 1102874d-11028760 call 11162de7 2338->2345 2339->2331 2344->2334 2352 11028c70-11028cca 2344->2352 2350 11028762-11028765 2345->2350 2351 1102876b-11028793 call 11026700 call 11026890 2345->2351 2350->2344 2350->2351 2351->2344 2357 11028799-110287b6 call 11026980 call 11026890 2351->2357 2352->2334 2362 11028bc5-11028bcc 2357->2362 2363 110287bc 2357->2363 2364 11028bf2-11028bf9 2362->2364 2365 11028bce-11028bd1 2362->2365 2366 110287c0-110287e0 call 11026700 2363->2366 2368 11028c11-11028c18 2364->2368 2369 11028bfb-11028c01 2364->2369 2365->2364 2367 11028bd3-11028bda 2365->2367 2378 110287e2-110287e5 2366->2378 2379 11028816-11028819 2366->2379 2371 11028be0-11028bf0 2367->2371 2373 11028c1a-11028c25 2368->2373 2374 11028c28-11028c2f 2368->2374 2372 11028c07-11028c0f 2369->2372 2371->2364 2371->2371 2372->2368 2372->2372 2373->2374 2376 11028c31-11028c3b 2374->2376 2377 11028c3e-11028c45 2374->2377 2376->2377 2377->2344 2382 11028c47-11028c52 2377->2382 2380 110287e7-110287ee 2378->2380 2381 110287fe-11028801 2378->2381 2383 11028bae-11028bbf call 11026890 2379->2383 2384 1102881f-11028832 call 11164150 2379->2384 2385 110287f4-110287fc 2380->2385 2381->2383 2386 11028807-11028811 2381->2386 2382->2344 2383->2362 2383->2366 2384->2383 2391 11028838-11028854 call 111646ce 2384->2391 2385->2381 2385->2385 2386->2383 2394 11028856-1102885c 2391->2394 2395 1102886f-11028885 call 111646ce 2391->2395 2396 11028860-11028868 2394->2396 2400 11028887-1102888d 2395->2400 2401 1102889f-110288b5 call 111646ce 2395->2401 2396->2396 2399 1102886a 2396->2399 2399->2383 2402 11028890-11028898 2400->2402 2406 110288b7-110288bd 2401->2406 2407 110288cf-110288e5 call 111646ce 2401->2407 2402->2402 2404 1102889a 2402->2404 2404->2383 2408 110288c0-110288c8 2406->2408 2412 110288e7-110288ed 2407->2412 2413 110288ff-11028915 call 111646ce 2407->2413 2408->2408 2410 110288ca 2408->2410 2410->2383 2415 110288f0-110288f8 2412->2415 2418 11028917-1102891d 2413->2418 2419 1102892f-11028945 call 111646ce 2413->2419 2415->2415 2417 110288fa 2415->2417 2417->2383 2420 11028920-11028928 2418->2420 2424 11028947-1102894d 2419->2424 2425 1102895f-11028975 call 111646ce 2419->2425 2420->2420 2422 1102892a 2420->2422 2422->2383 2426 11028950-11028958 2424->2426 2430 11028977-1102897d 2425->2430 2431 1102898f-110289a5 call 111646ce 2425->2431 2426->2426 2428 1102895a 2426->2428 2428->2383 2432 11028980-11028988 2430->2432 2436 110289a7-110289ad 2431->2436 2437 110289bf-110289d5 call 111646ce 2431->2437 2432->2432 2434 1102898a 2432->2434 2434->2383 2438 110289b0-110289b8 2436->2438 2442 110289d7-110289dd 2437->2442 2443 110289ef-11028a05 call 111646ce 2437->2443 2438->2438 2440 110289ba 2438->2440 2440->2383 2444 110289e0-110289e8 2442->2444 2448 11028a07-11028a0d 2443->2448 2449 11028a1f-11028a35 call 111646ce 2443->2449 2444->2444 2447 110289ea 2444->2447 2447->2383 2450 11028a10-11028a18 2448->2450 2454 11028a37-11028a3d 2449->2454 2455 11028a4f-11028a65 call 111646ce 2449->2455 2450->2450 2452 11028a1a 2450->2452 2452->2383 2456 11028a40-11028a48 2454->2456 2460 11028a86-11028a9c call 111646ce 2455->2460 2461 11028a67-11028a6d 2455->2461 2456->2456 2458 11028a4a 2456->2458 2458->2383 2466 11028ab3-11028ac9 call 111646ce 2460->2466 2467 11028a9e 2460->2467 2463 11028a77-11028a7f 2461->2463 2463->2463 2465 11028a81 2463->2465 2465->2383 2472 11028ae0-11028af6 call 111646ce 2466->2472 2473 11028acb 2466->2473 2468 11028aa4-11028aac 2467->2468 2468->2468 2470 11028aae 2468->2470 2470->2383 2478 11028b17-11028b2d call 111646ce 2472->2478 2479 11028af8-11028afe 2472->2479 2474 11028ad1-11028ad9 2473->2474 2474->2474 2476 11028adb 2474->2476 2476->2383 2484 11028b4f-11028b65 call 111646ce 2478->2484 2485 11028b2f-11028b3f 2478->2485 2480 11028b08-11028b10 2479->2480 2480->2480 2482 11028b12 2480->2482 2482->2383 2490 11028b67-11028b6d 2484->2490 2491 11028b7c-11028b92 call 111646ce 2484->2491 2486 11028b40-11028b48 2485->2486 2486->2486 2488 11028b4a 2486->2488 2488->2383 2492 11028b70-11028b78 2490->2492 2491->2383 2496 11028b94-11028b9a 2491->2496 2492->2492 2495 11028b7a 2492->2495 2495->2383 2497 11028ba4-11028bac 2496->2497 2497->2383 2497->2497
                                                                                                          APIs
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,74651370,?,0000001A), ref: 110286DD
                                                                                                          • _strrchr.LIBCMT ref: 110286EC
                                                                                                            • Part of subcall function 111646CE: __stricmp_l.LIBCMT ref: 1116470B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: FileModuleName__stricmp_l_strrchr
                                                                                                          • String ID: ??F$??I$AssistantName$AssistantURL$Home$LongName$NSMAppDataDir$NSSAppDataDir$NSSConfName$NSSLongCaption$NSSName$NSSTLA$Name$ShortName$SupportEMail$SupportWWW$SupportsAndroid$SupportsChrome$TLA$TechConsole$\$product.dat
                                                                                                          • API String ID: 1609618855-357498123
                                                                                                          • Opcode ID: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                                          • Instruction ID: efd952e0d0f75bab71a6f775fe147756553f35749af42d5d105ea8c6321280ff
                                                                                                          • Opcode Fuzzy Hash: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                                          • Instruction Fuzzy Hash: ED12D67CD0929A8BDB17CF64CC807E5B7F5AB19308F8400EEE9D557201EB729686CB52

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 2498 11086700-1108671d call 110866f0 2501 1108671f-1108672f call 11161d01 2498->2501 2502 11086730-11086740 call 11144bd0 2498->2502 2507 11086742-1108674a 2502->2507 2507->2507 2508 1108674c-11086752 2507->2508 2509 11086753-11086759 2508->2509 2509->2509 2510 1108675b-11086792 LoadLibraryA 2509->2510 2511 110867f9-1108680e GetProcAddress 2510->2511 2512 11086794-1108679b 2510->2512 2515 1108689c-110868ad call 11161d01 2511->2515 2516 11086814-11086823 GetProcAddress 2511->2516 2513 1108679d-110867ee GetModuleFileNameA call 11081b40 LoadLibraryA 2512->2513 2514 110867f0-110867f3 2512->2514 2513->2514 2514->2511 2514->2515 2516->2515 2519 11086825-11086834 GetProcAddress 2516->2519 2519->2515 2522 11086836-11086845 GetProcAddress 2519->2522 2522->2515 2523 11086847-11086856 GetProcAddress 2522->2523 2523->2515 2524 11086858-11086867 GetProcAddress 2523->2524 2524->2515 2525 11086869-11086878 GetProcAddress 2524->2525 2525->2515 2526 1108687a-11086889 GetProcAddress 2525->2526 2526->2515 2527 1108688b-1108689a GetProcAddress 2526->2527 2527->2515 2528 110868ae-110868c3 call 11161d01 2527->2528
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(?,00000001,0000DD7C), ref: 1108678C
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 110867AA
                                                                                                          • LoadLibraryA.KERNEL32(?), ref: 110867EC
                                                                                                          • GetProcAddress.KERNEL32(?,CipherServer_Create), ref: 11086807
                                                                                                          • GetProcAddress.KERNEL32(?,CipherServer_Destroy), ref: 1108681C
                                                                                                          • GetProcAddress.KERNEL32(00000000,CipherServer_GetInfoBlock), ref: 1108682D
                                                                                                          • GetProcAddress.KERNEL32(?,CipherServer_OpenSession), ref: 1108683E
                                                                                                          • GetProcAddress.KERNEL32(?,CipherServer_CloseSession), ref: 1108684F
                                                                                                          • GetProcAddress.KERNEL32(00000000,CipherServer_EncryptBlocks), ref: 11086860
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$LibraryLoad$FileModuleName
                                                                                                          • String ID: CipherServer_CloseSession$CipherServer_Create$CipherServer_DecryptBlocks$CipherServer_Destroy$CipherServer_EncryptBlocks$CipherServer_GetInfoBlock$CipherServer_GetRandomData$CipherServer_OpenSession$CipherServer_ResetSession$CryptPak.dll
                                                                                                          • API String ID: 2201880244-3035937465
                                                                                                          • Opcode ID: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                                          • Instruction ID: c81deb3771c39ade44f8803fbe1e6421c41fb3d40bd553f41274565aeadcb2b4
                                                                                                          • Opcode Fuzzy Hash: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                                          • Instruction Fuzzy Hash: CD51C174E1834A9BD710DF79DC94BA6FBE9AF54304B1289AED885C7240EAB2E444CF50

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 2531 11141890-111418c6 2532 111418cf-111418e4 call 1110f420 2531->2532 2533 111418c8-111418ca 2531->2533 2539 111418e6-1114190e call 11060f70 2532->2539 2540 11141910-11141912 2532->2540 2534 111421f2-1114220d call 11161d01 2533->2534 2541 11141918-11141947 call 11061700 2539->2541 2540->2541 2547 11141950-1114195d call 11142e50 2541->2547 2548 11141949-1114194a RegCloseKey 2541->2548 2551 11141964-11141985 call 11144dc0 call 11143230 2547->2551 2552 1114195f 2547->2552 2548->2547 2557 11141997-111419ad call 1110f420 2551->2557 2558 11141987-11141992 call 11062d60 2551->2558 2552->2551 2562 111419c2 2557->2562 2563 111419af-111419c0 call 11060be0 2557->2563 2558->2557 2565 111419c8-111419e2 call 1110f420 2562->2565 2563->2565 2569 111419e4-111419f5 call 11060be0 2565->2569 2570 111419f7 2565->2570 2571 111419fd-11141a17 call 1110f420 2569->2571 2570->2571 2576 11141a2c 2571->2576 2577 11141a19-11141a2a call 11060be0 2571->2577 2579 11141a32-11141a79 call 11060760 * 2 2576->2579 2577->2579 2585 11141a80 2579->2585 2586 11141a87-11141a8e 2585->2586 2587 11141a90-11141a97 2586->2587 2588 11141a9d-11141aa5 2586->2588 2587->2588 2589 11141d9a 2587->2589 2590 11141aa7-11141aad 2588->2590 2591 11141ac9-11141ad0 2588->2591 2595 11141da0-11141da2 2589->2595 2590->2591 2592 11141aaf-11141abc call 110607f0 2590->2592 2593 11141af5-11141b03 2591->2593 2594 11141ad2-11141ad9 2591->2594 2612 11141ac7 2592->2612 2613 11141abe-11141ac5 2592->2613 2600 11141b05-11141b07 2593->2600 2601 11141b0d-11141b0f 2593->2601 2594->2593 2597 11141adb-11141ae8 call 110607f0 2594->2597 2598 1114217f-11142187 2595->2598 2599 11141da8-11141df2 call 110d1550 call 1105dd10 2595->2599 2624 11141af3 2597->2624 2625 11141aea-11141af1 2597->2625 2606 11142191-11142199 2598->2606 2607 11142189-1114218d 2598->2607 2648 11141f3d-11141f85 call 11060f40 call 1106b5c0 call 110679c0 2599->2648 2649 11141df8-11141e1f call 11060760 call 110607f0 2599->2649 2600->2589 2600->2601 2602 11141b11-11141b13 2601->2602 2603 11141b5d-11141b5f 2601->2603 2610 11141b15-11141b1b 2602->2610 2611 11141b2f-11141b31 2602->2611 2615 11141b61-11141b66 2603->2615 2616 11141b68-11141b6a 2603->2616 2617 111421a3-111421ab 2606->2617 2618 1114219b-1114219f 2606->2618 2607->2606 2610->2611 2621 11141b1d-11141b2a call 11146450 2610->2621 2622 11141d85-11141d98 call 11146450 2611->2622 2623 11141b37-11141b3e 2611->2623 2612->2591 2613->2591 2626 11141b8b-11141ba5 call 11081bb0 2615->2626 2627 11141b73-11141b89 call 11081bb0 2616->2627 2628 11141b6c-11141b71 2616->2628 2619 111421b5-111421f0 call 11060640 * 2 call 111618c1 2617->2619 2620 111421ad-111421b1 2617->2620 2618->2617 2619->2534 2620->2619 2621->2585 2622->2595 2623->2622 2633 11141b44-11141b58 call 11146450 2623->2633 2624->2593 2625->2593 2644 11141cac-11141ce9 call 1105de00 call 111319f0 2626->2644 2645 11141bab 2626->2645 2627->2626 2628->2626 2633->2586 2672 11141cf1-11141cf8 2644->2672 2673 11141ceb 2644->2673 2651 11141bb5 2645->2651 2652 11141bad-11141baf 2645->2652 2699 11141f87 2648->2699 2700 11141fb3-11141fe8 EnterCriticalSection call 11060420 call 11060f40 2648->2700 2686 11141e21-11141e50 call 11146450 call 110607f0 2649->2686 2687 11141e52-11141e7a call 11060760 call 110607f0 2649->2687 2656 11141c3e-11141c7b call 1105de00 call 111319f0 2651->2656 2657 11141bbb-11141bc1 2651->2657 2652->2644 2652->2651 2695 11141c83-11141c8a 2656->2695 2696 11141c7d 2656->2696 2663 11141bc7-11141bcb 2657->2663 2669 11141be7-11141be9 2663->2669 2670 11141bcd-11141bcf 2663->2670 2679 11141bec-11141bee 2669->2679 2677 11141bd1-11141bd7 2670->2677 2678 11141be3-11141be5 2670->2678 2684 11141d0a 2672->2684 2685 11141cfa-11141d08 2672->2685 2673->2672 2677->2669 2689 11141bd9-11141be1 2677->2689 2678->2679 2681 11141bf0-11141c2a call 1105de00 call 111319f0 2679->2681 2682 11141c32-11141c39 2679->2682 2681->2682 2723 11141c2c 2681->2723 2693 11141d11 2682->2693 2684->2693 2685->2684 2685->2693 2686->2687 2721 11141eb1-11141ed8 call 11060760 call 110607f0 2687->2721 2722 11141e7c 2687->2722 2689->2663 2689->2678 2701 11141d18-11141d1a 2693->2701 2703 11141c9c 2695->2703 2704 11141c8c-11141c9a 2695->2704 2696->2695 2708 11141f90-11141f9e call 110508e0 2699->2708 2735 11141ffa-1114200c LeaveCriticalSection 2700->2735 2736 11141fea-11141ff7 call 1102a9f0 2700->2736 2710 11141d1c-11141d1e 2701->2710 2711 11141d3e-11141d56 call 11081c60 2701->2711 2705 11141ca3-11141caa 2703->2705 2704->2703 2704->2705 2705->2701 2730 11141fa0-11141fa1 2708->2730 2731 11141fa3 2708->2731 2710->2711 2718 11141d20-11141d38 call 11081bb0 2710->2718 2727 11141d58 2711->2727 2728 11141d5b-11141d73 call 11081c60 2711->2728 2718->2586 2718->2711 2759 11141f11-11141f38 call 11060640 * 3 2721->2759 2760 11141eda 2721->2760 2729 11141e80-11141eaf call 11146450 call 110607f0 2722->2729 2723->2682 2727->2728 2751 11141d75-11141d78 2728->2751 2752 11141d7d-11141d80 2728->2752 2729->2721 2739 11141fa4-11141fb1 call 110679c0 2730->2739 2731->2739 2742 11142051-1114209e call 11133400 call 110d1550 call 110cff20 2735->2742 2743 1114200e-11142010 2735->2743 2736->2735 2739->2700 2739->2708 2782 111420a4-111420c1 call 110d12e0 2742->2782 2783 1114214c-11142179 call 110d07c0 call 1106b620 call 110d07c0 2742->2783 2743->2742 2750 11142012-11142034 call 11146450 call 1113cc30 call 111414a0 2743->2750 2750->2742 2781 11142036-1114204e call 11146450 call 11026ba0 2750->2781 2751->2586 2752->2586 2759->2648 2761 11141ee0-11141f0f call 11146450 call 110607f0 2760->2761 2761->2759 2781->2742 2796 111420c3-111420d7 call 11029450 2782->2796 2797 111420da-111420f0 call 11081bb0 2782->2797 2783->2598 2796->2797 2803 111420f2-1114210a call 11009450 call 11081a70 2797->2803 2804 1114212b-11142145 2797->2804 2803->2804 2811 1114210c-11142129 call 11009450 2803->2811 2808 1114214a 2804->2808 2808->2783 2811->2808
                                                                                                          APIs
                                                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 1114194A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Close
                                                                                                          • String ID: Add [%s]%s=%s$Chg [%s]%s=%s$Client$Del [%s]%s=%s$Info. Lockup averted for AD policy changes$Info. Policy changed - re-initui$Info. Policy changed - reload transports...$IsA()$NSA.LIC$NSM.LIC$RoomSpec$TracePolicyChange$Warning. Can't calc AD policy changes$_debug$client$client.$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                                          • API String ID: 3535843008-2062829784
                                                                                                          • Opcode ID: d57b2f7d390a2548c1a404b3922d606782abb187a8979f341b8c48ed45959037
                                                                                                          • Instruction ID: 6553b1da6d6d14651d2a1fffef45e08f8fb4271012d2e4188a9b1e9169dedbc2
                                                                                                          • Opcode Fuzzy Hash: d57b2f7d390a2548c1a404b3922d606782abb187a8979f341b8c48ed45959037
                                                                                                          • Instruction Fuzzy Hash: E4420778E002999FEB21CBA0CD90FEEF7766F95B08F1401D8D50967681EB727A84CB51

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                          • InitializeCriticalSection.KERNEL32(0000000C,?,00000000), ref: 11074AE5
                                                                                                          • InitializeCriticalSection.KERNEL32(00000024,?,00000000), ref: 11074AEB
                                                                                                          • InitializeCriticalSection.KERNEL32(0000003C,?,00000000), ref: 11074AF1
                                                                                                          • InitializeCriticalSection.KERNEL32(0000DB1C,?,00000000), ref: 11074AFA
                                                                                                          • InitializeCriticalSection.KERNEL32(00000054,?,00000000), ref: 11074B00
                                                                                                          • InitializeCriticalSection.KERNEL32(0000006C,?,00000000), ref: 11074B06
                                                                                                          • _strncpy.LIBCMT ref: 11074B68
                                                                                                          • ExpandEnvironmentStringsA.KERNEL32(?,?,00000100,?,?,?,?,?,?,00000000), ref: 11074BCF
                                                                                                          • CreateThread.KERNEL32(00000000,00004000,11070C60,00000000,00000000,?), ref: 11074C6C
                                                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 11074C73
                                                                                                          • SetTimer.USER32(00000000,00000000,000000FA,11063680), ref: 11074CB7
                                                                                                          • std::exception::exception.LIBCMT ref: 11074D68
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 11074D83
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalInitializeSection$CloseCreateEnvironmentException@8ExpandHandleStringsThreadThrowTimer_malloc_memset_strncpystd::exception::exceptionwsprintf
                                                                                                          • String ID: ..\ctl32\Connect.cpp$DefaultUsername$General$Password$RememberPassword$destroy_queue == NULL
                                                                                                          • API String ID: 703120326-1497550179
                                                                                                          • Opcode ID: 7c8943816f378bc6fd854347406ceee894156ad89ebdfca9a8c75f1e5f5be459
                                                                                                          • Instruction ID: 2d3153b5a6430d98d64e81d2a1e668bfe4de0d121a1dff3557e595bbadcf65c6
                                                                                                          • Opcode Fuzzy Hash: 7c8943816f378bc6fd854347406ceee894156ad89ebdfca9a8c75f1e5f5be459
                                                                                                          • Instruction Fuzzy Hash: 79B1A4B5A00359AFD710CF64CD84FDAF7F4BB48708F0085A9E65997281EBB0B944CB65

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                          • OpenEventA.KERNEL32(00000002,00000000,nsm_gina_sas,00000009), ref: 11108E0A
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 11108E19
                                                                                                          • GetSystemDirectoryA.KERNEL32(?,000000F7), ref: 11108E2B
                                                                                                          • LoadLibraryA.KERNEL32(?), ref: 11108E61
                                                                                                          • GetProcAddress.KERNEL32(?,GrabKM), ref: 11108E8E
                                                                                                          • GetProcAddress.KERNEL32(?,LoggedOn), ref: 11108EA6
                                                                                                          • FreeLibrary.KERNEL32(?), ref: 11108ECB
                                                                                                            • Part of subcall function 1110F2B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EEC3F0,00000000,?,11110245,1110FDE0,00000001,00000000), ref: 1110F2C7
                                                                                                            • Part of subcall function 1110F2B0: CreateThread.KERNEL32(00000000,11110245,00000001,00000000,00000000,0000000C), ref: 1110F2EA
                                                                                                            • Part of subcall function 1110F2B0: WaitForSingleObject.KERNEL32(?,000000FF,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F317
                                                                                                            • Part of subcall function 1110F2B0: CloseHandle.KERNEL32(?,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F321
                                                                                                          • GetStockObject.GDI32(0000000D), ref: 11108EDF
                                                                                                          • GetObjectA.GDI32(00000000,0000003C,?), ref: 11108EEF
                                                                                                          • InitializeCriticalSection.KERNEL32(0000003C), ref: 11108F0B
                                                                                                          • InitializeCriticalSection.KERNEL32(111F060C), ref: 11108F16
                                                                                                            • Part of subcall function 11107290: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11189A56,000000FF), ref: 11107363
                                                                                                            • Part of subcall function 11107290: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111073B2
                                                                                                          • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108F59
                                                                                                            • Part of subcall function 1109E9E0: GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA01
                                                                                                            • Part of subcall function 1109E9E0: OpenProcessToken.ADVAPI32(00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA08
                                                                                                            • Part of subcall function 1109E9E0: CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 1109EA27
                                                                                                          • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108FAA
                                                                                                          • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108FFF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandle$Library$LoadObject$AddressCreateCriticalEventInitializeOpenProcProcessSection$CurrentDirectoryFreeSingleStockSystemThreadTokenWait_malloc_memsetwsprintf
                                                                                                          • String ID: GrabKM$LPT1$LoggedOn$\pcigina$nsm_gina_sas
                                                                                                          • API String ID: 3930710499-403456261
                                                                                                          • Opcode ID: 1bb63630e84e06d7a5d883501c08249baca6a639cf459e52fb6089e18ee58e4a
                                                                                                          • Instruction ID: 229803012459fbbe5cfd3a30b02a894d1af5bad55287ed163187595495ff030c
                                                                                                          • Opcode Fuzzy Hash: 1bb63630e84e06d7a5d883501c08249baca6a639cf459e52fb6089e18ee58e4a
                                                                                                          • Instruction Fuzzy Hash: DC81AFB4E0435AEFEB55DFB48C89B9AFBE9AB48308F00457DE569D7280E7309944CB11

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 2938 11138c30-11138c47 2939 11139072-11139081 call 11161d01 2938->2939 2940 11138c4d-11138c54 2938->2940 2940->2939 2942 11138c5a-11138c61 2940->2942 2942->2939 2944 11138c67-11138c6e 2942->2944 2944->2939 2945 11138c74-11138c7b 2944->2945 2945->2939 2946 11138c81-11138c91 call 111450a0 2945->2946 2949 11138c93-11138c9a 2946->2949 2950 11138ca0-11138ce7 call 1105dd10 call 110637c0 2946->2950 2949->2939 2949->2950 2955 11138cf5-11138d1e call 1112c920 2950->2955 2956 11138ce9-11138cf0 2950->2956 2959 11138d24-11138d27 2955->2959 2960 11138dda call 110ea430 2955->2960 2956->2955 2962 11138d35 2959->2962 2963 11138d29-11138d2e 2959->2963 2966 11138ddf-11138de1 2960->2966 2965 11138d3b-11138d46 2962->2965 2963->2962 2964 11138d30-11138d33 2963->2964 2964->2965 2967 11138d48 2965->2967 2968 11138d4d-11138d65 2965->2968 2969 11138de3-11138dfe call 1105dd10 2966->2969 2970 11138e00-11138e0f PostMessageA 2966->2970 2967->2968 2980 11138dc1-11138dc8 2968->2980 2981 11138d67-11138d6d 2968->2981 2969->2970 2972 11138e15-11138e1a 2969->2972 2970->2972 2973 11138e25-11138e29 2972->2973 2974 11138e1c-11138e20 call 1110f270 2972->2974 2978 11138e2b-11138e33 2973->2978 2979 11138e4d-11138e76 call 11130410 call 11146ec0 call 1112cb20 call 111618c1 2973->2979 2974->2973 2984 11138e35-11138e4b 2978->2984 2985 11138e79-11138e81 2978->2985 2979->2985 2982 11138dd7 2980->2982 2983 11138dca-11138dd1 call 11131a80 2980->2983 2987 11138d6f-11138d74 2981->2987 2988 11138dbc 2981->2988 2982->2960 2983->2982 3001 11138dd3 2983->3001 2984->2985 2989 11138e83-11138e9d call 111618c1 call 11161d01 2985->2989 2990 11138e9e-11138ec4 call 11142e80 call 11146ee0 SetWindowTextA 2985->2990 2987->2988 2993 11138d76-11138d7b 2987->2993 2988->2980 3012 11138ed0-11138ee9 call 111618c1 * 2 2990->3012 3013 11138ec6-11138ecd call 111352b0 2990->3013 2993->2988 2999 11138d7d-11138d9f 2993->2999 2999->2988 3011 11138da1-11138db0 call 11145b40 2999->3011 3001->2982 3021 11138db2-11138dba 3011->3021 3025 11138eeb-11138eef 3012->3025 3026 11138f2e-11138f32 3012->3026 3013->3012 3021->2988 3021->3021 3027 11138f03-11138f0a 3025->3027 3028 11138ef1-11138f01 call 111352b0 3025->3028 3029 11138f38-11138f3a 3026->3029 3030 11138ffc-11138ffe 3026->3030 3034 11138f24 3027->3034 3035 11138f0c-11138f21 call 11131210 3027->3035 3028->3027 3028->3035 3036 11138f5c-11138f69 call 110f8640 3029->3036 3037 11138f3c-11138f3e 3029->3037 3032 11139000-11139002 3030->3032 3033 1113901d-1113902a call 110f8640 3030->3033 3040 11139013-1113901a call 11131210 3032->3040 3041 11139004-1113900e call 111352b0 3032->3041 3051 1113906f-11139071 3033->3051 3052 1113902c-1113903c IsWindowVisible 3033->3052 3034->3026 3035->3034 3036->3051 3054 11138f6f-11138f80 IsWindowVisible 3036->3054 3037->3036 3044 11138f40-11138f50 call 111352b0 3037->3044 3040->3033 3041->3040 3044->3036 3058 11138f52-11138f59 call 11131210 3044->3058 3051->2939 3052->3051 3057 1113903e-11139049 IsWindowVisible 3052->3057 3054->3051 3059 11138f86-11138f96 call 111450a0 3054->3059 3057->3051 3060 1113904b-1113906d EnableWindow call 11131210 EnableWindow 3057->3060 3058->3036 3059->3051 3067 11138f9c-11138fb4 GetForegroundWindow IsWindowVisible 3059->3067 3060->3051 3068 11138fc1-11138fcd call 11131210 3067->3068 3069 11138fb6-11138fbf EnableWindow 3067->3069 3072 11138fcf-11138fd5 3068->3072 3073 11138fde-11138ffb EnableWindow call 11161d01 3068->3073 3069->3068 3072->3073 3074 11138fd7-11138fd8 SetForegroundWindow 3072->3074 3074->3073
                                                                                                          APIs
                                                                                                            • Part of subcall function 111450A0: GetVersionExA.KERNEL32(111F0EF0,75BF8400), ref: 111450D0
                                                                                                            • Part of subcall function 111450A0: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                                            • Part of subcall function 111450A0: _memset.LIBCMT ref: 1114512D
                                                                                                            • Part of subcall function 111450A0: _strncpy.LIBCMT ref: 111451FA
                                                                                                          • PostMessageA.USER32(00020442,000006CF,00000007,00000000), ref: 11138E0F
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                          • SetWindowTextA.USER32(00020442,00000000), ref: 11138EB7
                                                                                                          • IsWindowVisible.USER32(00020442), ref: 11138F7C
                                                                                                          • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,00000000), ref: 11138F9C
                                                                                                          • IsWindowVisible.USER32(00020442), ref: 11138FAA
                                                                                                          • SetForegroundWindow.USER32(00000000), ref: 11138FD8
                                                                                                          • EnableWindow.USER32(00020442,00000001), ref: 11138FE7
                                                                                                          • IsWindowVisible.USER32(00020442), ref: 11139038
                                                                                                          • IsWindowVisible.USER32(00020442), ref: 11139045
                                                                                                          • EnableWindow.USER32(00020442,00000000), ref: 11139059
                                                                                                          • EnableWindow.USER32(00020442,00000000), ref: 11138FBF
                                                                                                            • Part of subcall function 11131210: ShowWindow.USER32(00020442,00000000,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131234
                                                                                                          • EnableWindow.USER32(00020442,00000001), ref: 1113906D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Window$EnableVisible$Foreground$MessageOpenPostShowTextVersion__wcstoi64_memset_strncpy
                                                                                                          • String ID: Client$ConnectedText$HideWhenIdle$LockedText$ShowUIOnConnect$ViewedText
                                                                                                          • API String ID: 3453649892-3803836183
                                                                                                          • Opcode ID: 391fd03a16533da79435ce5bee1303fc2e717428408a6b437c143b59ca9afbf1
                                                                                                          • Instruction ID: ae8ec3c714d324370739ddb1cab1952d607c59122f5be0bb7ac7fd02d25128b2
                                                                                                          • Opcode Fuzzy Hash: 391fd03a16533da79435ce5bee1303fc2e717428408a6b437c143b59ca9afbf1
                                                                                                          • Instruction Fuzzy Hash: 86C12A75A1122A9BEB11DFF4CD80B6EF769ABC072DF140138EA159B28CEB75E804C751
                                                                                                          APIs
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000102,NSM.LIC,00000009), ref: 110281F1
                                                                                                            • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                                          • wsprintfA.USER32 ref: 11028214
                                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 11028259
                                                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 1102826D
                                                                                                          • wsprintfA.USER32 ref: 11028291
                                                                                                          • CloseHandle.KERNEL32(?), ref: 110282A7
                                                                                                          • CloseHandle.KERNEL32(?), ref: 110282B0
                                                                                                          • LoadLibraryExA.KERNEL32(?,00000000,00000002,?,?,?,?,?,NSM.LIC,00000009), ref: 11028311
                                                                                                          • GetModuleHandleA.KERNEL32(00000000,00000000,?,?,?,?,?,NSM.LIC,00000009), ref: 11028325
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Handle$CloseModulewsprintf$CodeExitFileLibraryLoadNameObjectProcessSingleWait_strrchr
                                                                                                          • String ID: "$Locales\%d\$NSM.LIC$SetClientResLang called, gPlatform %x$Setting resource langid=%d$\GetUserLang.exe"$pcicl32_res.dll
                                                                                                          • API String ID: 512045693-419896573
                                                                                                          • Opcode ID: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                                          • Instruction ID: 7a246749baaa4a6e23861a3fd22e5cd13303056935123195fcb9bb693944541c
                                                                                                          • Opcode Fuzzy Hash: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                                          • Instruction Fuzzy Hash: B841D678E04229ABD714CF65CCD5FEAB7B9EB44709F0081A5F95897280DA71AE44CBA0
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(PCIINV.DLL,C213C15D,029980C8,029980B8,?,00000000,1118276C,000000FF,?,11031942,029980C8,00000000,?,?,?), ref: 11085E45
                                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                            • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetInventory), ref: 11085E6B
                                                                                                          • GetProcAddress.KERNEL32(00000000,Cancel), ref: 11085E7F
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetInventoryEx), ref: 11085E93
                                                                                                          • wsprintfA.USER32 ref: 11085F1B
                                                                                                          • wsprintfA.USER32 ref: 11085F32
                                                                                                          • wsprintfA.USER32 ref: 11085F49
                                                                                                          • CloseHandle.KERNEL32(00000000,11085C70,00000001,00000000), ref: 1108609A
                                                                                                            • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,74DEF550,?,?,110860C0,?,11031942,029980C8,00000000,?,?,?), ref: 11085A98
                                                                                                            • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,74DEF550,?,?,110860C0,?,11031942,029980C8,00000000,?,?,?), ref: 11085AAB
                                                                                                            • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,74DEF550,?,?,110860C0,?,11031942,029980C8,00000000,?,?,?), ref: 11085ABE
                                                                                                            • Part of subcall function 11085A80: FreeLibrary.KERNEL32(00000000,74DEF550,?,?,110860C0,?,11031942,029980C8,00000000,?,?,?), ref: 11085AD1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandlewsprintf$AddressProc$Library$CreateEventFreeLoad_malloc_memset
                                                                                                          • String ID: %s_HF.%s$%s_HW.%s$%s_SW.%s$Cancel$GetInventory$GetInventoryEx$PCIINV.DLL
                                                                                                          • API String ID: 4263811268-2492245516
                                                                                                          • Opcode ID: f5aef0daa14bc6ea66726438fc532167d4c8a127bd90decb683372eff0d319c6
                                                                                                          • Instruction ID: c264ff3baa83c9e34b1ea5f373b83d9ca187d225ad452563e08076ac2ec7b834
                                                                                                          • Opcode Fuzzy Hash: f5aef0daa14bc6ea66726438fc532167d4c8a127bd90decb683372eff0d319c6
                                                                                                          • Instruction Fuzzy Hash: 40718175E0874AABEB14CF75CC46BDBFBE4AB48304F10452AE956D7280EB71A500CB95
                                                                                                          APIs
                                                                                                          • OpenMutexA.KERNEL32(001F0001,00000000,PCIMutex), ref: 110305F3
                                                                                                          • CreateMutexA.KERNEL32(00000000,00000000,PCIMutex), ref: 1103060A
                                                                                                          • GetProcAddress.KERNEL32(?,SetProcessDPIAware), ref: 110306AC
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 110306C2
                                                                                                          • WaitForSingleObject.KERNEL32(?,000001F4), ref: 110306FC
                                                                                                          • CloseHandle.KERNEL32(?), ref: 11030709
                                                                                                          • FreeLibrary.KERNEL32(?), ref: 11030714
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 1103071B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandleMutex$AddressCreateErrorFreeLastLibraryObjectOpenProcSingleWait
                                                                                                          • String ID: /247$PCIMutex$SOFTWARE\Policies\NetSupport\Client\standard$SetProcessDPIAware$_debug\trace$_debug\tracefile$istaUI
                                                                                                          • API String ID: 2061479752-1320826866
                                                                                                          • Opcode ID: 344344da4f24c17c6c11c64113ed1526ed618b4690303f5ba055bceda43c688d
                                                                                                          • Instruction ID: 4511418fabb8e143c6e2e60e2068ec6a59f08b67eb8208c825473cc9362a61df
                                                                                                          • Opcode Fuzzy Hash: 344344da4f24c17c6c11c64113ed1526ed618b4690303f5ba055bceda43c688d
                                                                                                          • Instruction Fuzzy Hash: 72613774E1635AAFEB10DFB09C44B9EB7B4AF8470DF1000A9D919A71C5EF70AA44CB51
                                                                                                          APIs
                                                                                                            • Part of subcall function 1110F340: SetEvent.KERNEL32(00000000,?,1102C44F), ref: 1110F364
                                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C455
                                                                                                          • GetTickCount.KERNEL32 ref: 1102C47A
                                                                                                            • Part of subcall function 110D0710: __strdup.LIBCMT ref: 110D072A
                                                                                                          • GetTickCount.KERNEL32 ref: 1102C574
                                                                                                            • Part of subcall function 110D1370: wvsprintfA.USER32(?,?,1102C511), ref: 110D139B
                                                                                                            • Part of subcall function 110D07C0: _free.LIBCMT ref: 110D07ED
                                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C66C
                                                                                                          • CloseHandle.KERNEL32(?), ref: 1102C688
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CountObjectSingleTickWait$CloseEventHandle__strdup_freewvsprintf
                                                                                                          • String ID: ?IP=%s$GeoIP$GetLatLong=%s, took %d ms$IsA()$LatLong$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$http://geo.netsupportsoftware.com/location/loca.asp
                                                                                                          • API String ID: 596640303-1725438197
                                                                                                          • Opcode ID: 609e97f705776535a990b82a8e5f18e172a35da44f01400c4fa73658ea828b55
                                                                                                          • Instruction ID: 59613557395ae23f7967247d4baf4cae7550bfc3229e85cd4bc92fe2e2f2b4a8
                                                                                                          • Opcode Fuzzy Hash: 609e97f705776535a990b82a8e5f18e172a35da44f01400c4fa73658ea828b55
                                                                                                          • Instruction Fuzzy Hash: 6B818275E0020AABDF04DBE8CD94FEEF7B5AF59708F504258E82567284DB34BA05CB61
                                                                                                          APIs
                                                                                                          • RegOpenKeyExA.KERNEL32(80000002,Software\Policies\NetSupport\Client,00000000,00020019,?,00000000,?,?), ref: 1106175A
                                                                                                            • Part of subcall function 11061140: RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 1106117C
                                                                                                            • Part of subcall function 11061140: RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 110611D4
                                                                                                          • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 110617AB
                                                                                                          • RegEnumKeyExA.ADVAPI32(?,00000001,?,00000100,00000000,00000000,00000000,00000000), ref: 11061865
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 11061881
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Enum$Open$CloseValue
                                                                                                          • String ID: %s\%s\%s\$Client$Client$Client.%04d.%s$DisableUserPolicies$Software\Policies\NetSupport$Software\Policies\NetSupport\Client$Software\Policies\NetSupport\Client\Standard$Standard
                                                                                                          • API String ID: 2823542970-1528906934
                                                                                                          • Opcode ID: 4cf0c36994a383612a719e249f3f276c0f36ade9332230c7c569e8670290d878
                                                                                                          • Instruction ID: 3a074a016260bf88f68c0586b8c591cabbb012c9b5ad66670ab8b6bf40d046b4
                                                                                                          • Opcode Fuzzy Hash: 4cf0c36994a383612a719e249f3f276c0f36ade9332230c7c569e8670290d878
                                                                                                          • Instruction Fuzzy Hash: 5F416179E4022DABD724CB55CC81FEAB7BCEB94748F1001D9EA48A6140D6B06E84CFA1
                                                                                                          APIs
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                          • GetTickCount.KERNEL32 ref: 11137692
                                                                                                            • Part of subcall function 11096970: CoInitialize.OLE32(00000000), ref: 11096984
                                                                                                            • Part of subcall function 11096970: CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,1113769B), ref: 1109699E
                                                                                                            • Part of subcall function 11096970: CoCreateInstance.OLE32(?,00000000,00000001,111C08AC,?,?,?,?,?,?,?,1113769B), ref: 110969BB
                                                                                                            • Part of subcall function 11096970: CoUninitialize.OLE32(?,?,?,?,?,?,1113769B), ref: 110969D9
                                                                                                          • GetTickCount.KERNEL32 ref: 111376A1
                                                                                                          • _memset.LIBCMT ref: 111376E3
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 111376F9
                                                                                                          • _strrchr.LIBCMT ref: 11137708
                                                                                                          • _free.LIBCMT ref: 1113775A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CountTick$CreateFileFromInitializeInstanceModuleNameProgUninitialize__wcstoi64_free_memset_strrchr
                                                                                                          • String ID: *AutoICFConfig$Client$ICFConfig$ICFConfig2 returned 0x%x$IsICFPresent() took %d ms$IsICFPresent...$No ICF present
                                                                                                          • API String ID: 711243594-1270230032
                                                                                                          • Opcode ID: 4f0f92e27c35dbd641ed9010d5cad7dccc431a8d4141c0f1938ec124a93e63f3
                                                                                                          • Instruction ID: 94b21c48fabd249aebac1ca0d473d12a11480cc4bb4ab1ee9f0f9b3b40903c19
                                                                                                          • Opcode Fuzzy Hash: 4f0f92e27c35dbd641ed9010d5cad7dccc431a8d4141c0f1938ec124a93e63f3
                                                                                                          • Instruction Fuzzy Hash: 9941AE7AE0022E97C710DF756C89BEFF7699B5471DF040079E90493140EAB1AD44CBE1
                                                                                                          APIs
                                                                                                            • Part of subcall function 11145440: _memset.LIBCMT ref: 11145485
                                                                                                            • Part of subcall function 11145440: GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                                            • Part of subcall function 11145440: LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                                            • Part of subcall function 11145440: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                                            • Part of subcall function 11145440: FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                                            • Part of subcall function 11145440: GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                                          • AdjustWindowRectEx.USER32(111417B8,00CE0000,00000001,00000001), ref: 11133EC7
                                                                                                          • LoadMenuA.USER32(00000000,000003EC), ref: 11133ED8
                                                                                                          • GetSystemMetrics.USER32(00000021), ref: 11133EE9
                                                                                                          • GetSystemMetrics.USER32(0000000F), ref: 11133EF1
                                                                                                          • GetSystemMetrics.USER32(00000004), ref: 11133EF7
                                                                                                          • GetDC.USER32(00000000), ref: 11133F03
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 11133F0E
                                                                                                          • ReleaseDC.USER32(00000000,00000000), ref: 11133F1A
                                                                                                          • CreateWindowExA.USER32(00000001,NSMWClass,00D9D1B8,00CE0000,80000000,80000000,111417B8,?,00000000,?,11000000,00000000), ref: 11133F6F
                                                                                                          • GetLastError.KERNEL32(?,?,?,?,?,110F7D09,00000001,111417B8,_debug), ref: 11133F77
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: System$Metrics$LibraryLoadWindow$AddressAdjustCapsCreateDefaultDeviceErrorFreeLangLastMenuProcRectReleaseVersion_memset
                                                                                                          • String ID: CreateMainWnd, hwnd=%x, e=%d$NSMWClass$mainwnd ht1=%d, ht2=%d, yppi=%d
                                                                                                          • API String ID: 1594747848-1114959992
                                                                                                          • Opcode ID: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                                          • Instruction ID: 5297cf036ba1cbd73fc44df567c8a611b910eb11675e7325f2afb4d5e36916b9
                                                                                                          • Opcode Fuzzy Hash: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                                          • Instruction Fuzzy Hash: C4316275E10219ABDB149FF58C85FAFFBB8EB48709F100529FA25B7284D67469008BA4
                                                                                                          APIs
                                                                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,00000000,19141918,1102DD98,00000000,C213C15D,?,00000000,00000000), ref: 1102CE44
                                                                                                          • OpenServiceA.ADVAPI32(00000000,ProtectedStorage,00000004), ref: 1102CE5A
                                                                                                          • QueryServiceStatus.ADVAPI32(00000000,?), ref: 1102CE6E
                                                                                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CE75
                                                                                                          • Sleep.KERNEL32(00000032), ref: 1102CE86
                                                                                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CE96
                                                                                                          • Sleep.KERNEL32(000003E8), ref: 1102CEE2
                                                                                                          • CloseHandle.KERNEL32(?), ref: 1102CF0F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Service$CloseHandle$OpenSleep$ManagerQueryStatus
                                                                                                          • String ID: >$NSA.LIC$NSM.LIC$ProtectedStorage
                                                                                                          • API String ID: 83693535-2077998243
                                                                                                          • Opcode ID: 8822f1513d5873ee506041ece4c3caa14d779e6eafa0361d2a69553500dbb03f
                                                                                                          • Instruction ID: 880dc79335238c7f7dd8ff78cda89552a6d5dde84d0873ba54ec41c4173cff75
                                                                                                          • Opcode Fuzzy Hash: 8822f1513d5873ee506041ece4c3caa14d779e6eafa0361d2a69553500dbb03f
                                                                                                          • Instruction Fuzzy Hash: 27B19475E012259FDB25DFA4CD80BEDB7B5BB48708F5041E9E919AB381DB70AA80CF50
                                                                                                          APIs
                                                                                                          • wsprintfA.USER32 ref: 11132C60
                                                                                                          • GetTickCount.KERNEL32 ref: 11132C91
                                                                                                          • SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11132CA4
                                                                                                          • GetTickCount.KERNEL32 ref: 11132CAC
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CountTick$FolderPathwsprintf
                                                                                                          • String ID: %s%s$CommonPath$HasStudentComponents=%d$Software\NSL$Warning. SHGetFolderPath took %d ms$runplugin.exe$schplayer.exe
                                                                                                          • API String ID: 1170620360-4157686185
                                                                                                          • Opcode ID: 8db97a347cf6facb783ebfea5336d263050bbd002d3c3d3218a55bc412e7ce30
                                                                                                          • Instruction ID: 1138b9c1199a8041912b1953dd267279d987a2a799c8ea79b9a25deb6d60bab0
                                                                                                          • Opcode Fuzzy Hash: 8db97a347cf6facb783ebfea5336d263050bbd002d3c3d3218a55bc412e7ce30
                                                                                                          • Instruction Fuzzy Hash: F33157BAE4022E67E700AFB0AC84FEDF36C9B9471EF1000A9E915A7145EA72B545C761
                                                                                                          APIs
                                                                                                          • GetVersionExA.KERNEL32(111F0EF0,75BF8400), ref: 111450D0
                                                                                                          • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                                          • _memset.LIBCMT ref: 1114512D
                                                                                                            • Part of subcall function 11143000: RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,75BF8400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                                          • _strncpy.LIBCMT ref: 111451FA
                                                                                                            • Part of subcall function 11163A2D: __isdigit_l.LIBCMT ref: 11163A52
                                                                                                          • RegCloseKey.KERNEL32(00000000), ref: 11145296
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CloseOpenQueryValueVersion__isdigit_l_memset_strncpy
                                                                                                          • String ID: CSDVersion$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Service Pack
                                                                                                          • API String ID: 3299820421-2117887902
                                                                                                          • Opcode ID: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                                          • Instruction ID: 1fcbe558ef897eaa1b38a7330f4b62b9d1ba330f7a3c6d488077e096d0eda0f8
                                                                                                          • Opcode Fuzzy Hash: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                                          • Instruction Fuzzy Hash: 6D51D9B1E0022BEFEB51CF60CD41F9EF7B9AB04B08F104199F519A7941E7716A48CB91
                                                                                                          APIs
                                                                                                          • _strtok.LIBCMT ref: 11026C26
                                                                                                          • _strtok.LIBCMT ref: 11026C60
                                                                                                          • Sleep.KERNEL32(1102FC53,?,*max_sessions,0000000A,00000000,00000000,00000002), ref: 11026D54
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: _strtok$Sleep
                                                                                                          • String ID: *max_sessions$Client$Error. not all transports loaded (%d/%d)$LoadTransports(%d)$Protocols$Retrying...$TCPIP$UseNCS
                                                                                                          • API String ID: 2009458258-3774545468
                                                                                                          • Opcode ID: 078eda5116f2816b6dc994d4a65e88964a73d5216bb2e8940b960da01685ed19
                                                                                                          • Instruction ID: 546c7fd96e7e5c201e62e0728b24f9c1e86d1f0ab762c79c207aecf2c2ec1ca9
                                                                                                          • Opcode Fuzzy Hash: 078eda5116f2816b6dc994d4a65e88964a73d5216bb2e8940b960da01685ed19
                                                                                                          • Instruction Fuzzy Hash: A951F375E0525E9BDF11EFA9CC80BBEFBB5EB84308FA44069DC1167284E631A846C742
                                                                                                          APIs
                                                                                                            • Part of subcall function 11089280: UnhookWindowsHookEx.USER32(?), ref: 110892A3
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 11102C6C
                                                                                                          • GetThreadDesktop.USER32(00000000), ref: 11102C73
                                                                                                          • OpenDesktopA.USER32(?,00000000,00000000,02000000), ref: 11102C83
                                                                                                          • SetThreadDesktop.USER32(00000000), ref: 11102C90
                                                                                                          • CloseDesktop.USER32(00000000), ref: 11102CA9
                                                                                                          • GetLastError.KERNEL32 ref: 11102CB1
                                                                                                          • CloseDesktop.USER32(00000000), ref: 11102CC7
                                                                                                          • GetLastError.KERNEL32 ref: 11102CCF
                                                                                                          Strings
                                                                                                          • SetThreadDesktop(%s) ok, xrefs: 11102C9B
                                                                                                          • OpenDesktop(%s) failed, e=%d, xrefs: 11102CD7
                                                                                                          • SetThreadDesktop(%s) failed, e=%d, xrefs: 11102CB9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Desktop$Thread$CloseErrorLast$CurrentHookOpenUnhookWindows
                                                                                                          • String ID: OpenDesktop(%s) failed, e=%d$SetThreadDesktop(%s) failed, e=%d$SetThreadDesktop(%s) ok
                                                                                                          • API String ID: 2036220054-60805735
                                                                                                          • Opcode ID: 6b535c7b41aace8396d526edc80c79a44f907d57885ab2fb7f21c89248cbb4d8
                                                                                                          • Instruction ID: e6b285a79aa3308c0e4e86645e8e2c70f1a73097c1882eeb774c19519f5c9288
                                                                                                          • Opcode Fuzzy Hash: 6b535c7b41aace8396d526edc80c79a44f907d57885ab2fb7f21c89248cbb4d8
                                                                                                          • Instruction Fuzzy Hash: 5D11C679A042167BE7086BB15C89FBFFA2DAFC571CF051438F91786545EE24B40483B6
                                                                                                          APIs
                                                                                                          • GlobalAddAtomA.KERNEL32(NSMWndClass), ref: 1115E3A8
                                                                                                          • GetLastError.KERNEL32 ref: 1115E3B5
                                                                                                          • wsprintfA.USER32 ref: 1115E3C8
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                            • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                                          • GlobalAddAtomA.KERNEL32(NSMReflect), ref: 1115E40C
                                                                                                          • GlobalAddAtomA.KERNEL32(NSMDropTarget), ref: 1115E419
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AtomGlobal$ErrorExitLastProcesswsprintf$Message_strrchr
                                                                                                          • String ID: ..\ctl32\wndclass.cpp$GlobalAddAtom failed, e=%d$NSMDropTarget$NSMReflect$NSMWndClass$m_aProp
                                                                                                          • API String ID: 1734919802-1728070458
                                                                                                          • Opcode ID: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                                          • Instruction ID: 2151ae3f148807adf1b9b51829e7bc1db46dc9b6ec15270657221fcdabbc1952
                                                                                                          • Opcode Fuzzy Hash: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                                          • Instruction Fuzzy Hash: 1B110479A01319ABC720EFE69C84A96F7B4FF2231CB40822EE46543240DA706944CB51
                                                                                                          APIs
                                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                          • std::exception::exception.LIBCMT ref: 1111013A
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 1111014F
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                                          • InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                                          • InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                                          • EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                                          • LeaveCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111024F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$Initialize$CreateCurrentEnterEventException@8LeaveThreadThrow_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                          • String ID: ..\ctl32\Refcount.cpp$QueueThreadEvent
                                                                                                          • API String ID: 1976012330-1024648535
                                                                                                          • Opcode ID: db19f8e7b9fff8ba68d37a9baa43a0e7c0721c068b2f24d3f0a3aafd2fe6ed90
                                                                                                          • Instruction ID: 7e481d80fa827a07ee7257280804c30d2ae959ce5d98406b053f8524d928f6e4
                                                                                                          • Opcode Fuzzy Hash: db19f8e7b9fff8ba68d37a9baa43a0e7c0721c068b2f24d3f0a3aafd2fe6ed90
                                                                                                          • Instruction Fuzzy Hash: 6C41C2B5E00216AFDB11CFB98C84BAEFBF5FB48708F00453AE815DB244E675A944CB91
                                                                                                          APIs
                                                                                                          • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,1117F505,00000000,00000000,C213C15D,00000000,?,00000000), ref: 11060874
                                                                                                          • _malloc.LIBCMT ref: 110608BB
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          • RegEnumValueA.ADVAPI32(?,?,?,00000000,00000000,00000000,000000FF,?,C213C15D,00000000), ref: 110608FB
                                                                                                          • RegEnumValueA.ADVAPI32(?,00000000,?,00000100,00000000,?,000000FF,?), ref: 11060962
                                                                                                          • _free.LIBCMT ref: 11060974
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: EnumValue$ErrorExitInfoLastMessageProcessQuery_free_mallocwsprintf
                                                                                                          • String ID: ..\ctl32\Config.cpp$err == 0$maxname < _tsizeof (m_szSectionAndKey)$strlen (k.m_k) < _tsizeof (m_szSectionAndKey)
                                                                                                          • API String ID: 999355418-161875503
                                                                                                          • Opcode ID: 4c6701bf68cd5b1f6cb6252f17f9b7c7c7cabb80937af8afb4b53d9147c09ea9
                                                                                                          • Instruction ID: c47c75eefe38bee888b154a00c4449ad07b8701d7df13cace45a3bfee881b040
                                                                                                          • Opcode Fuzzy Hash: 4c6701bf68cd5b1f6cb6252f17f9b7c7c7cabb80937af8afb4b53d9147c09ea9
                                                                                                          • Instruction Fuzzy Hash: E3A1B075A007469FE721CF64C880BABFBF8AF45308F044A5CE99697684E770F508CBA1
                                                                                                          APIs
                                                                                                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,C213C15D,00000000,?), ref: 1115BA67
                                                                                                          • CoCreateInstance.OLE32(111C4FEC,00000000,00000017,111C4F1C,?), ref: 1115BA87
                                                                                                          • wsprintfW.USER32 ref: 1115BAA7
                                                                                                          • SysAllocString.OLEAUT32(?), ref: 1115BAB3
                                                                                                          • wsprintfW.USER32 ref: 1115BB67
                                                                                                          • SysFreeString.OLEAUT32(?), ref: 1115BC08
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Stringwsprintf$AllocCreateFreeInitializeInstanceSecurity
                                                                                                          • String ID: SELECT * FROM %s$WQL$root\CIMV2
                                                                                                          • API String ID: 3050498177-823534439
                                                                                                          • Opcode ID: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                                          • Instruction ID: 667e066b75244b2782fe63ff2368f72f8a2c2363a2cb4bcdb988270c73b3585f
                                                                                                          • Opcode Fuzzy Hash: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                                          • Instruction Fuzzy Hash: 7351B071B00219ABC764CF69CC84F9AF7B9FB8A714F1042A8E429E7240DA70AE40CF55
                                                                                                          APIs
                                                                                                            • Part of subcall function 11145330: RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                                            • Part of subcall function 11145330: RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                                          • _memset.LIBCMT ref: 11145485
                                                                                                          • GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                                          • LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                                          • GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Library$AddressCloseDefaultFreeLangLoadOpenProcSystemVersion_memset
                                                                                                          • String ID: GetUserDefaultUILanguage$kernel32.dll
                                                                                                          • API String ID: 4251163631-545709139
                                                                                                          • Opcode ID: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                                          • Instruction ID: 76ed8f4553af2ae4cc76032582d3c5cf4b75be54885724a55a46303ac3459834
                                                                                                          • Opcode Fuzzy Hash: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                                          • Instruction Fuzzy Hash: 07313971E002299BD761DF74D984BE9F7B6EB08729F540164E42DC7A80D7344984CF91
                                                                                                          APIs
                                                                                                          • wsprintfA.USER32 ref: 110150CA
                                                                                                          • _memset.LIBCMT ref: 1101510E
                                                                                                          • RegQueryValueExA.KERNEL32(?,PackedCatalogItem,00000000,?,?,?,?,?,00020019), ref: 11015148
                                                                                                          Strings
                                                                                                          • PackedCatalogItem, xrefs: 11015132
                                                                                                          • NSLSP, xrefs: 11015158
                                                                                                          • %012d, xrefs: 110150C4
                                                                                                          • SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries, xrefs: 1101504B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: QueryValue_memsetwsprintf
                                                                                                          • String ID: %012d$NSLSP$PackedCatalogItem$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries
                                                                                                          • API String ID: 1333399081-1346142259
                                                                                                          • Opcode ID: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                                          • Instruction ID: d38f3a4d66d5a90606c53f5b1b84405609ec5bb3b13ff7cea0d7775b25b40b12
                                                                                                          • Opcode Fuzzy Hash: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                                          • Instruction Fuzzy Hash: C6419D71D02269AFEB11DB64CC90BDEF7B8EB44314F0445E9E819A7281EB35AB48CF50
                                                                                                          APIs
                                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 1100FDED
                                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 1100FE10
                                                                                                          • std::bad_exception::bad_exception.LIBCMT ref: 1100FE94
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 1100FEA2
                                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 1100FEB5
                                                                                                          • std::locale::facet::_Facet_Register.LIBCPMT ref: 1100FECF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                                                                                                          • String ID: bad cast
                                                                                                          • API String ID: 2427920155-3145022300
                                                                                                          • Opcode ID: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                                          • Instruction ID: 563b417412927bd42dfe2d2268ce551a617b01fe8fe711e168dc892134580a96
                                                                                                          • Opcode Fuzzy Hash: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                                          • Instruction Fuzzy Hash: 5731E975D002669FD711DF94C890BAEF7B8EB04B68F10426DD921A7291DB717D40CB92
                                                                                                          APIs
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,11194AB8), ref: 11144C3D
                                                                                                          • SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1110F4CB), ref: 11144C7E
                                                                                                          • SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 11144CDB
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: FolderPath$ErrorExitFileLastMessageModuleNameProcesswsprintf
                                                                                                          • String ID: ..\ctl32\util.cpp$FALSE || !"wrong nsmdir"$nsmdir < GP_MAX
                                                                                                          • API String ID: 3494822531-1878648853
                                                                                                          • Opcode ID: 942c5252def4268129969c39a1215845e921a51e2954e507dd92eff7077da9be
                                                                                                          • Instruction ID: dd955378f98185685044f21f066d1e50e049b7277ab8e5714ac6db0ba135c9a8
                                                                                                          • Opcode Fuzzy Hash: 942c5252def4268129969c39a1215845e921a51e2954e507dd92eff7077da9be
                                                                                                          • Instruction Fuzzy Hash: AB518835D4022E5BD711CF24DC50BDEF7A4AF15B08F2401A4D8997BA80EBB27B84CBA5
                                                                                                          APIs
                                                                                                            • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                          • LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11189A56,000000FF), ref: 11107363
                                                                                                          • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111073B2
                                                                                                          • std::exception::exception.LIBCMT ref: 11107414
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 11107429
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad$CreateEventException@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                          • String ID: Advapi32.dll$Wtsapi32.dll
                                                                                                          • API String ID: 2851125068-2390547818
                                                                                                          • Opcode ID: aaba10e307cec69a1f7ff7a57bac704082b679f648b946fc7c8140d35e3eefa9
                                                                                                          • Instruction ID: 20da51148d2406ef940ba90f631bbe284ff6dbb95dc7cb8c25b5cdc78ae8e1aa
                                                                                                          • Opcode Fuzzy Hash: aaba10e307cec69a1f7ff7a57bac704082b679f648b946fc7c8140d35e3eefa9
                                                                                                          • Instruction Fuzzy Hash: 2A4115B4D09B449FC761CF6A8940BDAFBE8EFA9604F00490EE5AE93210D7797500CF56
                                                                                                          APIs
                                                                                                          • WaitForSingleObject.KERNEL32(000002F0,000000FF), ref: 1101733C
                                                                                                          • CoInitialize.OLE32(00000000), ref: 11017345
                                                                                                          • _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                                          • CoUninitialize.COMBASE ref: 110173D0
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                                          • String ID: PCSystemTypeEx$Win32_ComputerSystem
                                                                                                          • API String ID: 2407233060-578995875
                                                                                                          • Opcode ID: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                                          • Instruction ID: df925c951649f52390f194a40c23bf9fa59b5f59fb7a44760539d7ccd5920114
                                                                                                          • Opcode Fuzzy Hash: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                                          • Instruction Fuzzy Hash: 7F2137B5E041259BDB11DFA0CC46BBAB6E8AF40308F0040B9EC69DB184FA79E940D7A1
                                                                                                          APIs
                                                                                                          • WaitForSingleObject.KERNEL32(000002F0,000000FF), ref: 11017252
                                                                                                          • CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                                          • _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                                          • CoUninitialize.COMBASE ref: 110172E0
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                                          • String ID: ChassisTypes$Win32_SystemEnclosure
                                                                                                          • API String ID: 2407233060-2037925671
                                                                                                          • Opcode ID: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                                          • Instruction ID: c2f3c346b695d23426c96ecc328f7bdb1aeadc280033f44fb53199f8ba8604cb
                                                                                                          • Opcode Fuzzy Hash: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                                          • Instruction Fuzzy Hash: 19210575E016299BD712DFE0CC45BEEB7E89F80718F0001A8FC29DB184EA7AE945C761
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          • DesktopTimerProc - Further ICF config checking will not be performed, xrefs: 1113879C
                                                                                                          • DoICFConfig() OK, xrefs: 11138786
                                                                                                          • Client, xrefs: 11138705
                                                                                                          • AutoICFConfig, xrefs: 11138700
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CountTick
                                                                                                          • String ID: AutoICFConfig$Client$DesktopTimerProc - Further ICF config checking will not be performed$DoICFConfig() OK
                                                                                                          • API String ID: 536389180-1512301160
                                                                                                          • Opcode ID: a952649d10152439879ed58b5e1132f0d59133535c4a4a3642475d19345c2f1e
                                                                                                          • Instruction ID: a0019f70d98f4d819e239f855ef0bc8db2e19db1671bc02c3e0d3b7677daedde
                                                                                                          • Opcode Fuzzy Hash: a952649d10152439879ed58b5e1132f0d59133535c4a4a3642475d19345c2f1e
                                                                                                          • Instruction Fuzzy Hash: E4210578A247AB4AFB039B759ED4755FB83578073EF450278DE10862CCDB74A458CB42
                                                                                                          APIs
                                                                                                          • CoInitialize.OLE32(00000000), ref: 11096984
                                                                                                          • CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,1113769B), ref: 1109699E
                                                                                                          • CoCreateInstance.OLE32(?,00000000,00000001,111C08AC,?,?,?,?,?,?,?,1113769B), ref: 110969BB
                                                                                                          • CoUninitialize.OLE32(?,?,?,?,?,?,1113769B), ref: 110969D9
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CreateFromInitializeInstanceProgUninitialize
                                                                                                          • String ID: HNetCfg.FwMgr$ICF Present:
                                                                                                          • API String ID: 3222248624-258972079
                                                                                                          • Opcode ID: f34227f50c1ea86a65abb9f5b461b7bcbc9d9ad9ed009c44ac4fae2586091261
                                                                                                          • Instruction ID: ffe5b7852bae71a5603cb4f529131e3535c43cf5cc9a129c5e7f13935f1cb029
                                                                                                          • Opcode Fuzzy Hash: f34227f50c1ea86a65abb9f5b461b7bcbc9d9ad9ed009c44ac4fae2586091261
                                                                                                          • Instruction Fuzzy Hash: 9C11AC74E0012DABC700EAE5DC95AEFBB68AF45709F100029F50AEB144EA21EA40C7E2
                                                                                                          APIs
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetProcessImageFileNameA), ref: 11025D16
                                                                                                          • K32GetProcessImageFileNameA.KERNEL32(?,?,?,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D32
                                                                                                          • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 11025D46
                                                                                                          • SetLastError.KERNEL32(00000078,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D69
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$ErrorFileImageLastNameProcess
                                                                                                          • String ID: GetModuleFileNameExA$GetProcessImageFileNameA
                                                                                                          • API String ID: 4186647306-532032230
                                                                                                          • Opcode ID: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                                          • Instruction ID: 74662284ed99b9a54ad109221a671fe8fcdc3fa540ca7c31caa090441a4958f5
                                                                                                          • Opcode Fuzzy Hash: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                                          • Instruction Fuzzy Hash: 98016D72601718ABE330DEA5EC48F87B7E8EB88765F10052AF95697200D631E8018BA4
                                                                                                          APIs
                                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EEC3F0,00000000,?,11110245,1110FDE0,00000001,00000000), ref: 1110F2C7
                                                                                                          • CreateThread.KERNEL32(00000000,11110245,00000001,00000000,00000000,0000000C), ref: 1110F2EA
                                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F317
                                                                                                          • CloseHandle.KERNEL32(?,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F321
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                          • String ID: ..\ctl32\Refcount.cpp$hThread
                                                                                                          • API String ID: 3360349984-1136101629
                                                                                                          • Opcode ID: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                                          • Instruction ID: 7cf91fcea6c2a3c5c2684f5d08a561b662f4dc7f01f0c277a0d6c7245401f800
                                                                                                          • Opcode Fuzzy Hash: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                                          • Instruction Fuzzy Hash: E7015E7A7443166FE3209EA9CC86F57FBA8DB44764F104128FA25962C4DA60F805CB64
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: wsprintf
                                                                                                          • String ID: %s%s%s.bin$035347$_HF$_HW$_SW
                                                                                                          • API String ID: 2111968516-59855059
                                                                                                          • Opcode ID: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                                          • Instruction ID: 34a826dfca0d5743c415d593f242b0f3cefc790b54bbadf5113738552eb06063
                                                                                                          • Opcode Fuzzy Hash: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                                          • Instruction Fuzzy Hash: 93E092A1D1870C6FF70085589C15F9EFAE87B4978EFC48051BEEDA7292E935D60082D6
                                                                                                          APIs
                                                                                                          • GlobalAddAtomA.KERNEL32(NSMDesktopWnd), ref: 11102B03
                                                                                                          • GetStockObject.GDI32(00000004), ref: 11102B5B
                                                                                                          • RegisterClassA.USER32(?), ref: 11102B6F
                                                                                                          • CreateWindowExA.USER32(00000000,NSMDesktopWnd,?,00000000,00000000,00000000,00000000,00000000,00130000,00000000,11000000,00000000), ref: 11102BAC
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AtomClassCreateGlobalObjectRegisterStockWindow
                                                                                                          • String ID: NSMDesktopWnd
                                                                                                          • API String ID: 2669163067-206650970
                                                                                                          • Opcode ID: e27069a72c11c1f4eb1c56e7938a9b61728f0754eae0ec1cd31abd721b9bda48
                                                                                                          • Instruction ID: 4c07b853b75387a4d851a66abc04609236edd6d81c14be1d28904dd9f6a0e6ac
                                                                                                          • Opcode Fuzzy Hash: e27069a72c11c1f4eb1c56e7938a9b61728f0754eae0ec1cd31abd721b9bda48
                                                                                                          • Instruction Fuzzy Hash: C231F4B0D15619AFDB44CFA9D980A9EFBF4FB08314F50962EE46AE3640E7346900CF94
                                                                                                          APIs
                                                                                                          • KillTimer.USER32(00000000,00000000,TermUI...), ref: 1113CC9A
                                                                                                          • KillTimer.USER32(00000000,00007F62,TermUI...), ref: 1113CCB3
                                                                                                          • FreeLibrary.KERNEL32(75B40000,?,TermUI...), ref: 1113CD2B
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,TermUI...), ref: 1113CD43
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: FreeKillLibraryTimer
                                                                                                          • String ID: TermUI
                                                                                                          • API String ID: 2006562601-4085834059
                                                                                                          • Opcode ID: 0b8b98d89ae2f905afc74c8ae1c01cea1ae783866c2b84ef9f483cfa62b8061f
                                                                                                          • Instruction ID: 1c615ec055e307fcecd6c2f5a0081f3099d40e524c959ad3afbad8c7da76a6da
                                                                                                          • Opcode Fuzzy Hash: 0b8b98d89ae2f905afc74c8ae1c01cea1ae783866c2b84ef9f483cfa62b8061f
                                                                                                          • Instruction Fuzzy Hash: 813182B46121329FE605DF9ACDE496EFB6ABBC4B1C750402BF4689720CE770A845CF91
                                                                                                          APIs
                                                                                                          • RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CloseOpen
                                                                                                          • String ID: ForceRTL$SOFTWARE\NetSupport Ltd\PCICTL$SOFTWARE\Productive Computer Insight\PCICTL
                                                                                                          • API String ID: 47109696-3245241687
                                                                                                          • Opcode ID: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                                          • Instruction ID: 3a61aca8bf2f26e8be4db12f87e0943ca7983303b4b50086f785ef97d0623835
                                                                                                          • Opcode Fuzzy Hash: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                                          • Instruction Fuzzy Hash: 56218875E0422A9BE760DB64CD80B9EF7B8EB44708F1042AAD85DF7540E771AD458BB0
                                                                                                          APIs
                                                                                                            • Part of subcall function 11111430: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                                            • Part of subcall function 11111430: __wsplitpath.LIBCMT ref: 11111475
                                                                                                            • Part of subcall function 11111430: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                                          • GetComputerNameA.KERNEL32(?,?), ref: 11111578
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ComputerDirectoryInformationNameSystemVolume__wsplitpath
                                                                                                          • String ID: $ACM$\Registry\Machine\SOFTWARE\Classes\N%x$\Registry\Machine\SOFTWARE\Classes\N%x.%s
                                                                                                          • API String ID: 806825551-1858614750
                                                                                                          • Opcode ID: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                                          • Instruction ID: bd5304e3d9974d7ab46afc427c644d654ac0d4b62daaa3d8a48381b774377c4d
                                                                                                          • Opcode Fuzzy Hash: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                                          • Instruction Fuzzy Hash: 4B214676A142491BD701CF309D80BBFFFBA9F8B249F080578D852DB145E626D914C391
                                                                                                          APIs
                                                                                                            • Part of subcall function 11143C20: GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                                            • Part of subcall function 11143C20: GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Pictures\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                                          • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 11144255
                                                                                                          • ResetEvent.KERNEL32(00000250), ref: 11144269
                                                                                                          • SetEvent.KERNEL32(00000250), ref: 1114427F
                                                                                                          • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 1114428E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: EventMultipleObjectsWait$CurrentFileModuleNameProcessReset
                                                                                                          • String ID: MiniDump
                                                                                                          • API String ID: 1494854734-2840755058
                                                                                                          • Opcode ID: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                                          • Instruction ID: 829689d5ebdc208bf7b78735a50f5ce9a06f611da5f38dced1c13c8e9b13f18e
                                                                                                          • Opcode Fuzzy Hash: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                                          • Instruction Fuzzy Hash: 4F113875E5422677E300DFF99C81F9AF768AB44B28F200230EA24D75C4EB71A504C7B1
                                                                                                          APIs
                                                                                                          • LoadStringA.USER32(00000000,0000194E,?,00000400), ref: 11146DCF
                                                                                                          • wsprintfA.USER32 ref: 11146E06
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: wsprintf$ErrorExitLastLoadMessageProcessString
                                                                                                          • String ID: #%d$..\ctl32\util.cpp$i < _tsizeof (buf)
                                                                                                          • API String ID: 1985783259-2296142801
                                                                                                          • Opcode ID: 74c0a5bdbb0b764e858cc1f7afd52fdb49af151022e5f3ed446820e6430d86d5
                                                                                                          • Instruction ID: b1a6c5171231f01418375ac6f2de6c12625a8d09d3611db16d7d0d369645f93a
                                                                                                          • Opcode Fuzzy Hash: 74c0a5bdbb0b764e858cc1f7afd52fdb49af151022e5f3ed446820e6430d86d5
                                                                                                          • Instruction Fuzzy Hash: FA11A5FAE00128ABC720DB65ED81FAAF77C9B4461DF000565EB19B6141EA35AA05C7A8
                                                                                                          APIs
                                                                                                          • _malloc.LIBCMT ref: 1110F439
                                                                                                            • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                                            • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                                            • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                                          • wsprintfA.USER32 ref: 1110F454
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          • _memset.LIBCMT ref: 1110F477
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: wsprintf$AllocateErrorExitHeapLastMessageProcess_malloc_memset
                                                                                                          • String ID: ..\ctl32\Refcount.cpp$Can't alloc %u bytes
                                                                                                          • API String ID: 3234921582-2664294811
                                                                                                          • Opcode ID: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                                          • Instruction ID: e8e28b36a5a63397ef775e95fa380a20e388029766e4784519104262db02a7f0
                                                                                                          • Opcode Fuzzy Hash: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                                          • Instruction Fuzzy Hash: 1CF0F6B5E0012863C720AFA5AC06FEFF37C9F91658F440169EE04A7241EA71BA11C7E9
                                                                                                          APIs
                                                                                                            • Part of subcall function 111450A0: GetVersionExA.KERNEL32(111F0EF0,75BF8400), ref: 111450D0
                                                                                                            • Part of subcall function 111450A0: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                                            • Part of subcall function 111450A0: _memset.LIBCMT ref: 1114512D
                                                                                                            • Part of subcall function 111450A0: _strncpy.LIBCMT ref: 111451FA
                                                                                                          • LoadLibraryA.KERNEL32(shcore.dll,00000000,?,11030690,00000002), ref: 11145AFF
                                                                                                          • GetProcAddress.KERNEL32(00000000,SetProcessDpiAwareness), ref: 11145B11
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,11030690,00000002), ref: 11145B24
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Library$AddressFreeLoadOpenProcVersion_memset_strncpy
                                                                                                          • String ID: SetProcessDpiAwareness$shcore.dll
                                                                                                          • API String ID: 1108920153-1959555903
                                                                                                          • Opcode ID: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                                          • Instruction ID: 699a5c6b52ff0bb6954823876d42b720b76b3255f49526743c1f98bd9e848574
                                                                                                          • Opcode Fuzzy Hash: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                                          • Instruction Fuzzy Hash: 67F0A03A70022877E21416BAAC08F9ABB5A8BC8A75F140230F928D69C0EB51C90086B5
                                                                                                          APIs
                                                                                                          • wsprintfA.USER32 ref: 11031926
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: wsprintf$ErrorExitLastMessageProcess
                                                                                                          • String ID: %s%s.bin$035347$clientinv.cpp$m_pDoInv == NULL
                                                                                                          • API String ID: 4180936305-139322117
                                                                                                          • Opcode ID: 84e0b1850b63e3f6f9fe70c2d5af7440bbdd732114a0c990adb36dbba2c833c3
                                                                                                          • Instruction ID: 64da4217f7417b153db366359b1c36bd372b32cb55e7c28d29c46c6ec3487e21
                                                                                                          • Opcode Fuzzy Hash: 84e0b1850b63e3f6f9fe70c2d5af7440bbdd732114a0c990adb36dbba2c833c3
                                                                                                          • Instruction Fuzzy Hash: 5421A1B9E04709AFD710CF65DC81BAAB7F4FB88718F40453EE86597680EB35A9008B65
                                                                                                          APIs
                                                                                                          • GetFileAttributesA.KERNEL32(11144D48,00000000,?,11144D48,00000000), ref: 1114468C
                                                                                                          • __strdup.LIBCMT ref: 111446A7
                                                                                                            • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                                            • Part of subcall function 11144670: _free.LIBCMT ref: 111446CE
                                                                                                          • _free.LIBCMT ref: 111446DC
                                                                                                            • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                                            • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                                          • CreateDirectoryA.KERNEL32(11144D48,00000000,?,?,?,11144D48,00000000), ref: 111446E7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: _free$AttributesCreateDirectoryErrorFileFreeHeapLast__strdup_strrchr
                                                                                                          • String ID:
                                                                                                          • API String ID: 398584587-0
                                                                                                          • Opcode ID: 1d6e66add7aa45a35b25948c47e98be79544d5c3af84ae5a96c3b7650b6c772d
                                                                                                          • Instruction ID: 9245e394badc27c9d68c775c1ae1103ae8f1f8453310ecf51c29309078bed6c3
                                                                                                          • Opcode Fuzzy Hash: 1d6e66add7aa45a35b25948c47e98be79544d5c3af84ae5a96c3b7650b6c772d
                                                                                                          • Instruction Fuzzy Hash: F4016D7A7441065BF301197D7C057ABBB8C8F82AADF144032F89DC3D80F752E41682A1
                                                                                                          APIs
                                                                                                          • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 1100EDA2
                                                                                                            • Part of subcall function 11160824: _setlocale.LIBCMT ref: 11160836
                                                                                                          • _free.LIBCMT ref: 1100EDB4
                                                                                                            • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                                            • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                                          • _free.LIBCMT ref: 1100EDC7
                                                                                                          • _free.LIBCMT ref: 1100EDDA
                                                                                                          • _free.LIBCMT ref: 1100EDED
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                                                                                                          • String ID:
                                                                                                          • API String ID: 3515823920-0
                                                                                                          • Opcode ID: e9cccfb890659d646b87ebb6d02808fc30e7ad32e75d4fdbd2f602c0bae7d034
                                                                                                          • Instruction ID: 71b49ece8787e94f553dd036e4ff5c8d0ec16ff98238e97fea1187b5179b4c62
                                                                                                          • Opcode Fuzzy Hash: e9cccfb890659d646b87ebb6d02808fc30e7ad32e75d4fdbd2f602c0bae7d034
                                                                                                          • Instruction Fuzzy Hash: E61190B1D046109BD620DF599C40A5BF7FCEB44754F144A2AE456D3780E672F900CB91
                                                                                                          APIs
                                                                                                            • Part of subcall function 11144BD0: GetModuleFileNameA.KERNEL32(00000000,?,00000104,11194AB8), ref: 11144C3D
                                                                                                            • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1110F4CB), ref: 11144C7E
                                                                                                            • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 11144CDB
                                                                                                          • wsprintfA.USER32 ref: 1114593E
                                                                                                          • wsprintfA.USER32 ref: 11145954
                                                                                                            • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,75BF8400,?), ref: 111432C7
                                                                                                            • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                                            • Part of subcall function 11143230: CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: File$CreateFolderPathwsprintf$CloseHandleModuleName
                                                                                                          • String ID: %sNSA.LIC$%sNSM.LIC$NSM.LIC
                                                                                                          • API String ID: 3779116287-2600120591
                                                                                                          • Opcode ID: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                                          • Instruction ID: 1f9a4f0ce9ce2038842d239495dc50e58c380b2d1dc072d0c6c391bd72002940
                                                                                                          • Opcode Fuzzy Hash: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                                          • Instruction Fuzzy Hash: 9C01B1B990521D66CB109BB0AC41FEAF77C9B1470DF100199EC1996940EE21BA548BA4
                                                                                                          APIs
                                                                                                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,75BF8400,?), ref: 111432C7
                                                                                                          • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CreateFile$CloseHandle
                                                                                                          • String ID: "
                                                                                                          • API String ID: 1443461169-123907689
                                                                                                          • Opcode ID: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                                          • Instruction ID: 150de81b6b92e27c68bcdd2e608667d56283c35638c5ea37a79585d4ca6bceb2
                                                                                                          • Opcode Fuzzy Hash: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                                          • Instruction Fuzzy Hash: 38217C30A1C269AFE3128E78DD54FD9BBA49F45B14F3041E0E4999B1C1DBB1A948C750
                                                                                                          APIs
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                          • SetEvent.KERNEL32(?,Client,DisableGeolocation,00000000,00000000,C213C15D,74DF2EE0,?,00000000,1118083B,000000FF,?,110300D6,UseIPC,00000001,00000000), ref: 1102D187
                                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                            • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 1102D14A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Event$Create$__wcstoi64_malloc_memsetwsprintf
                                                                                                          • String ID: Client$DisableGeolocation
                                                                                                          • API String ID: 3315423714-4166767992
                                                                                                          • Opcode ID: a2dd62344aa7ed2eba45e03fd0b01f9a1bb13e0d2f8602a6c4817aeae004d655
                                                                                                          • Instruction ID: 1755caac6fc2658334c1ed2ebc8622a08952aff54e10c128aab6c20125b970ec
                                                                                                          • Opcode Fuzzy Hash: a2dd62344aa7ed2eba45e03fd0b01f9a1bb13e0d2f8602a6c4817aeae004d655
                                                                                                          • Instruction Fuzzy Hash: 8521E474A40315BBE712CFA8CD42B6EF7A4E708B18F500269F921AB3C0D7B5B8008785
                                                                                                          APIs
                                                                                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110271DA
                                                                                                            • Part of subcall function 110CD550: EnterCriticalSection.KERNEL32(00000000,00000000,75BF3760,00000000,75C0A1D0,1105DCBB,?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD56B
                                                                                                            • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000476,00000000,00000000), ref: 110CD598
                                                                                                            • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000475,00000000,?), ref: 110CD5AA
                                                                                                            • Part of subcall function 110CD550: LeaveCriticalSection.KERNEL32(?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD5B4
                                                                                                          • TranslateMessage.USER32(?), ref: 110271F0
                                                                                                          • DispatchMessageA.USER32(?), ref: 110271F6
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Message$CriticalSectionSend$DispatchEnterLeaveTranslate
                                                                                                          • String ID: Exit Msgloop, quit=%d
                                                                                                          • API String ID: 3212272093-2210386016
                                                                                                          • Opcode ID: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                                          • Instruction ID: 083e85bce0718499e1b375aadfda5de5654481b636091be3423b85693ac47093
                                                                                                          • Opcode Fuzzy Hash: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                                          • Instruction Fuzzy Hash: 3D01D876E0521D66EB15DAE99C82F6FF3BD6B64718FD00065EE1092185F760F404CBA1
                                                                                                          APIs
                                                                                                          • GetTickCount.KERNEL32 ref: 110173FD
                                                                                                            • Part of subcall function 11017300: WaitForSingleObject.KERNEL32(000002F0,000000FF), ref: 1101733C
                                                                                                            • Part of subcall function 11017300: CoInitialize.OLE32(00000000), ref: 11017345
                                                                                                            • Part of subcall function 11017300: _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                                            • Part of subcall function 11017300: CoUninitialize.COMBASE ref: 110173D0
                                                                                                            • Part of subcall function 11017220: WaitForSingleObject.KERNEL32(000002F0,000000FF), ref: 11017252
                                                                                                            • Part of subcall function 11017220: CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                                            • Part of subcall function 11017220: _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                                            • Part of subcall function 11017220: CoUninitialize.COMBASE ref: 110172E0
                                                                                                          • SetEvent.KERNEL32(000002F0), ref: 1101741D
                                                                                                          • GetTickCount.KERNEL32 ref: 11017423
                                                                                                          Strings
                                                                                                          • touchkbd, systype=%d, chassis=%d, took %d ms, xrefs: 1101742D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CountInitializeObjectSingleStringTickUninitializeW@16Wait$Event
                                                                                                          • String ID: touchkbd, systype=%d, chassis=%d, took %d ms
                                                                                                          • API String ID: 3804766296-4122679463
                                                                                                          • Opcode ID: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                                          • Instruction ID: c54e938b4ab1921e6220328725fe5e45cb955b1045b44cf9de438437e8313787
                                                                                                          • Opcode Fuzzy Hash: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                                          • Instruction Fuzzy Hash: 47F0A0B6E1011C6BE700DBF9AC8AE6BBB9CDB4471CB100026F910C7245E9A6BC1087A1
                                                                                                          APIs
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                          • CreateThread.KERNEL32(00000000,00001000,Function_00137630,00000000,00000000,11138782), ref: 1113782E
                                                                                                          • CloseHandle.KERNEL32(00000000,?,11138782,AutoICFConfig,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 11137835
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CloseCreateHandleThread__wcstoi64
                                                                                                          • String ID: *AutoICFConfig$Client
                                                                                                          • API String ID: 3257255551-59951473
                                                                                                          • Opcode ID: 58a92f72c8c5fc2ca777e547e4c7fef86ef2c1d8c64fc3a44eb11c2425719861
                                                                                                          • Instruction ID: 9aee7181833ba8711af7cecc10eced9f2f0784297ad8accf53734ae3fbf9e9e1
                                                                                                          • Opcode Fuzzy Hash: 58a92f72c8c5fc2ca777e547e4c7fef86ef2c1d8c64fc3a44eb11c2425719861
                                                                                                          • Instruction Fuzzy Hash: 98E0D8757A062D7AF6149AE98C86F65F6199744B26F500154FA20A50C4D6A0A440CB64
                                                                                                          APIs
                                                                                                          • Sleep.KERNEL32(000000FA), ref: 11070CB7
                                                                                                          • EnterCriticalSection.KERNEL32(?), ref: 11070CC4
                                                                                                          • LeaveCriticalSection.KERNEL32(?), ref: 11070D96
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$EnterLeaveSleep
                                                                                                          • String ID: Push
                                                                                                          • API String ID: 1566154052-4278761818
                                                                                                          • Opcode ID: a72291858ce6dc6b0c64ae6c986eadc989c908336576dbf916d062231e355c4c
                                                                                                          • Instruction ID: e8f6e055aac827a13dfabc2dec6ad808bd843e21556e42594c7620890779e76f
                                                                                                          • Opcode Fuzzy Hash: a72291858ce6dc6b0c64ae6c986eadc989c908336576dbf916d062231e355c4c
                                                                                                          • Instruction Fuzzy Hash: 1B51CC78E04784DFE721DF64C880B8AFBE0EF09318F1546A9D8998B285D770BC84CB91
                                                                                                          APIs
                                                                                                          • GetCommandLineA.KERNEL32 ref: 00DB1027
                                                                                                          • GetStartupInfoA.KERNEL32(?), ref: 00DB107B
                                                                                                          • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,?), ref: 00DB1096
                                                                                                          • ExitProcess.KERNEL32 ref: 00DB10A3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3579412811.0000000000DB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00DB0000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3579396762.0000000000DB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3579428842.0000000000DB2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_db0000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                                                                                          • String ID:
                                                                                                          • API String ID: 2164999147-0
                                                                                                          • Opcode ID: 2c31dfeb0f94082aa7a8cef3a6ecf3dfa2d55d6d5e4aa2d9acd099eb4f517e53
                                                                                                          • Instruction ID: 241005df264e3a563a495abcb625d53264499275c9e83e9b48542a2a02a7ba6d
                                                                                                          • Opcode Fuzzy Hash: 2c31dfeb0f94082aa7a8cef3a6ecf3dfa2d55d6d5e4aa2d9acd099eb4f517e53
                                                                                                          • Instruction Fuzzy Hash: E71108284083C8DAEB317F6088A87FABFA59F12780FAC0048DCD796246C25248C7C370
                                                                                                          APIs
                                                                                                          • WaitForSingleObject.KERNEL32(?,000001F4), ref: 110306FC
                                                                                                          • CloseHandle.KERNEL32(?), ref: 11030709
                                                                                                          • FreeLibrary.KERNEL32(?), ref: 11030714
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 1103071B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandle$FreeLibraryObjectSingleWait
                                                                                                          • String ID:
                                                                                                          • API String ID: 1314093303-0
                                                                                                          • Opcode ID: 7d2e314c4a79abf06013014507abe82da34b4e69185c6a4a9ad4d68e1235ff59
                                                                                                          • Instruction ID: 8e76f7fb4e107f93cb89770177b2081f40004907d07b5dfd0c3c9c847909df3d
                                                                                                          • Opcode Fuzzy Hash: 7d2e314c4a79abf06013014507abe82da34b4e69185c6a4a9ad4d68e1235ff59
                                                                                                          • Instruction Fuzzy Hash: A7F08135E1425ADFE714DF60D889BADF774FB88319F0002A9D82A52180DF355940CB50
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Pictures\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CurrentFileModuleNameProcess
                                                                                                          • String ID: C:\Users\Public\Pictures\bild.exe
                                                                                                          • API String ID: 2251294070-2296423061
                                                                                                          • Opcode ID: 723324e2a123dfbea80ddcbfb8a880b064ecb9608f963ee43b1e571dd00f4a9e
                                                                                                          • Instruction ID: b9aa28b4973dc8f7500fb142756b1fa860f28402029a3e5f5efe4e67c4e883a6
                                                                                                          • Opcode Fuzzy Hash: 723324e2a123dfbea80ddcbfb8a880b064ecb9608f963ee43b1e571dd00f4a9e
                                                                                                          • Instruction Fuzzy Hash: F811E7747282235BE7149F76C994719F7A5AB40B5DF20403EE819C76C4DB71F845C744
                                                                                                          APIs
                                                                                                          • _malloc.LIBCMT ref: 1110F4A9
                                                                                                            • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                                            • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                                            • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                                          • _memset.LIBCMT ref: 1110F4D2
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AllocateErrorExitHeapLastMessageProcess_malloc_memsetwsprintf
                                                                                                          • String ID: ..\ctl32\Refcount.cpp
                                                                                                          • API String ID: 2803934178-2363596943
                                                                                                          • Opcode ID: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                                          • Instruction ID: 747f5be640ff5df7f7be77ac0748be8e5b1ae2afb2ba592a3adef8646797d69b
                                                                                                          • Opcode Fuzzy Hash: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                                          • Instruction Fuzzy Hash: B5E0C23AE4013933C112258A2C03FDBF69C8BD19FCF060021FE0CAA201E586B55181E6
                                                                                                          APIs
                                                                                                          • CreateFileA.KERNEL32(\\.\NSWFPDrv,80000000,00000000,00000000,00000003,40000000,00000000,00000001,1102EFB6,MiniDumpType,000000FF,00000000,00000000,?,?,View), ref: 11014FE7
                                                                                                          • CloseHandle.KERNEL32(00000000,?,?,View,Client,Bridge), ref: 11014FF8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CloseCreateFileHandle
                                                                                                          • String ID: \\.\NSWFPDrv
                                                                                                          • API String ID: 3498533004-85019792
                                                                                                          • Opcode ID: f0badf7843dd101c9c7a596aad23f33c11cadc83e0c29f65da520d4fe63b43e1
                                                                                                          • Instruction ID: 0b573536b28af4079515d3142ca801f5deca53cbeb6a996f0a1660ae0aa1d84a
                                                                                                          • Opcode Fuzzy Hash: f0badf7843dd101c9c7a596aad23f33c11cadc83e0c29f65da520d4fe63b43e1
                                                                                                          • Instruction Fuzzy Hash: A9D0C971A051387AF23416B66C4CFC7AD09DF06BB5F210264B53DE11D886104C41C2F1
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: _calloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1679841372-0
                                                                                                          • Opcode ID: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                                          • Instruction ID: 0024421513bb2e1abb717dbf2ce3cdefbb73aa1ee3cdb3a5feae03928f974db8
                                                                                                          • Opcode Fuzzy Hash: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                                          • Instruction Fuzzy Hash: 8C519E7560020AAFDB50CF68CC81FAAB7A6FF8A704F148459F929DB280D771E901CF95
                                                                                                          APIs
                                                                                                          • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                                          • __wsplitpath.LIBCMT ref: 11111475
                                                                                                            • Part of subcall function 11169044: __splitpath_helper.LIBCMT ref: 11169086
                                                                                                          • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: DirectoryInformationSystemVolume__splitpath_helper__wsplitpath
                                                                                                          • String ID:
                                                                                                          • API String ID: 1847508633-0
                                                                                                          • Opcode ID: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                                          • Instruction ID: 71a9510f599fa1c136cb45ff21797ad5c5790827a759e4d2b52c0b71367846c8
                                                                                                          • Opcode Fuzzy Hash: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                                          • Instruction Fuzzy Hash: 34116175A4021DABEB14DF94CD42FE9F378AB48B04F404199E7246B1C0E7B12A48CB65
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA01
                                                                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA08
                                                                                                            • Part of subcall function 1109E910: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,1102FCB2,?,00000000), ref: 1109E948
                                                                                                            • Part of subcall function 1109E910: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109E964
                                                                                                            • Part of subcall function 1109E910: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,009CDFC0,009CDFC0,009CDFC0,009CDFC0,009CDFC0,009CDFC0,009CDFC0,111EEB64,?,00000001,00000001), ref: 1109E990
                                                                                                            • Part of subcall function 1109E910: EqualSid.ADVAPI32(?,009CDFC0,?,00000001,00000001), ref: 1109E9A3
                                                                                                          • CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 1109EA27
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Token$InformationProcess$AllocateCloseCurrentEqualHandleInitializeOpen
                                                                                                          • String ID:
                                                                                                          • API String ID: 2256153495-0
                                                                                                          • Opcode ID: 3278d9adbe4d3509b3b3548b9dad78e2718189f4cc0d765404142b0664a012dd
                                                                                                          • Instruction ID: 36b54363b319bb335bc5da0d0e9bdd0405b18079b131e91390d3ecc07929186c
                                                                                                          • Opcode Fuzzy Hash: 3278d9adbe4d3509b3b3548b9dad78e2718189f4cc0d765404142b0664a012dd
                                                                                                          • Instruction Fuzzy Hash: DCF05E78A15328EFD709CFF5D88482EB7A9AF08208700447DF629D3205E631EE009F50
                                                                                                          APIs
                                                                                                          • InitializeCriticalSection.KERNEL32(111F0908,C213C15D,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F754
                                                                                                          • EnterCriticalSection.KERNEL32(111F0908,C213C15D,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F770
                                                                                                          • LeaveCriticalSection.KERNEL32(111F0908,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F7B8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$EnterInitializeLeave
                                                                                                          • String ID:
                                                                                                          • API String ID: 3991485460-0
                                                                                                          • Opcode ID: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                                          • Instruction ID: 724175da6b3b5eb63f60f43096b8b9410b0df93e13cce3f4766159a849acac97
                                                                                                          • Opcode Fuzzy Hash: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                                          • Instruction Fuzzy Hash: 3D11C675A0061AAFE700CF65CD85B5BF7A9FB88714F010129E829E3340F7359808CB92
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(00000000,00000000), ref: 11068A12
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad
                                                                                                          • String ID: ??CTL32.DLL
                                                                                                          • API String ID: 1029625771-2984404022
                                                                                                          • Opcode ID: f114da26ba1a202df3ee97640f196ffb6169a957819133968d89773a25347f90
                                                                                                          • Instruction ID: 38d720fc7c26638894156a2f8924bac31edb6b50614c34829f37a9a02c5b1e22
                                                                                                          • Opcode Fuzzy Hash: f114da26ba1a202df3ee97640f196ffb6169a957819133968d89773a25347f90
                                                                                                          • Instruction Fuzzy Hash: 5831F5B2A04781DFE711CF59DC40B5AF7E8FB45724F0482AAE92897380E735A900CB92
                                                                                                          APIs
                                                                                                          • GetDriveTypeA.KERNEL32(?), ref: 11026B6D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: DriveType
                                                                                                          • String ID: ?:\
                                                                                                          • API String ID: 338552980-2533537817
                                                                                                          • Opcode ID: b7a90a31e7e06615914d848c67eda86d39421f745c303f5cb5263aa0826e519a
                                                                                                          • Instruction ID: c0198090b602517e4922a9d0df48f1c050a77905515f879100581957a4b6d58d
                                                                                                          • Opcode Fuzzy Hash: b7a90a31e7e06615914d848c67eda86d39421f745c303f5cb5263aa0826e519a
                                                                                                          • Instruction Fuzzy Hash: 64F09065C083DA2AEB23DE608844596BFE84B463A8F5488D9DCE887541D165E1C58791
                                                                                                          APIs
                                                                                                            • Part of subcall function 110ED160: RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                                          • RegOpenKeyExA.KERNEL32(?,00000056,00000000,00020019,?,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED1BC
                                                                                                            • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                                          Strings
                                                                                                          • Error %d Opening regkey %s, xrefs: 110ED1CA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CloseOpenwvsprintf
                                                                                                          • String ID: Error %d Opening regkey %s
                                                                                                          • API String ID: 1772833024-3994271378
                                                                                                          • Opcode ID: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                                          • Instruction ID: 33cf1931661e2960d377c619dd89904b97ea319b13ae6f8f8dcb9591a9c6775e
                                                                                                          • Opcode Fuzzy Hash: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                                          • Instruction Fuzzy Hash: 60E0927A6012187FD210961B9C89F9BBB2DDB856A4F000069FD1487201C972EC1082B0
                                                                                                          APIs
                                                                                                          • RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                                            • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                                          Strings
                                                                                                          • Error %d closing regkey %x, xrefs: 110ED17D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Closewvsprintf
                                                                                                          • String ID: Error %d closing regkey %x
                                                                                                          • API String ID: 843752472-892920262
                                                                                                          • Opcode ID: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                                          • Instruction ID: 72b2cf3cdd4b8fd577e25b07e2838f9a8e734d144b1f96517ba84771a8eadcbb
                                                                                                          • Opcode Fuzzy Hash: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                                          • Instruction Fuzzy Hash: 4EE08679A022126BD3289A1EAC18F5BB6E8DFC4300F1604ADF850C3240DA70D8018664
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(NSMTRACE,?,1102DE54,11026580,00D9B878,?,?,?,00000100,?,?,00000009), ref: 111463E9
                                                                                                            • Part of subcall function 111456A0: GetModuleHandleA.KERNEL32(NSMTRACE,11194AB8), ref: 111456BA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: HandleLibraryLoadModule
                                                                                                          • String ID: NSMTRACE
                                                                                                          • API String ID: 4133054770-4175627554
                                                                                                          • Opcode ID: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                                          • Instruction ID: cf49eb18fee32400038a48a9d82a087192b912de878353ac6c822cd252c7dc11
                                                                                                          • Opcode Fuzzy Hash: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                                          • Instruction Fuzzy Hash: 50D05EB520033BCFDB489F7995B4269F7EAAB4CA1D3540075E469C2A07EBB0D848C714
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(psapi.dll,?,110302C4), ref: 11025CD8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad
                                                                                                          • String ID: psapi.dll
                                                                                                          • API String ID: 1029625771-80456845
                                                                                                          • Opcode ID: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                                          • Instruction ID: d2f0b82a95d6fc878682dccaf19b7a180456f678ee46f3fe844c8dbdc6f5fb44
                                                                                                          • Opcode Fuzzy Hash: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                                          • Instruction Fuzzy Hash: C9E001B1A11B248FC3B4CF3AA844642FAF0BB18A103118A3ED4AEC3A00E330A5448F80
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(nslsp.dll,00000000,1102EF80,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 11014F8E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad
                                                                                                          • String ID: nslsp.dll
                                                                                                          • API String ID: 1029625771-3933918195
                                                                                                          • Opcode ID: 09252c17772e29db9c623e4f38910c48fc62fdaa09ce42d8982732414e450a92
                                                                                                          • Instruction ID: 60eb6736f29bf142f24d4cfcc231741db50fe0cc1946b431100be770a733e412
                                                                                                          • Opcode Fuzzy Hash: 09252c17772e29db9c623e4f38910c48fc62fdaa09ce42d8982732414e450a92
                                                                                                          • Instruction Fuzzy Hash: E7C092B17152388FE3685F7CAC085D2FAE4EB48A91351986EE4B5D3308E6B09C40CFE4
                                                                                                          APIs
                                                                                                          • _memset.LIBCMT ref: 11074E1F
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,00000000,11194245,?), ref: 11074E89
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: FreeLibrary_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 1654520187-0
                                                                                                          • Opcode ID: f6776980cd6796a903c6ab2b2bc3f730c5ac8cd4990655cc289426affdaed8f3
                                                                                                          • Instruction ID: 144a06a128bfe4de4bcaa8ee3b5ec3a734aa963de7831f9780c3e5d6e94517af
                                                                                                          • Opcode Fuzzy Hash: f6776980cd6796a903c6ab2b2bc3f730c5ac8cd4990655cc289426affdaed8f3
                                                                                                          • Instruction Fuzzy Hash: 6E218376D04228A7D710DA99EC41FEFFBACEB44325F4045AAE909D7200D7315A55CBE1
                                                                                                          APIs
                                                                                                          • _memset.LIBCMT ref: 110883EF
                                                                                                          • InitializeCriticalSection.KERNEL32(0000E3D0,00000000,?,11070993,00000000,00000000,1118201E,000000FF), ref: 11088460
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalInitializeSection_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 453477542-0
                                                                                                          • Opcode ID: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                                          • Instruction ID: 54b2584c526ac61f8aa3306390e259e673957fd90be6398fea32980b523eb801
                                                                                                          • Opcode Fuzzy Hash: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                                          • Instruction Fuzzy Hash: EE1157B0911B148FC3A4CF7A88817C7FBE5BB58310F80892E96EEC2200DB716664CF94
                                                                                                          APIs
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 11144461
                                                                                                          • ExtractIconExA.SHELL32(?,00000000,00020417,00020435,00000001), ref: 11144498
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ExtractFileIconModuleName
                                                                                                          • String ID:
                                                                                                          • API String ID: 3911389742-0
                                                                                                          • Opcode ID: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                                          • Instruction ID: eab236796224ce85d4984e15688285b8376dcc0e4438f4162dfbb4c1a1faa056
                                                                                                          • Opcode Fuzzy Hash: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                                          • Instruction Fuzzy Hash: 3EF0F0787581189FE708DFA0C892FF9B369F794709F444269E912C6184CE706A4C8B51
                                                                                                          APIs
                                                                                                            • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                                          • __lock_file.LIBCMT ref: 11163DFE
                                                                                                            • Part of subcall function 1116AF99: __lock.LIBCMT ref: 1116AFBE
                                                                                                          • __fclose_nolock.LIBCMT ref: 11163E09
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                                          • String ID:
                                                                                                          • API String ID: 2800547568-0
                                                                                                          • Opcode ID: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                                          • Instruction ID: 92e00479c768bfe57184568fb50af5c8f285ad3b4a4164507b2fffc520e9ca87
                                                                                                          • Opcode Fuzzy Hash: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                                          • Instruction Fuzzy Hash: 5CF0F6348143079ED7119B79D80078EFBA86F0033CF518248C0289A0C0CBFA6521CE56
                                                                                                          APIs
                                                                                                            • Part of subcall function 11144DC0: ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,NSM.LIC), ref: 11144DE7
                                                                                                            • Part of subcall function 11163FED: __fsopen.LIBCMT ref: 11163FFA
                                                                                                          • GetLastError.KERNEL32(?,00D9B878,000000FF,?), ref: 11144ED5
                                                                                                          • Sleep.KERNEL32(000000C8,?,?,?,?,?,?,00D9B878,000000FF,?), ref: 11144EE5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: EnvironmentErrorExpandLastSleepStrings__fsopen
                                                                                                          • String ID:
                                                                                                          • API String ID: 3768737497-0
                                                                                                          • Opcode ID: 31fc0bde93ac12b3b57265c96de8f634bcc1559677f471cf9725baf87a88f7fc
                                                                                                          • Instruction ID: cc8fd34c32098476147d622d57126809c91a32baa97f0e350d3592d26a0b2836
                                                                                                          • Opcode Fuzzy Hash: 31fc0bde93ac12b3b57265c96de8f634bcc1559677f471cf9725baf87a88f7fc
                                                                                                          • Instruction Fuzzy Hash: 8D110875D4411AEBD7119F94C9C4A6EF3BCEF85A29F200164FC0497A00E775AD11C7A3
                                                                                                          APIs
                                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 11010774
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: LockitLockit::_std::_
                                                                                                          • String ID:
                                                                                                          • API String ID: 3382485803-0
                                                                                                          • Opcode ID: b33c3b2a793c511d1b6f960a0ad5a8f3eee08100d5ee20f4381cce5b941f1766
                                                                                                          • Instruction ID: 0f97abe7109b731a14a0a5233c6982db04001c22e931a1e4a38e375530e3522e
                                                                                                          • Opcode Fuzzy Hash: b33c3b2a793c511d1b6f960a0ad5a8f3eee08100d5ee20f4381cce5b941f1766
                                                                                                          • Instruction Fuzzy Hash: D9515D74E00645DFDB04CF98C980AADBBF5BF88318F24829DD5869B385C776E942CB90
                                                                                                          APIs
                                                                                                          • RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,75BF8400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: QueryValue
                                                                                                          • String ID:
                                                                                                          • API String ID: 3660427363-0
                                                                                                          • Opcode ID: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                                          • Instruction ID: 1cdda14904265755d753c391d3c49599355d775305d59026304f2c7825c43cec
                                                                                                          • Opcode Fuzzy Hash: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                                          • Instruction Fuzzy Hash: 5D1193716282655AEB218E14D690BAFFBAAEFC5B24F30836AE51547E04C3329886C750
                                                                                                          APIs
                                                                                                          • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000048,?,?), ref: 110FACED
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: InformationToken
                                                                                                          • String ID:
                                                                                                          • API String ID: 4114910276-0
                                                                                                          • Opcode ID: e293ede8765d0badea50781af9c0a4ddb492315e77c2591cd008e5b0916e1792
                                                                                                          • Instruction ID: 5942e99df11cc5ddd12142181c934b3f7ef04b83757ceed83c361bf33f076152
                                                                                                          • Opcode Fuzzy Hash: e293ede8765d0badea50781af9c0a4ddb492315e77c2591cd008e5b0916e1792
                                                                                                          • Instruction Fuzzy Hash: 8911AC71E1011DDBDB11DFA8DC557EE73F8DB58305F0041D9E9099B240DA71AE488B90
                                                                                                          APIs
                                                                                                          • RtlAllocateHeap.NTDLL(00000008,110310DF,00000000,?,11169DD4,?,110310DF,00000000,00000000,00000000,?,1116B767,00000001,00000214,?,1110F4AE), ref: 111701A9
                                                                                                            • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap__getptd_noexit
                                                                                                          • String ID:
                                                                                                          • API String ID: 328603210-0
                                                                                                          • Opcode ID: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                                          • Instruction ID: 37eba9f6ddbe8283f17829f7b0a109b8136aa2f13792341ea1fc2e0acbbf6d66
                                                                                                          • Opcode Fuzzy Hash: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                                          • Instruction Fuzzy Hash: 590124392013669BEB099F25EC60B5BB799AB83365F014529EC15CA3C0DB70D900C340
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: __waccess_s
                                                                                                          • String ID:
                                                                                                          • API String ID: 4272103461-0
                                                                                                          • Opcode ID: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                                          • Instruction ID: b67d37eb909022d12c4b3a5208e3be1f16578853890f7fcac85d973ba88585e6
                                                                                                          • Opcode Fuzzy Hash: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                                          • Instruction Fuzzy Hash: C5C09B3705811D7F5F055DE5EC00C557F5DD6806747148156F91C89590DD73E561D540
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: __fsopen
                                                                                                          • String ID:
                                                                                                          • API String ID: 3646066109-0
                                                                                                          • Opcode ID: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                                          • Instruction ID: 3fb95567750ac4c2837cb65daf82bfaf3169cdeaa60eaf7921ceae4fe4d00650
                                                                                                          • Opcode Fuzzy Hash: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                                          • Instruction Fuzzy Hash: 76C0927645424C77DF112A82EC02E4A7F2E9BC0668F448060FB1C19160AAB3EA71DACA
                                                                                                          APIs
                                                                                                          • _NSMClient32@8.PCICL32(?,?,?,00DB10A2,00000000), ref: 00DB100B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3579412811.0000000000DB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00DB0000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3579396762.0000000000DB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3579428842.0000000000DB2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_db0000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Client32@8
                                                                                                          • String ID:
                                                                                                          • API String ID: 433899448-0
                                                                                                          • Opcode ID: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                                          • Instruction ID: 18d6e7ba1cb58fce0acd521122ef6d105858fe76c5821fedfa12eb464df7a04c
                                                                                                          • Opcode Fuzzy Hash: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                                          • Instruction Fuzzy Hash: EAB092B612434DDB8714EE98E851CBB339CAA98600B400809BD0643282CA61FC60A671
                                                                                                          APIs
                                                                                                          • InterlockedIncrement.KERNEL32(111ED4B8), ref: 1102D382
                                                                                                          • Sleep.KERNEL32(0000EA60), ref: 1102D3A5
                                                                                                            • Part of subcall function 11026F20: PostThreadMessageA.USER32(00000000,00000501,1102D590,00000000), ref: 11026F72
                                                                                                            • Part of subcall function 11026F20: Sleep.KERNEL32(00000032,?,1102D590,00000001), ref: 11026F76
                                                                                                            • Part of subcall function 11026F20: PostThreadMessageA.USER32(00000000,00000012,00000000,00000000), ref: 11026F97
                                                                                                            • Part of subcall function 11026F20: WaitForSingleObject.KERNEL32(00000000,00000032,?,1102D590,00000001), ref: 11026FA2
                                                                                                            • Part of subcall function 11026F20: CloseHandle.KERNEL32(00000000,1102E392,?,1102D590,00000001), ref: 11026FB4
                                                                                                            • Part of subcall function 11026F20: FreeLibrary.KERNEL32(00000000,00000000,00000000,1102E392,?,1102D590,00000001), ref: 11026FE1
                                                                                                          • GetCurrentProcess.KERNEL32(00000020,00000000,00000000), ref: 1102D3AB
                                                                                                          • SetPriorityClass.KERNEL32(00000000), ref: 1102D3B2
                                                                                                          • SetEvent.KERNEL32(00000248), ref: 1102D3E7
                                                                                                          • Sleep.KERNEL32(000007D0), ref: 1102D4D8
                                                                                                          • PostThreadMessageA.USER32(00000FC8,00000000,00000000,00000000), ref: 1102D5BC
                                                                                                          • CloseHandle.KERNEL32(00000288), ref: 1102D815
                                                                                                          • _free.LIBCMT ref: 1102D825
                                                                                                          • _free.LIBCMT ref: 1102D841
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1102D8D4
                                                                                                          • GetFileAttributesA.KERNEL32(?), ref: 1102D8E1
                                                                                                          • _memset.LIBCMT ref: 1102D983
                                                                                                          • FindFirstFileA.KERNEL32(?,?,?,?,?,00000000,00000000), ref: 1102D99B
                                                                                                          • FindNextFileA.KERNEL32(00000000,00000010,?,?,?,00000000,00000000), ref: 1102D9C2
                                                                                                          • FindClose.KERNEL32(00000000,?,?,?,00000000,00000000), ref: 1102D9C9
                                                                                                          • ExitWindowsEx.USER32(00000002,00000000), ref: 1102DAB7
                                                                                                          • Sleep.KERNEL32(00002710), ref: 1102DABE
                                                                                                          • ExitWindowsEx.USER32(00000006,00000000), ref: 1102DAD4
                                                                                                          • Sleep.KERNEL32(000007D0), ref: 1102DAE0
                                                                                                          • ExitProcess.KERNEL32 ref: 1102DAF4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Sleep$File$CloseExitFindMessagePostThread$HandleProcessWindows_free$AttributesClassCurrentEventFirstFreeIncrementInterlockedLibraryModuleNameNextObjectPrioritySingleWait_memset
                                                                                                          • String ID: *.*$035347$Audio$CLIENT32.CPP$Error %s unloading audiocap dll$Error. Multiple Terminate. $Finished terminate$HookDirectSound$Stop tracing, almost terminated$TermUI...$Termed$Terminate Client32 (err=%d)$Unload Hook$Warning. Unprocessed notify NC_CMD, cmd=%d$Warning. Unprocessed notify, type=%d$delete gMain.ev$deleted ipc$pSlash$remove smartcard devices
                                                                                                          • API String ID: 2369127096-817851348
                                                                                                          • Opcode ID: add873a8ab015faf9889e95090e84e2001c1be1f53f7e8c1ad7b83b87d9131ad
                                                                                                          • Instruction ID: 7f46233fb5632011b045e2eff7fc4cb47a6b13c38cfe1b2a85386abe64dfbaee
                                                                                                          • Opcode Fuzzy Hash: add873a8ab015faf9889e95090e84e2001c1be1f53f7e8c1ad7b83b87d9131ad
                                                                                                          • Instruction Fuzzy Hash: D212F778E001229FDB16DFE8CCC4E6DF7A6AB8470CFA401A9E52557644EB71BD80CB52
                                                                                                          APIs
                                                                                                          • IsIconic.USER32(?), ref: 111132BA
                                                                                                          • GetTickCount.KERNEL32 ref: 1111332E
                                                                                                          • CreateRectRgn.GDI32(00000000,?,?,?), ref: 11113352
                                                                                                          • GetClientRect.USER32(?,?), ref: 11113402
                                                                                                          • SetStretchBltMode.GDI32(?,00000004), ref: 11113534
                                                                                                          • CreateRectRgn.GDI32(?,?,?,?), ref: 1111358F
                                                                                                          • GetClipRgn.GDI32(?,00000000), ref: 111135A3
                                                                                                          • OffsetRgn.GDI32(00000000,00000000,00000000), ref: 111135C8
                                                                                                          • GetRgnBox.GDI32(00000000,?), ref: 111135D3
                                                                                                          • SelectClipRgn.GDI32(?,00000000), ref: 111135E1
                                                                                                          • StretchBlt.GDI32(?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 1111366B
                                                                                                          • SelectClipRgn.GDI32(?,00000000), ref: 1111367A
                                                                                                          • DeleteObject.GDI32(?), ref: 11113684
                                                                                                          • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00CC0020), ref: 111136C2
                                                                                                          • GetWindowOrgEx.GDI32(?,?), ref: 111136D7
                                                                                                          • StretchBlt.GDI32(?,?,?,00000000,00000000,?,?,?,?,?,00CC0020), ref: 1111371C
                                                                                                          • GetKeyState.USER32(000000A3), ref: 11113747
                                                                                                          • CreatePen.GDI32(00000000,00000001,000000FF), ref: 1111378B
                                                                                                          • CreatePen.GDI32(00000000,00000001,00FFFFFF), ref: 1111379D
                                                                                                          • SelectObject.GDI32(00000000,?), ref: 111137B1
                                                                                                          • Polyline.GDI32(00000000,?,00000005), ref: 111137C7
                                                                                                          • Sleep.KERNEL32(00000032), ref: 111137CF
                                                                                                          • SelectObject.GDI32(00000000,?), ref: 111137E0
                                                                                                          • Polyline.GDI32(00000000,?,00000005), ref: 111137F3
                                                                                                          • Sleep.KERNEL32(00000032), ref: 111137FB
                                                                                                          • SelectObject.GDI32(00000000,?), ref: 1111380C
                                                                                                          • DeleteObject.GDI32(?), ref: 11113816
                                                                                                          • DeleteObject.GDI32(?), ref: 11113820
                                                                                                          • BitBlt.GDI32(00000000,00000000,00000000,00004000,?,?,00000000,00000000,00CC0020), ref: 11113845
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Object$Select$CreateStretch$ClipDeleteRect$PolylineSleep$ClientCountIconicModeOffsetStateTickWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 879653699-0
                                                                                                          • Opcode ID: d401745ce30a04a168751c86834ada46f257f5b09613656bfb34517905d94607
                                                                                                          • Instruction ID: 189fb298e01def9bf465b0ce988e90e2b94731e78913cb033f8d66d61a6768cc
                                                                                                          • Opcode Fuzzy Hash: d401745ce30a04a168751c86834ada46f257f5b09613656bfb34517905d94607
                                                                                                          • Instruction Fuzzy Hash: E112F7B1A147099FDB14CFB8C984AAEF7F9EF88315F10452DE55A9B258DB70A841CF10
                                                                                                          APIs
                                                                                                          • SHGetFolderPathA.SHFOLDER(00000000,00000005,00000000,00000000,?), ref: 1103B1B2
                                                                                                          • GetUserNameA.ADVAPI32(?,?), ref: 1103B1D9
                                                                                                            • Part of subcall function 110D0710: __strdup.LIBCMT ref: 110D072A
                                                                                                          • DeleteFileA.KERNEL32(?), ref: 1103B23A
                                                                                                          • _sprintf.LIBCMT ref: 1103B2BB
                                                                                                          • _fputs.LIBCMT ref: 1103B330
                                                                                                          • GetFileAttributesA.KERNEL32(?), ref: 1103B3A1
                                                                                                          • _free.LIBCMT ref: 1103B336
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          • SetFileAttributesA.KERNEL32(?,00000000), ref: 1103B3DF
                                                                                                            • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: File$AttributesExitProcess$DeleteErrorFolderLastMessageNamePathUser__strdup_fputs_free_sprintf_strrchrwsprintf
                                                                                                          • String ID: %05d$IsA()$P$\Rewards.bin$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                                          • API String ID: 383231468-3762817415
                                                                                                          • Opcode ID: 2af526d8f5190e790c0ca9edbbc40dfe78f9b0864dccbff27541257fc5a2cfb5
                                                                                                          • Instruction ID: bb1b01960f0c7610cbc3075388277e5ec166904b02cd10daef8a33cd2ba906d0
                                                                                                          • Opcode Fuzzy Hash: 2af526d8f5190e790c0ca9edbbc40dfe78f9b0864dccbff27541257fc5a2cfb5
                                                                                                          • Instruction Fuzzy Hash: 7A71A235D4462AAFDB15CB64CC54FEEB3B4AF54308F0442D8E819A7284EB71AA44CFA0
                                                                                                          APIs
                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 110CB339
                                                                                                          • IsIconic.USER32(00000001), ref: 110CB349
                                                                                                          • GetClientRect.USER32(00000001,?), ref: 110CB358
                                                                                                          • GetSystemMetrics.USER32(00000000), ref: 110CB36D
                                                                                                          • GetSystemMetrics.USER32(00000001), ref: 110CB374
                                                                                                          • IsIconic.USER32(00000001), ref: 110CB3A4
                                                                                                          • GetWindowRect.USER32(00000001,?), ref: 110CB3B3
                                                                                                          • SetWindowPos.USER32(?,00000000,?,11185BBB,00000000,00000000,0000001D,00000000,?,00000001,?,00000002,?,?), ref: 110CB467
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: RectWindow$IconicMetricsSystem$ClientErrorExitLastMessageProcesswsprintf
                                                                                                          • String ID: ..\ctl32\nsmdlg.cpp$e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_eh$m_hWnd
                                                                                                          • API String ID: 2655531791-1552842965
                                                                                                          • Opcode ID: 336b00d43c8ecb03fd1d32f6a3e6328df4ddd987a58dd775271b0821d673290e
                                                                                                          • Instruction ID: 7d040125c55bf73af4456014bc99c48d8e10f47c0045797434645e7542fd0d49
                                                                                                          • Opcode Fuzzy Hash: 336b00d43c8ecb03fd1d32f6a3e6328df4ddd987a58dd775271b0821d673290e
                                                                                                          • Instruction Fuzzy Hash: 2C51C175E0061AAFCB10CFA4CC84FEEB7F8FB48754F0481A9E915A7280EA74A940CF50
                                                                                                          APIs
                                                                                                          • LocalAlloc.KERNEL32(00000040,00000014,?,00000000), ref: 110F33FC
                                                                                                          • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 110F3425
                                                                                                          • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 110F3432
                                                                                                          • CreateNamedPipeA.KERNEL32(?,00000003,00000006,00000001,?,?,000003E8,?), ref: 110F3463
                                                                                                          • GetLastError.KERNEL32 ref: 110F3470
                                                                                                          • Sleep.KERNEL32(000003E8), ref: 110F348F
                                                                                                          • CreateNamedPipeA.KERNEL32(?,00000003,00000006,00000001,00000001,?,000003E8,0000000C), ref: 110F34AE
                                                                                                          • LocalFree.KERNEL32(?), ref: 110F34BF
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          • pSD, xrefs: 110F3415
                                                                                                          • e:\nsmsrc\nsm\1210\1210f\client32\platnt.cpp, xrefs: 110F3410
                                                                                                          • CreateNamedPipe %s failed, error %d, xrefs: 110F3478
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CreateDescriptorErrorLastLocalNamedPipeSecurity$AllocDaclExitFreeInitializeMessageProcessSleepwsprintf
                                                                                                          • String ID: CreateNamedPipe %s failed, error %d$e:\nsmsrc\nsm\1210\1210f\client32\platnt.cpp$pSD
                                                                                                          • API String ID: 3134831419-838605531
                                                                                                          • Opcode ID: 6fb66e34af5f69f470863fb769d28e04784f24a47ad29a0bb3f1c0886bbebacf
                                                                                                          • Instruction ID: e749730b24da6d9d65aa5dc542e4a1298255c3932a1a24cca1bc6d9c8703c538
                                                                                                          • Opcode Fuzzy Hash: 6fb66e34af5f69f470863fb769d28e04784f24a47ad29a0bb3f1c0886bbebacf
                                                                                                          • Instruction Fuzzy Hash: 0821DD75E54229BBE7119B64CC8AFAFB76CE744719F014210FE25672C0C7B05A018790
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: CheckClip Error: Can't open clip, e=%d$Client$DisableClipBoard$Sendclip Error: Cant open clip$openclip Error: Cant open clip
                                                                                                          • API String ID: 0-293745777
                                                                                                          • Opcode ID: 5f040545b05273c81cb9d4a4bd22d43a279a27486dfb0bd605f0804696ac8a8f
                                                                                                          • Instruction ID: daee403c678e01c213c7a1d72acf829bd0b7d6ab4ed81c5860d9e9f482a37d6e
                                                                                                          • Opcode Fuzzy Hash: 5f040545b05273c81cb9d4a4bd22d43a279a27486dfb0bd605f0804696ac8a8f
                                                                                                          • Instruction Fuzzy Hash: 7AA1F535B102069FD710DFA5DC91FAAF3A4EFD834AF10459DEA4A9B380DA31B940CB91
                                                                                                          APIs
                                                                                                          • SetUnhandledExceptionFilter.KERNEL32(11147750), ref: 11093089
                                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                          • OpenEventA.KERNEL32(001F0003,00000000,NSMFindClassEvent), ref: 110930B9
                                                                                                          • FindWindowA.USER32(NSMClassList,00000000), ref: 110930CA
                                                                                                          • SetForegroundWindow.USER32(00000000), ref: 110930D1
                                                                                                            • Part of subcall function 110914F0: GlobalAddAtomA.KERNEL32(NSMClassList), ref: 11091552
                                                                                                            • Part of subcall function 11092FF0: GetClassInfoA.USER32(110930EC,NSMClassList,?), ref: 11093004
                                                                                                            • Part of subcall function 11091620: CreateWindowExA.USER32(00000000,NSMClassList,00000000,00000000), ref: 1109166D
                                                                                                            • Part of subcall function 11091620: UpdateWindow.USER32(?), ref: 110916BF
                                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000001,NSMFindClassEvent,?,00000000,?,00000000), ref: 11093111
                                                                                                            • Part of subcall function 110916D0: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110916EA
                                                                                                            • Part of subcall function 110916D0: TranslateAcceleratorA.USER32(?,?,?,?,?,?,11093120,?,00000000,?,00000000), ref: 11091717
                                                                                                            • Part of subcall function 110916D0: TranslateMessage.USER32(?), ref: 11091721
                                                                                                            • Part of subcall function 110916D0: DispatchMessageA.USER32(?), ref: 1109172B
                                                                                                            • Part of subcall function 110916D0: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1109173B
                                                                                                          • CloseHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 11093135
                                                                                                            • Part of subcall function 11091590: GlobalDeleteAtom.KERNEL32(00000000), ref: 110915CE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: MessageWindow$AtomCreateEventGlobalTranslate$AcceleratorClassCloseDeleteDispatchExceptionFilterFindForegroundHandleInfoOpenUnhandledUpdate_malloc_memsetwsprintf
                                                                                                          • String ID: NSMClassList$NSMFindClassEvent
                                                                                                          • API String ID: 1622498684-2883797795
                                                                                                          • Opcode ID: a756580c972c2b1c89b543717e50c84920c15868da069fb40308e575ba74b854
                                                                                                          • Instruction ID: dc520b378aeee27ae2973ce0394f0415fb857a8947d0a09b3e9437a491b5cd63
                                                                                                          • Opcode Fuzzy Hash: a756580c972c2b1c89b543717e50c84920c15868da069fb40308e575ba74b854
                                                                                                          • Instruction Fuzzy Hash: 7111E976F4821D77EB00A6B51C69F6FBADC5B847A8F001024F92DD62C4EF14E401A7A6
                                                                                                          APIs
                                                                                                            • Part of subcall function 11142DD0: _memset.LIBCMT ref: 11142DF9
                                                                                                            • Part of subcall function 11142DD0: GetVersionExA.KERNEL32(?), ref: 11142E12
                                                                                                          • _memset.LIBCMT ref: 1115B266
                                                                                                          • SendMessageA.USER32(?,000005FF,00000000,00000000), ref: 1115B29C
                                                                                                          • ShowWindow.USER32(?,00000006,?,?,?,?,?), ref: 1115B2AC
                                                                                                          • GetDesktopWindow.USER32 ref: 1115B309
                                                                                                          • TileWindows.USER32(00000000,?,?,?,?), ref: 1115B310
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Window_memset$DesktopMessageSendShowTileVersionWindows
                                                                                                          • String ID:
                                                                                                          • API String ID: 2935161463-0
                                                                                                          • Opcode ID: 904692d62195826fcfb4a436604818d54d62b693bb951996d617b667ce96a948
                                                                                                          • Instruction ID: b14402a4e76bbdd80eea2f1b3df88d79255beb3666519cd349b4ccd6d2fbdf9c
                                                                                                          • Opcode Fuzzy Hash: 904692d62195826fcfb4a436604818d54d62b693bb951996d617b667ce96a948
                                                                                                          • Instruction Fuzzy Hash: 39410271A00205ABEB809F64CDC5B6EF7B9FF46354F104065E925EB280DB70E940CFA9
                                                                                                          APIs
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_version), ref: 11063177
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_installed), ref: 1106319C
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_netname), ref: 110631C2
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_remotename), ref: 110631E8
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_bridgename), ref: 1106320E
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_networks), ref: 11063234
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_pingnet), ref: 1106325A
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_open), ref: 11063280
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_close), ref: 110632A6
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_getsession), ref: 110632F2
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_call), ref: 11063318
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_hangup), ref: 1106333E
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_nsessions), ref: 11063364
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_connected), ref: 1106338A
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_send), ref: 110633B0
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_sendex), ref: 110633D6
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_sendif), ref: 110633EB
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_sendto), ref: 11063411
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_subset), ref: 1106341C
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_helpreq), ref: 11063468
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_maxpacket), ref: 1106348E
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_openremote), ref: 110634B4
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_closeremote), ref: 110634DA
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_callremote), ref: 11063500
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_pause), ref: 11063442
                                                                                                            • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_findslaves), ref: 110632CC
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_myaddr), ref: 11063526
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_loadbridge), ref: 11063531
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_getfailedreason), ref: 1106353C
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_escape), ref: 11063547
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_publishservice), ref: 11063552
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_publishserviceex), ref: 1106355D
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_findslavesex), ref: 1106356B
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_broadcastdata), ref: 11063576
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_sendname), ref: 11063584
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_getlocalipaddressinuse), ref: 11063592
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_clientpinrequest), ref: 110635A0
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_controlsendpin), ref: 110635AE
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_controlpinrequest), ref: 110635BC
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_clearpin), ref: 110635CA
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_getcodepage), ref: 110635D8
                                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_getconnectivityinfo), ref: 110635E6
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$ExitProcess$ErrorLastMessage_strrchrwsprintf
                                                                                                          • String ID: ..\ctl32\Connect.cpp$ctl_bridgename$ctl_broadcastdata$ctl_call$ctl_callremote$ctl_clearpin$ctl_clientpinrequest$ctl_close$ctl_closeremote$ctl_connected$ctl_controlpinrequest$ctl_controlsendpin$ctl_escape$ctl_findslaves$ctl_findslavesex$ctl_getcodepage$ctl_getconnectivityinfo$ctl_getfailedreason$ctl_getlocalipaddressinuse$ctl_getsession$ctl_hangup$ctl_helpreq$ctl_installed$ctl_loadbridge$ctl_maxpacket$ctl_myaddr$ctl_netname$ctl_networks$ctl_nsessions$ctl_open$ctl_openremote$ctl_pause$ctl_pingnet$ctl_publishservice$ctl_publishserviceex$ctl_remotename$ctl_send$ctl_sendex$ctl_sendif$ctl_sendname$ctl_sendto$ctl_subset$ctl_version
                                                                                                          • API String ID: 1096595926-1306570422
                                                                                                          • Opcode ID: cf51ba996edafb05b73b1d2fbab5a16ed4be44cc98c1f2e0f0545e03da82bd1f
                                                                                                          • Instruction ID: 5f24de0e2360826035fa82522da9b4a10218173402b610a7b1cd1951dc97c3b7
                                                                                                          • Opcode Fuzzy Hash: cf51ba996edafb05b73b1d2fbab5a16ed4be44cc98c1f2e0f0545e03da82bd1f
                                                                                                          • Instruction Fuzzy Hash: 96A15DBCF447927AD312AFB76C91FABFEE86F615D8B81042AF449E5901FA60F000C556
                                                                                                          APIs
                                                                                                            • Part of subcall function 1105DE40: __itow.LIBCMT ref: 1105DE65
                                                                                                          • GetObjectA.GDI32(?,0000003C,?), ref: 11005435
                                                                                                            • Part of subcall function 1110F4A0: _malloc.LIBCMT ref: 1110F4A9
                                                                                                            • Part of subcall function 1110F4A0: _memset.LIBCMT ref: 1110F4D2
                                                                                                          • wsprintfA.USER32 ref: 1100548D
                                                                                                          • DeleteObject.GDI32(?), ref: 110054E2
                                                                                                          • DeleteObject.GDI32(?), ref: 110054EB
                                                                                                          • SelectObject.GDI32(?,?), ref: 11005502
                                                                                                          • DeleteObject.GDI32(?), ref: 11005508
                                                                                                          • DeleteDC.GDI32(?), ref: 1100550E
                                                                                                          • SelectObject.GDI32(?,?), ref: 1100551F
                                                                                                          • DeleteObject.GDI32(?), ref: 11005528
                                                                                                          • DeleteDC.GDI32(?), ref: 1100552E
                                                                                                          • DeleteObject.GDI32(?), ref: 1100553F
                                                                                                          • DeleteObject.GDI32(?), ref: 1100556A
                                                                                                          • DeleteObject.GDI32(?), ref: 11005588
                                                                                                          • DeleteObject.GDI32(?), ref: 11005591
                                                                                                          • ShowWindow.USER32(?,00000009), ref: 110055BF
                                                                                                          • PostQuitMessage.USER32(00000000), ref: 110055C7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Object$Delete$Select$MessagePostQuitShowWindow__itow_malloc_memsetwsprintf
                                                                                                          • String ID: %d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%s$Annotate$FillColour$FillStyle$Font$PenColour$PenStyle$PenWidth$Tool
                                                                                                          • API String ID: 2789700732-770455996
                                                                                                          • Opcode ID: d5666059194125e5e798e1ea1a571cdf665601eefd1acf21ad263d58b3d84359
                                                                                                          • Instruction ID: d9229358f4933b228272336fa2bf33a0883a331572b372d30b0232039735f129
                                                                                                          • Opcode Fuzzy Hash: d5666059194125e5e798e1ea1a571cdf665601eefd1acf21ad263d58b3d84359
                                                                                                          • Instruction Fuzzy Hash: 5C816975A00609AFD728DBB5C990EABF7F9BF8C304F00451DE6A697680DA75F801CB60
                                                                                                          APIs
                                                                                                          • BeginPaint.USER32(?,?), ref: 110152BF
                                                                                                          • GetWindowRect.USER32(?,?), ref: 110152D7
                                                                                                          • _memset.LIBCMT ref: 110152E5
                                                                                                          • CreateFontIndirectA.GDI32(?), ref: 11015301
                                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 11015315
                                                                                                          • SetBkMode.GDI32(00000000,00000001), ref: 11015320
                                                                                                          • BeginPath.GDI32(00000000), ref: 1101532D
                                                                                                          • TextOutA.GDI32(00000000,00000000,00000000), ref: 11015350
                                                                                                          • EndPath.GDI32(00000000), ref: 11015357
                                                                                                          • PathToRegion.GDI32(00000000), ref: 1101535E
                                                                                                          • CreateSolidBrush.GDI32(?), ref: 11015370
                                                                                                          • CreateSolidBrush.GDI32(?), ref: 11015386
                                                                                                          • CreatePen.GDI32(00000000,00000002,?), ref: 110153A0
                                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 110153AE
                                                                                                          • SelectObject.GDI32(00000000,?), ref: 110153BE
                                                                                                          • GetRgnBox.GDI32(00000000,?), ref: 110153CB
                                                                                                          • OffsetRgn.GDI32(00000000,?,00000000), ref: 110153EA
                                                                                                          • FillRgn.GDI32(00000000,00000000,?), ref: 110153F9
                                                                                                          • FrameRgn.GDI32(00000000,00000000,?,00000002,00000002), ref: 1101540C
                                                                                                          • DeleteObject.GDI32(00000000), ref: 11015419
                                                                                                          • SelectObject.GDI32(00000000,?), ref: 11015423
                                                                                                          • SelectObject.GDI32(00000000,?), ref: 1101542D
                                                                                                          • DeleteObject.GDI32(?), ref: 11015436
                                                                                                          • DeleteObject.GDI32(?), ref: 1101543F
                                                                                                          • DeleteObject.GDI32(?), ref: 11015448
                                                                                                          • SelectObject.GDI32(00000000,?), ref: 11015452
                                                                                                          • DeleteObject.GDI32(?), ref: 1101545B
                                                                                                          • SetBkMode.GDI32(00000000,?), ref: 11015465
                                                                                                          • EndPaint.USER32(?,?), ref: 11015479
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Object$Select$Delete$Create$Path$BeginBrushModePaintSolid$FillFontFrameIndirectOffsetRectRegionTextWindow_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 3702029449-0
                                                                                                          • Opcode ID: 24b8a3e860cad455b09ae9666a62e4d5b44d953a1c6f38d3d180a12544eed90e
                                                                                                          • Instruction ID: 652d7b9cefe541cc9f67407d7bb7a055c5a4b94d45e30f14e3a138b487ffb704
                                                                                                          • Opcode Fuzzy Hash: 24b8a3e860cad455b09ae9666a62e4d5b44d953a1c6f38d3d180a12544eed90e
                                                                                                          • Instruction Fuzzy Hash: 0D511875A10228AFDB14DBA4CC88FAEF7B9EF89304F004199E519D7244DB74AE44CF61
                                                                                                          APIs
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                            • Part of subcall function 110ED1F0: RegCreateKeyExA.ADVAPI32(00000000,0002001F,00000000,00000000,80000001,?,1105E76C,?,00000000,?,00000000,75BF8400,?,?,1105E76C,80000001), ref: 110ED21B
                                                                                                          • GetTickCount.KERNEL32 ref: 110FF4DB
                                                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 110FF4E8
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 110FF4F5
                                                                                                          • GetTickCount.KERNEL32 ref: 110FF4FB
                                                                                                          • wsprintfA.USER32 ref: 110FF5BE
                                                                                                          • _memset.LIBCMT ref: 110FF5CF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CountTick$CloseCreateHandleObjectSingleWait__wcstoi64_memsetwsprintf
                                                                                                          • String ID: "%s" %s %s HID*$%s HID*$Client$D$DisableHIDCode$DisableHidDevices(%d)$DisabledHID$Error %d opening key$Error creating process %s$Software\NetSupport Ltd\Client32$Trace$TraceFile$Waited %d ms for last devcon$_debug$nsdevcon.exe$nsdevcon64.exe
                                                                                                          • API String ID: 137837830-2801557662
                                                                                                          • Opcode ID: 6bf3ca8b1897a9fb597f7e1bcf8d3474db02404c230f644f8e4e51502cd176c1
                                                                                                          • Instruction ID: a11abc6b97969388e485db2e6a8e88b8a5e3b39e7edf5af597a12920a36432c8
                                                                                                          • Opcode Fuzzy Hash: 6bf3ca8b1897a9fb597f7e1bcf8d3474db02404c230f644f8e4e51502cd176c1
                                                                                                          • Instruction Fuzzy Hash: 9471EC75E4421ABBEB10DBA1DC89FEEF774EB08708F10419DED14A6181EB306944CBA6
                                                                                                          APIs
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                          • wsprintfA.USER32 ref: 110EB1B8
                                                                                                          • GetTickCount.KERNEL32 ref: 110EB212
                                                                                                          • SendMessageA.USER32(?,0000004A,?,?), ref: 110EB226
                                                                                                          • GetTickCount.KERNEL32 ref: 110EB22E
                                                                                                          • SendMessageTimeoutA.USER32(?,0000004A,?,?,00000000,?,?), ref: 110EB276
                                                                                                          • OpenEventA.KERNEL32(00000002,00000000,runplugin.dmp.1,?,00000001), ref: 110EB2A8
                                                                                                          • SetEvent.KERNEL32(00000000,?,00000001), ref: 110EB2B5
                                                                                                          • CloseHandle.KERNEL32(00000000,?,00000001), ref: 110EB2BC
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CountEventMessageSendTick$CloseHandleOpenTimeout__wcstoi64wsprintf
                                                                                                          • String ID: %s$DATA$Error. Runplugin is unresponsive$INIT$TracePlugins$Warning: SendMessage to Runplugin took %d ms (possibly unresponsive)$_debug$runplugin %s (hWnd=%x,u=%d,64=%d) $runplugin.dmp.1
                                                                                                          • API String ID: 3451743168-2289091950
                                                                                                          • Opcode ID: 7081efb8229b45fa1a91f50154a3e59ac40d63dc77862fc88f6c1544d8f2fef1
                                                                                                          • Instruction ID: f1114c107ee76d929ad16cd328bd8b6b93bc0bc6479e919ac6bcab8c7865c9c3
                                                                                                          • Opcode Fuzzy Hash: 7081efb8229b45fa1a91f50154a3e59ac40d63dc77862fc88f6c1544d8f2fef1
                                                                                                          • Instruction Fuzzy Hash: D441A675A012199FD724DFA5DC44FAEF7B8EF48319F0085AEE91AA7240D631A940CFB1
                                                                                                          APIs
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                          • _memset.LIBCMT ref: 11135335
                                                                                                          • LoadIconA.USER32(00000000,00000455), ref: 11135403
                                                                                                          • _strncpy.LIBCMT ref: 11135425
                                                                                                          • Shell_NotifyIconA.SHELL32(00000000,000001E8,?,?,?,?,?,?,?,00000001,00000000,C213C15D,00000000,1102E392,00000001), ref: 11135436
                                                                                                          • LoadIconA.USER32(00000000,0000045C), ref: 11135456
                                                                                                          • GetWindowTextA.USER32(00020442,?,00000180), ref: 11135478
                                                                                                          • wsprintfA.USER32 ref: 111354F4
                                                                                                            • Part of subcall function 110D07C0: _free.LIBCMT ref: 110D07ED
                                                                                                          • wsprintfA.USER32 ref: 1113552C
                                                                                                          • wsprintfA.USER32 ref: 1113558D
                                                                                                          • wsprintfA.USER32 ref: 111355E8
                                                                                                          • Shell_NotifyIconA.SHELL32(1102D57D,000001E8,00000001,00000000,C213C15D,00000000,1102E392,00000001), ref: 11135623
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Iconwsprintf$LoadNotifyShell_$TextWindow__wcstoi64_free_memset_strncpy
                                                                                                          • String ID: %s$%s%s$035347$Client$SysTray
                                                                                                          • API String ID: 1881589080-281322324
                                                                                                          • Opcode ID: 52564186abc49f02ff9e416bc12bc90c7bb85710abbf43999a324a306af1717a
                                                                                                          • Instruction ID: 2c8920b03c090074b43ba546e334978a2e83067bba728106ef80608c6d9e13b6
                                                                                                          • Opcode Fuzzy Hash: 52564186abc49f02ff9e416bc12bc90c7bb85710abbf43999a324a306af1717a
                                                                                                          • Instruction Fuzzy Hash: EAA15CB1D042159FDB62CF74CC50BAEF7B9BB44719F4045ACE829A7284EB71AA44CF50
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: wsprintf
                                                                                                          • String ID: %s%s$Client$DecompressJPEGToBitmap$DecompressPNGToBitmap$ImageFile$ImageFileUser$PCIImage.dll
                                                                                                          • API String ID: 2111968516-1286714176
                                                                                                          • Opcode ID: 16156c97f269215458a29c73816be307994206807deff759477be4abbe46c0e1
                                                                                                          • Instruction ID: cfced163e91c544f1d9a441fe05b752d20d9a2d0abefb67461bd630bfcd17819
                                                                                                          • Opcode Fuzzy Hash: 16156c97f269215458a29c73816be307994206807deff759477be4abbe46c0e1
                                                                                                          • Instruction Fuzzy Hash: 0C911975A50319AFEB11DFA4CD84FDAF3B4BF88725F1041A8E519A7284EB30AA40CF51
                                                                                                          APIs
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                          • _malloc.LIBCMT ref: 1100B366
                                                                                                            • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                                            • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                                            • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                                            • Part of subcall function 1100AC40: EnterCriticalSection.KERNEL32(000000FF,C213C15D,?,00000000,00000000), ref: 1100AC84
                                                                                                            • Part of subcall function 1100AC40: LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1100ACA2
                                                                                                            • Part of subcall function 1100AC40: GetProcAddress.KERNEL32(?,CancelIo), ref: 1100ACEE
                                                                                                            • Part of subcall function 1100AC40: InterlockedExchange.KERNEL32(?,000000FF), ref: 1100AD35
                                                                                                            • Part of subcall function 1100AC40: CloseHandle.KERNEL32(00000000), ref: 1100AD3C
                                                                                                            • Part of subcall function 1100AC40: _free.LIBCMT ref: 1100AD53
                                                                                                            • Part of subcall function 1100AC40: FreeLibrary.KERNEL32(?), ref: 1100AD6B
                                                                                                            • Part of subcall function 1100AC40: LeaveCriticalSection.KERNEL32(?), ref: 1100AD75
                                                                                                          • EnterCriticalSection.KERNEL32(1100CA5A,Audio,DisableSounds,00000000,00000000,C213C15D,?,1100CA4A,00000000,?,1100CA4A,?), ref: 1100B39B
                                                                                                          • CreateFileA.KERNEL32(\\.\NSAudioFilter,C0000000,00000000,00000000,00000003,40000000,00000000,?,1100CA4A,?), ref: 1100B3B8
                                                                                                          • _calloc.LIBCMT ref: 1100B3E9
                                                                                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,1100CA4A,?), ref: 1100B40F
                                                                                                          • LeaveCriticalSection.KERNEL32(1100CA5A,?,1100CA4A,?), ref: 1100B449
                                                                                                          • LeaveCriticalSection.KERNEL32(1100CA4A,?,?,1100CA4A,?), ref: 1100B46E
                                                                                                          Strings
                                                                                                          • Vista new pAudioCap=%p, xrefs: 1100B4D3
                                                                                                          • Error. Vista AudioCapture GetInstance ret %s, xrefs: 1100B4C3
                                                                                                          • Audio, xrefs: 1100B347
                                                                                                          • Vista AddAudioCapEvtListener(%p), xrefs: 1100B4F3
                                                                                                          • DisableSounds, xrefs: 1100B342
                                                                                                          • InitCaptureSounds NT6, xrefs: 1100B48E
                                                                                                          • \\.\NSAudioFilter, xrefs: 1100B3B0
                                                                                                          • Error. Vista AddAudioCaptureEventListener ret %s, xrefs: 1100B51C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$Leave$CreateEnterLibrary$AddressAllocateCloseEventExchangeFileFreeHandleHeapInterlockedLoadProc__wcstoi64_calloc_free_malloc
                                                                                                          • String ID: Audio$DisableSounds$Error. Vista AudioCapture GetInstance ret %s$Error. Vista AddAudioCaptureEventListener ret %s$InitCaptureSounds NT6$Vista AddAudioCapEvtListener(%p)$Vista new pAudioCap=%p$\\.\NSAudioFilter
                                                                                                          • API String ID: 1843377891-2362500394
                                                                                                          • Opcode ID: f60393b41353c13c745924059a021ceb37060bf1a09b9967f753d73c688ee9b2
                                                                                                          • Instruction ID: 3f9b0c4355a442be161718b687c517c7c1a8a488e2b9041c50d9e3709ff29e90
                                                                                                          • Opcode Fuzzy Hash: f60393b41353c13c745924059a021ceb37060bf1a09b9967f753d73c688ee9b2
                                                                                                          • Instruction Fuzzy Hash: 8E51D9B5E0464AAFE704CF74DC80BAEF7A4FB04759F10467AE929A3240E7717550C7A1
                                                                                                          APIs
                                                                                                          • CoInitialize.OLE32(00000000), ref: 1112523A
                                                                                                          • SendMessageA.USER32(?,0000043C,00000000,?), ref: 11125251
                                                                                                          • CreateILockBytesOnHGlobal.OLE32(00000000,00000001,?), ref: 11125280
                                                                                                          • StgCreateDocfileOnILockBytes.OLE32(?,00001012,00000000,?), ref: 111252B6
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          • OleCreateStaticFromData.OLE32(00000000,111C093C,00000002,?,?,?,?), ref: 111253C2
                                                                                                          • OleSetContainedObject.OLE32(?,00000001), ref: 111253D8
                                                                                                          • _memset.LIBCMT ref: 111253E5
                                                                                                          • CoUninitialize.OLE32 ref: 11125499
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Create$BytesLockMessage$ContainedDataDocfileErrorExitFromGlobalInitializeLastObjectProcessSendStaticUninitialize_memsetwsprintf
                                                                                                          • String ID: ..\CTL32\RichInsert.cpp$8$pLockBytes$pOleClientSite$pRichEditOle$pStorage
                                                                                                          • API String ID: 1820880743-4036218486
                                                                                                          • Opcode ID: b8f593f3550aa9e0f779f3b8c62ca3ee8f9d3103c1fcafdad78b4b8c3047e15f
                                                                                                          • Instruction ID: 08d7bdd5ab5c60396c417d70c353951ed5684100983e189a7c8dd5e42ede2f0c
                                                                                                          • Opcode Fuzzy Hash: b8f593f3550aa9e0f779f3b8c62ca3ee8f9d3103c1fcafdad78b4b8c3047e15f
                                                                                                          • Instruction Fuzzy Hash: D69128B5E002599FDB54DFA8CCC4ADDF7B9FB88314F608169E519AB280EB70A941CB50
                                                                                                          APIs
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          • GetLastError.KERNEL32(?), ref: 1102B331
                                                                                                          • GetLastError.KERNEL32(?), ref: 1102B38E
                                                                                                          • _fgets.LIBCMT ref: 1102B3C0
                                                                                                          • _strtok.LIBCMT ref: 1102B3E8
                                                                                                            • Part of subcall function 11163016: __getptd.LIBCMT ref: 11163034
                                                                                                          • _fgets.LIBCMT ref: 1102B424
                                                                                                          • _strtok.LIBCMT ref: 1102B438
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$_fgets_strtok$ExitMessageProcess__getptdwsprintf
                                                                                                          • String ID: *LookupFile$IsA()$LookupFileUser$WARN: Could not open TS lookup file: "%s" (%d), user="%s"$WARN: LoginUser failed (%d) user="%s"$WARN: No TS lookup file specified!$WARN: clientname is empty!$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                                          • API String ID: 78526175-1484737611
                                                                                                          • Opcode ID: ff60ef9c488c2c79b08b3262712ada230bbec0adfdbeaabbc1cb1cc15ddf1ff7
                                                                                                          • Instruction ID: 83a04ffa2f5f23a923324f4189043cfd8b751997b231b4d3af7dc0cd534076c2
                                                                                                          • Opcode Fuzzy Hash: ff60ef9c488c2c79b08b3262712ada230bbec0adfdbeaabbc1cb1cc15ddf1ff7
                                                                                                          • Instruction Fuzzy Hash: 2E81B675D00A1E9BDB10DBA4CC80FEEB7B9AF44309F4440D8E919A7245EA75AB84CF91
                                                                                                          APIs
                                                                                                          • GetWindowsDirectoryA.KERNEL32(?,00000104,C213C15D,00000000,00000000,00000000), ref: 1103119A
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                          • EnumWindows.USER32(110301B0,00000001), ref: 11031272
                                                                                                          • EnumWindows.USER32(110301B0,00000000), ref: 110312CC
                                                                                                          • Sleep.KERNEL32(00000014,?,?,?,?,?,00000000), ref: 110312DC
                                                                                                          • Sleep.KERNEL32(?,?,?,?,?,?,00000000), ref: 11031313
                                                                                                            • Part of subcall function 11027E50: _memset.LIBCMT ref: 11027E85
                                                                                                            • Part of subcall function 11027E50: wsprintfA.USER32 ref: 11027EBA
                                                                                                            • Part of subcall function 11027E50: WaitForSingleObject.KERNEL32(?,000000FF), ref: 11027EFF
                                                                                                            • Part of subcall function 11027E50: GetExitCodeProcess.KERNEL32(?,?), ref: 11027F13
                                                                                                            • Part of subcall function 11027E50: CloseHandle.KERNEL32(?,00000000), ref: 11027F45
                                                                                                            • Part of subcall function 11027E50: CloseHandle.KERNEL32(?), ref: 11027F4E
                                                                                                          • Sleep.KERNEL32(0000000A,?,?,?,?,?,00000000), ref: 1103132B
                                                                                                          • SendMessageA.USER32(?,00000010,00000000,00000000), ref: 110313E7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: SleepWindows$CloseEnumHandle$CodeDirectoryExitMessageObjectProcessSendSingleWait__wcstoi64_memsetwsprintf
                                                                                                          • String ID: "%sNSMExec.exe" %s$*ExitMetroDelay$Client$No new explorer wnd$\Explorer.exe$close new explorer wnd x%x
                                                                                                          • API String ID: 3887438110-1852639040
                                                                                                          • Opcode ID: dd4de2a7fc9d8cd5af608a89b0c8565785138ad2200bde7dfaaacefb5c936fd0
                                                                                                          • Instruction ID: 68f8b224c7beedd47666692ff363fa6bc3684c9dbb57027410f782db2506f70a
                                                                                                          • Opcode Fuzzy Hash: dd4de2a7fc9d8cd5af608a89b0c8565785138ad2200bde7dfaaacefb5c936fd0
                                                                                                          • Instruction Fuzzy Hash: 3391D0B5E002299FDB14CF64DC80BEEF7F5AF89308F1441A9D9599B640EB30AE45CB91
                                                                                                          APIs
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                          • EnterCriticalSection.KERNEL32(?,View,limitcolorbits,00000000,00000000,C213C15D,111F00F8,111E5C98,?), ref: 110B3594
                                                                                                          • UnionRect.USER32(?,?,?), ref: 110B3642
                                                                                                          • LeaveCriticalSection.KERNEL32(?), ref: 110B37DD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$EnterLeaveRectUnion__wcstoi64
                                                                                                          • String ID: 8$Client$ScrapeBandwidth$ScrapeBandwidthPeriod$ScrapeBusyDelay$ScrapeNotBusyDelay$ScrapeSkipDelay$View$d$limitcolorbits
                                                                                                          • API String ID: 3518726166-774679399
                                                                                                          • Opcode ID: 0507bcf6a5bfb235a752924e3a90bf095b586a4feb6a764fbd151a6487f36d15
                                                                                                          • Instruction ID: 5c973c881439576bbc97280a0c87cfab299b34d5c0027cf4f030de1918296fe0
                                                                                                          • Opcode Fuzzy Hash: 0507bcf6a5bfb235a752924e3a90bf095b586a4feb6a764fbd151a6487f36d15
                                                                                                          • Instruction Fuzzy Hash: E5911778E04219AFDB54CFA5C980BADFBF1FB48704F20816AE815AB380D735A941CF58
                                                                                                          APIs
                                                                                                            • Part of subcall function 1115ADD0: IsIconic.USER32(?), ref: 1115AE77
                                                                                                            • Part of subcall function 1115ADD0: ShowWindow.USER32(?,00000009), ref: 1115AE87
                                                                                                            • Part of subcall function 1115ADD0: BringWindowToTop.USER32(?), ref: 1115AE91
                                                                                                          • CheckMenuItem.USER32(00000000,000013EB,-00000009), ref: 1102324D
                                                                                                          • ShowWindow.USER32(?,00000003), ref: 110232D1
                                                                                                          • LoadMenuA.USER32(00000000,000013A3), ref: 110233FB
                                                                                                          • GetSubMenu.USER32(00000000,00000000), ref: 11023409
                                                                                                          • CheckMenuItem.USER32(00000000,000013EB,?), ref: 11023429
                                                                                                          • GetDlgItem.USER32(?,000013B2), ref: 1102343C
                                                                                                          • GetWindowRect.USER32(00000000), ref: 11023443
                                                                                                          • PostMessageA.USER32(?,00000111,?,00000000), ref: 11023499
                                                                                                          • DestroyMenu.USER32(?,?,00000000,00000000,00000102,?,?,?,00000000), ref: 110234A3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Menu$Window$Item$CheckShow$BringDestroyIconicLoadMessagePostRect
                                                                                                          • String ID: AddToJournal$Chat
                                                                                                          • API String ID: 693070851-2976406578
                                                                                                          • Opcode ID: d2fe2766ddb3d34030bb972f012e30f748b4f8edd59272365cd546290ab4e6ab
                                                                                                          • Instruction ID: 337dba7d0f02a97e7c7211def3ec221287211942730252afe18814347e7ecccc
                                                                                                          • Opcode Fuzzy Hash: d2fe2766ddb3d34030bb972f012e30f748b4f8edd59272365cd546290ab4e6ab
                                                                                                          • Instruction Fuzzy Hash: 87A1F178B04616ABDB09DF74CC85FAEB3E5AB88704F504519EA26DF2C0CF74B9408B65
                                                                                                          APIs
                                                                                                            • Part of subcall function 11089280: UnhookWindowsHookEx.USER32(?), ref: 110892A3
                                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 110272B4
                                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                          • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000001F4), ref: 11027323
                                                                                                          • PostMessageA.USER32(00020442,00000501,00000000,00000000), ref: 11027340
                                                                                                          • SetEvent.KERNEL32(00000288), ref: 11027351
                                                                                                          • Sleep.KERNEL32(00000032), ref: 11027359
                                                                                                          • PostMessageA.USER32(00020442,00000800,00000000,00000000), ref: 1102738E
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 110273BA
                                                                                                          • GetThreadDesktop.USER32(00000000), ref: 110273C1
                                                                                                          • SetThreadDesktop.USER32(00000000), ref: 110273CA
                                                                                                          • CloseDesktop.USER32(00000000), ref: 110273D5
                                                                                                          • CloseHandle.KERNEL32(00000410), ref: 11027415
                                                                                                            • Part of subcall function 111100D0: GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                                            • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                                            • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                                            • Part of subcall function 111100D0: EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                                            • Part of subcall function 111100D0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Thread$CriticalDesktopEventSection$CloseCreateCurrentInitializeMessagePost$EnterHandleHookMultipleObjectsSleepUnhookWaitWindows_malloc_memsetwsprintf
                                                                                                          • String ID: Async
                                                                                                          • API String ID: 3276504616-2933828738
                                                                                                          • Opcode ID: 7f34267c0eb402a5cecabe7481cb594ff7fa9432527a27f32e6b0a7f9cc990e4
                                                                                                          • Instruction ID: b4c20aaf8d895fc577ef80b9cbd2db14a62b6b62bbca8aebe14e383436c97cb7
                                                                                                          • Opcode Fuzzy Hash: 7f34267c0eb402a5cecabe7481cb594ff7fa9432527a27f32e6b0a7f9cc990e4
                                                                                                          • Instruction Fuzzy Hash: 2641A174A056159FEB05DFF8C886BAEB7A4FB54718F804138E925DB6C4EB70B800CB51
                                                                                                          APIs
                                                                                                          • GetTickCount.KERNEL32 ref: 1110534D
                                                                                                          • EnterCriticalSection.KERNEL32(111F060C,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 11105356
                                                                                                          • GetTickCount.KERNEL32 ref: 1110535C
                                                                                                          • GetTickCount.KERNEL32 ref: 1110538E
                                                                                                          • LeaveCriticalSection.KERNEL32(111F060C,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 11105397
                                                                                                          • EnterCriticalSection.KERNEL32(?,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 111053B8
                                                                                                          • WriteFile.KERNEL32(00000000,1118C583,?,?,00000000,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF), ref: 111053D0
                                                                                                          • LeaveCriticalSection.KERNEL32(?,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 111053DD
                                                                                                          • GetTickCount.KERNEL32 ref: 111053EC
                                                                                                          • LeaveCriticalSection.KERNEL32(111F060C,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 111053F5
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$CountTick$Leave$Enter$FileWrite
                                                                                                          • String ID: Warning. simap lock held for %d ms$Warning. took %d ms to get simap lock
                                                                                                          • API String ID: 831250470-625438208
                                                                                                          • Opcode ID: 7549535bd9f32612e90d0c37b89a6aa1a9d576740b26f55eee6ebfb36c9c683f
                                                                                                          • Instruction ID: 510883743b079e8f18b7a04972f4ca77f6f871929db96d85a9feff413df15827
                                                                                                          • Opcode Fuzzy Hash: 7549535bd9f32612e90d0c37b89a6aa1a9d576740b26f55eee6ebfb36c9c683f
                                                                                                          • Instruction Fuzzy Hash: F521F37AE10228ABDB009F759CC89AEFBADEB8972DB551075FC15CB204D6609C04CBA0
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: wsprintf
                                                                                                          • String ID: AlreadyStarted$AlreadyStopped$BadParam$CannotGetFunc$CannotLoadDll$DllInitFailed$Exception$NoCapClients$NotFound$RequiresVista$StillInstances$Unknown error %d
                                                                                                          • API String ID: 2111968516-2092292787
                                                                                                          • Opcode ID: 68bb8bbd715fdcfb00972525606c57017de8997db1f0824372bcab7740fe05b1
                                                                                                          • Instruction ID: d9a7d6ebd96fccb3ef7d6a30ae0c52648c54e2eaa592bb8290d406d227b44d1e
                                                                                                          • Opcode Fuzzy Hash: 68bb8bbd715fdcfb00972525606c57017de8997db1f0824372bcab7740fe05b1
                                                                                                          • Instruction Fuzzy Hash: B7F0623269520C47BA8087EC784053EF78D739217D7C88093F4ACFAF20E916DCA0A1A9
                                                                                                          APIs
                                                                                                          • GetVersion.KERNEL32(00000000,74DF0BD0,00000000), ref: 11137363
                                                                                                          • GetModuleHandleA.KERNEL32(ntdll.dll), ref: 11137384
                                                                                                          • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 11137394
                                                                                                          • GetModuleHandleA.KERNEL32(KERNEL32.DLL), ref: 111373B1
                                                                                                          • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoA), ref: 111373BD
                                                                                                          • _memset.LIBCMT ref: 111373D7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AddressHandleModuleProc$Version_memset
                                                                                                          • String ID: KERNEL32.DLL$Terminal Server$VerSetConditionMask$VerifyVersionInfoA$ntdll.dll
                                                                                                          • API String ID: 1659045089-3162170060
                                                                                                          • Opcode ID: 2782e45080b00d7644363843fb4dac8f82773bfcd6b8b8724ba95a014df5fc97
                                                                                                          • Instruction ID: 0c0b10a14524f440857339b23279ac9494b8b75ce88d62c7832b422cfd240681
                                                                                                          • Opcode Fuzzy Hash: 2782e45080b00d7644363843fb4dac8f82773bfcd6b8b8724ba95a014df5fc97
                                                                                                          • Instruction Fuzzy Hash: CB216A70F10329ABF720AB71AD44F5AFFA99B8871AF000474E914A7189EA71B9048765
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,00000001), ref: 1103910C
                                                                                                          • IsWindowEnabled.USER32(00000000), ref: 11039113
                                                                                                          • _memset.LIBCMT ref: 11039131
                                                                                                          • GetDlgItemTextA.USER32(?,0000044D,?,00000080), ref: 11039183
                                                                                                          • GetDlgItemTextA.USER32(?,0000044F,00000000,00000080), ref: 110391EB
                                                                                                          • GetDlgItemTextA.USER32(?,000004BE,00000000,00000080), ref: 1103924E
                                                                                                          • GetDlgItemTextA.USER32(?,000017EC,00000000,00000080), ref: 110392B1
                                                                                                          • GetDlgItemTextA.USER32(?,0000048E,00000000,00000080), ref: 11039377
                                                                                                          • GetDlgItemTextA.USER32(?,0000048D,00000000,00000080), ref: 11039314
                                                                                                            • Part of subcall function 11142800: _strncpy.LIBCMT ref: 11142824
                                                                                                            • Part of subcall function 11142290: _strncpy.LIBCMT ref: 111422D2
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Item$Text$_strncpy$EnabledWindow_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 3085755443-3916222277
                                                                                                          • Opcode ID: 3474633675772f1dfa7fa715227e202affa5940b04f40e4fcdf8bfab1e55feb6
                                                                                                          • Instruction ID: 27c08bceae7d385fa57d2e1d5dbc2d5db1b5a631922e4fecc43e69d3347e8bff
                                                                                                          • Opcode Fuzzy Hash: 3474633675772f1dfa7fa715227e202affa5940b04f40e4fcdf8bfab1e55feb6
                                                                                                          • Instruction Fuzzy Hash: 6D819F75A10706ABE724DB74CC85F9AB3F9BF84704F50C598E2499B181DF71FA448BA0
                                                                                                          APIs
                                                                                                          • wsprintfA.USER32 ref: 1106F397
                                                                                                          • EnterCriticalSection.KERNEL32(?,?,?,?,?,?), ref: 1106F3E8
                                                                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?), ref: 1106F408
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$EnterLeavewsprintf
                                                                                                          • String ID: %s:%d$(null)$ListenPort$NameResp from %s(%s), len=%d/%d, flags=%d, channel=%s$Port$TCPIP$UseNCS$tracerecv
                                                                                                          • API String ID: 3005300677-3496508882
                                                                                                          • Opcode ID: 39a7049b07ce781649e512e0e1065f178741ae477e8da126b9dd4c2485176ebe
                                                                                                          • Instruction ID: 2680b2d19a9bdf8eb0956d8c99ae1cac6e929f7b4449284ea49473897193c40b
                                                                                                          • Opcode Fuzzy Hash: 39a7049b07ce781649e512e0e1065f178741ae477e8da126b9dd4c2485176ebe
                                                                                                          • Instruction Fuzzy Hash: 9EB1A375E0022A9FDB14DF65CC50FAAB7B9AF49708F4041DCE909A7241EB71A981CF62
                                                                                                          APIs
                                                                                                          • IsWindow.USER32(?), ref: 11047211
                                                                                                          • _malloc.LIBCMT ref: 110472AD
                                                                                                          • _memmove.LIBCMT ref: 11047312
                                                                                                          • SendMessageTimeoutA.USER32(?,0000004A,00020442,00000005,00000002,00002710,?), ref: 11047372
                                                                                                          • _free.LIBCMT ref: 11047379
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                            • Part of subcall function 11043870: _free.LIBCMT ref: 11043907
                                                                                                            • Part of subcall function 11043870: _free.LIBCMT ref: 11043927
                                                                                                            • Part of subcall function 11043870: _strncpy.LIBCMT ref: 11043955
                                                                                                            • Part of subcall function 11043870: _strncpy.LIBCMT ref: 11043992
                                                                                                            • Part of subcall function 11043870: _malloc.LIBCMT ref: 110439CC
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: _free$Message_malloc_strncpy$ErrorExitLastProcessSendTimeoutWindow_memmovewsprintf
                                                                                                          • String ID: IsA()$SurveyResults$e:\nsmsrc\nsm\1210\1210f\ctl32\DataStream.h
                                                                                                          • API String ID: 3960737985-1318765656
                                                                                                          • Opcode ID: 6f3482f183dc71e32b0e781e0e1ae71b2587e219f1bd543c2aaaf4bdd4110b9c
                                                                                                          • Instruction ID: e7dd2455d00588b8b0596ee18c4208b20e6f9302996f578dcf6f33cfb97cf12a
                                                                                                          • Opcode Fuzzy Hash: 6f3482f183dc71e32b0e781e0e1ae71b2587e219f1bd543c2aaaf4bdd4110b9c
                                                                                                          • Instruction Fuzzy Hash: 18C1A374E0064A9FDB04DFE4C8D0EEEF7B5BF88308F208168D519AB295DB70A945CB90
                                                                                                          APIs
                                                                                                          • std::_Xinvalid_argument.LIBCPMT ref: 1102D1C0
                                                                                                            • Part of subcall function 111603E3: std::exception::exception.LIBCMT ref: 111603F8
                                                                                                            • Part of subcall function 111603E3: __CxxThrowException@8.LIBCMT ref: 1116040D
                                                                                                            • Part of subcall function 111603E3: std::exception::exception.LIBCMT ref: 1116041E
                                                                                                          • _memmove.LIBCMT ref: 1102D24A
                                                                                                          • _memmove.LIBCMT ref: 1102D26E
                                                                                                          • _memmove.LIBCMT ref: 1102D2A8
                                                                                                          • _memmove.LIBCMT ref: 1102D2C4
                                                                                                          • std::exception::exception.LIBCMT ref: 1102D30E
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 1102D323
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: _memmove$std::exception::exception$Exception@8Throw$Xinvalid_argumentstd::_
                                                                                                          • String ID: deque<T> too long
                                                                                                          • API String ID: 827257264-309773918
                                                                                                          • Opcode ID: 6f44853749167e6417c702704c1d5fd1f6b6aa11f4fe1b268de19c2d7f3316e5
                                                                                                          • Instruction ID: ae58a47b93f5c67beecf59276473b3909c5d487f19c470db74dff325715f4f31
                                                                                                          • Opcode Fuzzy Hash: 6f44853749167e6417c702704c1d5fd1f6b6aa11f4fe1b268de19c2d7f3316e5
                                                                                                          • Instruction Fuzzy Hash: DD41A476E00105ABDB04CE68CC81AEEB7FAAF94324F59C669DC09DB344E675EE05C790
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: __fread_nolock_fseek$_free_malloc_memset
                                                                                                          • String ID: PCIR
                                                                                                          • API String ID: 2419779768-1011558323
                                                                                                          • Opcode ID: 81c3817886dc5dbe589c173359df18430558f154d2dd439929bf4d11460d0680
                                                                                                          • Instruction ID: 1ccd7dea2f775c367685aa3e1c73f4b59a6156879e869ee7e214f681fe7cb03c
                                                                                                          • Opcode Fuzzy Hash: 81c3817886dc5dbe589c173359df18430558f154d2dd439929bf4d11460d0680
                                                                                                          • Instruction Fuzzy Hash: A94106B1F01318ABEB10CFA4DD41BDEB7BEEF81308F104069EC09AB240DA72A901C795
                                                                                                          APIs
                                                                                                          • SetPropA.USER32(?,?), ref: 1101556F
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                            • Part of subcall function 11015290: BeginPaint.USER32(?,?), ref: 110152BF
                                                                                                            • Part of subcall function 11015290: GetWindowRect.USER32(?,?), ref: 110152D7
                                                                                                            • Part of subcall function 11015290: _memset.LIBCMT ref: 110152E5
                                                                                                            • Part of subcall function 11015290: CreateFontIndirectA.GDI32(?), ref: 11015301
                                                                                                            • Part of subcall function 11015290: SelectObject.GDI32(00000000,00000000), ref: 11015315
                                                                                                            • Part of subcall function 11015290: SetBkMode.GDI32(00000000,00000001), ref: 11015320
                                                                                                            • Part of subcall function 11015290: BeginPath.GDI32(00000000), ref: 1101532D
                                                                                                            • Part of subcall function 11015290: TextOutA.GDI32(00000000,00000000,00000000), ref: 11015350
                                                                                                            • Part of subcall function 11015290: EndPath.GDI32(00000000), ref: 11015357
                                                                                                            • Part of subcall function 11015290: PathToRegion.GDI32(00000000), ref: 1101535E
                                                                                                            • Part of subcall function 11015290: CreateSolidBrush.GDI32(?), ref: 11015370
                                                                                                            • Part of subcall function 11015290: CreateSolidBrush.GDI32(?), ref: 11015386
                                                                                                            • Part of subcall function 11015290: CreatePen.GDI32(00000000,00000002,?), ref: 110153A0
                                                                                                            • Part of subcall function 11015290: SelectObject.GDI32(00000000,00000000), ref: 110153AE
                                                                                                            • Part of subcall function 11015290: SelectObject.GDI32(00000000,?), ref: 110153BE
                                                                                                            • Part of subcall function 11015290: GetRgnBox.GDI32(00000000,?), ref: 110153CB
                                                                                                          • GetPropA.USER32(?), ref: 1101557E
                                                                                                          • wsprintfA.USER32 ref: 110155B3
                                                                                                          • RemovePropA.USER32(?), ref: 110155E8
                                                                                                          • DefWindowProcA.USER32(?,?,?,?), ref: 11015611
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Create$ObjectPathPropSelect$BeginBrushSolidWindowwsprintf$ErrorExitFontIndirectLastMessageModePaintProcProcessRectRegionRemoveText_memset
                                                                                                          • String ID: ..\ctl32\NSMIdentifyWnd.cpp$NSMIdentifyWnd::m_aProp$hWnd=%x, uiMsg=x%x, wP=x%x, lP=x%x
                                                                                                          • API String ID: 1924375018-841114059
                                                                                                          • Opcode ID: 349e3198e4ee11d8f994cce4f4d7fe91b877becd306935b01eaf7a21f5783bae
                                                                                                          • Instruction ID: fc00b609a2f261b647cf9ab1963ef075e81928135c8218ba30019119ab5d925d
                                                                                                          • Opcode Fuzzy Hash: 349e3198e4ee11d8f994cce4f4d7fe91b877becd306935b01eaf7a21f5783bae
                                                                                                          • Instruction Fuzzy Hash: 1131E775E01029ABD714DFA4DC80FBEB379EF4A309F04406AF51A9F148EA7A9940CB71
                                                                                                          APIs
                                                                                                          • GetMenuItemCount.USER32(?), ref: 1100519E
                                                                                                          • _memset.LIBCMT ref: 110051C0
                                                                                                          • GetMenuItemID.USER32(?,00000000), ref: 110051D4
                                                                                                          • CheckMenuItem.USER32(?,00000000,00000000), ref: 11005231
                                                                                                          • EnableMenuItem.USER32(?,00000000,00000000), ref: 11005247
                                                                                                          • GetMenuItemInfoA.USER32(?,00000000,00000001,00000030), ref: 11005268
                                                                                                          • SetMenuItemInfoA.USER32(?,00000000,00000001,00000030), ref: 11005294
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ItemMenu$Info$CheckCountEnable_memset
                                                                                                          • String ID: 0
                                                                                                          • API String ID: 2755257978-4108050209
                                                                                                          • Opcode ID: ed19a4d0eac54c607b6a919a5e70af2297959f222d84ccf27589c69c777b0ba6
                                                                                                          • Instruction ID: ff6163613c0a8cbc830ef1528835912891ededd95cc8b4eaa22ca2fcf9c2cdf5
                                                                                                          • Opcode Fuzzy Hash: ed19a4d0eac54c607b6a919a5e70af2297959f222d84ccf27589c69c777b0ba6
                                                                                                          • Instruction Fuzzy Hash: 71318E70D11219ABEB01DFA4D885BEEBBFCEF46758F008059F951E6240E7759944CB60
                                                                                                          APIs
                                                                                                          • _memset.LIBCMT ref: 1101D1E0
                                                                                                          • GetClassInfoExA.USER32(00000000,NSMChatSizeWnd,?), ref: 1101D1FA
                                                                                                          • _memset.LIBCMT ref: 1101D20A
                                                                                                          • RegisterClassExA.USER32(?), ref: 1101D24B
                                                                                                          • CreateWindowExA.USER32(00000000,NSMChatSizeWnd,11194244,00CF0000,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 1101D27E
                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 1101D28B
                                                                                                          • DestroyWindow.USER32(00000000), ref: 1101D292
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Window$Class_memset$CreateDestroyInfoRectRegister
                                                                                                          • String ID: NSMChatSizeWnd
                                                                                                          • API String ID: 2883038198-4119039562
                                                                                                          • Opcode ID: 87aebd6e18ee9abdefb850bcd11d4769ee8e47b38e4dbf48374c28c167509a6c
                                                                                                          • Instruction ID: df00defde950c6a972f57fa33671139d82de9fa74eae4c6bde258e6239c9b3d1
                                                                                                          • Opcode Fuzzy Hash: 87aebd6e18ee9abdefb850bcd11d4769ee8e47b38e4dbf48374c28c167509a6c
                                                                                                          • Instruction Fuzzy Hash: C7314DB5D0021DAFDB10DFA5DD84BEEF7B8EB44628F20012EE925B7240D735A905CB64
                                                                                                          APIs
                                                                                                          • _memset.LIBCMT ref: 1103D18F
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000125), ref: 1103D1BD
                                                                                                          • CloseHandle.KERNEL32(?), ref: 1103D25C
                                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1103D26C
                                                                                                          • CloseHandle.KERNEL32(?), ref: 1103D279
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandle$FileModuleNameObjectSingleWait_memset
                                                                                                          • String ID: /247$" /a$RunAnnot
                                                                                                          • API String ID: 2581068044-4059077130
                                                                                                          • Opcode ID: b839e70076fc368ba000d97afe45d019281ed31407febcd3e3d047b5c4491ca4
                                                                                                          • Instruction ID: dc76f3c11fb5ad4c0452055a60ef983052eda761819ccc7684b04031b26646f7
                                                                                                          • Opcode Fuzzy Hash: b839e70076fc368ba000d97afe45d019281ed31407febcd3e3d047b5c4491ca4
                                                                                                          • Instruction Fuzzy Hash: 4541C030A04319AFEB11DFA4CC84FDDB7B9EB48704F1080A5E6589B284DB71E944CF90
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(IPHLPAPI.DLL,?,?,?,?,1102E011,?,?,11194244,Trying to get mac addr for %u.%u.%u.%u,?,000000FF,?,?), ref: 1112B295
                                                                                                          • GetProcAddress.KERNEL32(00000000,SendARP), ref: 1112B2AE
                                                                                                          • wsprintfA.USER32 ref: 1112B2FB
                                                                                                          • wsprintfA.USER32 ref: 1112B313
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,1102E011), ref: 1112B328
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Librarywsprintf$AddressFreeLoadProc
                                                                                                          • String ID: %02x$IPHLPAPI.DLL$SendARP
                                                                                                          • API String ID: 435568443-4085816232
                                                                                                          • Opcode ID: 059c12f073bdf147a91715eca9bcb01dfedc32bce9f3742e1109da8ce792d870
                                                                                                          • Instruction ID: 7d96227945af9bb0c0fa81f266df54215dce15e5fec16fb5673a6d202f8b9dc6
                                                                                                          • Opcode Fuzzy Hash: 059c12f073bdf147a91715eca9bcb01dfedc32bce9f3742e1109da8ce792d870
                                                                                                          • Instruction Fuzzy Hash: 87216D75E001299BCB14CFA6CD85AEEFBB8FF8D614F550118EC14A3300E635AE05CBA4
                                                                                                          APIs
                                                                                                          • _free.LIBCMT ref: 11037267
                                                                                                            • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                                            • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                                          • _free.LIBCMT ref: 1103728F
                                                                                                          • _strncpy.LIBCMT ref: 110372BB
                                                                                                          • _strncpy.LIBCMT ref: 110372F8
                                                                                                          • _malloc.LIBCMT ref: 11037332
                                                                                                          • _strncpy.LIBCMT ref: 11037343
                                                                                                          • _strncpy.LIBCMT ref: 11037383
                                                                                                          • _malloc.LIBCMT ref: 110373B6
                                                                                                          • _strncpy.LIBCMT ref: 110373CC
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: _strncpy$_free_malloc$ErrorFreeHeapLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 1102513549-0
                                                                                                          • Opcode ID: 49d6ee828f48e7441e9132c75d4151723e4ca8f50ebe71d103648970c0ae2386
                                                                                                          • Instruction ID: 5b3f98012d02b14c7d353fffc6174d10c2b98c6782d71c8fdc241da8d4ec8af6
                                                                                                          • Opcode Fuzzy Hash: 49d6ee828f48e7441e9132c75d4151723e4ca8f50ebe71d103648970c0ae2386
                                                                                                          • Instruction Fuzzy Hash: 5A5152B5D04225AFDB20CF74CD84BCAFBECAF15348F004595998997240EBB5AA94CFE1
                                                                                                          APIs
                                                                                                          • GetProcAddress.KERNEL32(00000000,11195920), ref: 1100D3A4
                                                                                                          • GetProcAddress.KERNEL32(00000000,11195910), ref: 1100D3B8
                                                                                                          • GetProcAddress.KERNEL32(00000000,11195900), ref: 1100D3CD
                                                                                                          • GetProcAddress.KERNEL32(00000000,111958F0), ref: 1100D3E1
                                                                                                          • GetProcAddress.KERNEL32(00000000,111958E4), ref: 1100D3F5
                                                                                                          • GetProcAddress.KERNEL32(00000000,111958C4), ref: 1100D40A
                                                                                                          • GetProcAddress.KERNEL32(00000000,111958A4), ref: 1100D41E
                                                                                                          • GetProcAddress.KERNEL32(00000000,11195894), ref: 1100D432
                                                                                                          • GetProcAddress.KERNEL32(00000000,11195884), ref: 1100D447
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc
                                                                                                          • String ID:
                                                                                                          • API String ID: 190572456-0
                                                                                                          • Opcode ID: 091c258913195d468f5e27a1e6f31e310fab824e6ee381838cf7674ab6c2accf
                                                                                                          • Instruction ID: 496fda0e4c6754f74ae7accc981fa1b683a1531f66a76574b420f2493807621a
                                                                                                          • Opcode Fuzzy Hash: 091c258913195d468f5e27a1e6f31e310fab824e6ee381838cf7674ab6c2accf
                                                                                                          • Instruction Fuzzy Hash: BC318A719222349FE756CBE5CCD5B7AFFE9A748B19B00417AD42083248E7B46840CF90
                                                                                                          APIs
                                                                                                          • GetStockObject.GDI32(00000007), ref: 11113167
                                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 11113176
                                                                                                          • SetBrushOrgEx.GDI32(?,00000000,00000000,00000000,?,11119DB4,?,00000001,00000001,00000000,1111E6D7,00000000,?,00000000), ref: 11113181
                                                                                                          • GetStockObject.GDI32(00000000), ref: 11113189
                                                                                                          • SelectObject.GDI32(?,00000000), ref: 11113192
                                                                                                          • GetStockObject.GDI32(0000000D), ref: 11113196
                                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 1111319F
                                                                                                          • SelectClipRgn.GDI32(00000000,00000000), ref: 111131B3
                                                                                                          • SelectClipRgn.GDI32(?,?), ref: 111131D5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Object$Select$Stock$Clip$Brush
                                                                                                          • String ID:
                                                                                                          • API String ID: 2690518013-0
                                                                                                          • Opcode ID: 03940d1c13920ebdd2799aeba9173fb3b73a5c49d6e66c97bce195a3b1bf9d70
                                                                                                          • Instruction ID: 6254f714a47a8412abfa64db40702d153c74c152478294c48941108971bda100
                                                                                                          • Opcode Fuzzy Hash: 03940d1c13920ebdd2799aeba9173fb3b73a5c49d6e66c97bce195a3b1bf9d70
                                                                                                          • Instruction Fuzzy Hash: CC114C71604214AFE320EFA9CC88F56F7E8AF48714F114529E698DB294C774E840CF60
                                                                                                          APIs
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                            • Part of subcall function 110B0260: _memset.LIBCMT ref: 110B026C
                                                                                                            • Part of subcall function 110B0260: _memset.LIBCMT ref: 110B029D
                                                                                                            • Part of subcall function 110B0AD0: timeGetTime.WINMM(_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B0AD6
                                                                                                            • Part of subcall function 110B0AD0: timeGetTime.WINMM(111F00F8,111E5C98,?), ref: 110B0BA5
                                                                                                          • WaitForSingleObject.KERNEL32(?,000000FA,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B743D
                                                                                                          • GetDC.USER32(00000000), ref: 110B7481
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000000E), ref: 110B748C
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 110B7497
                                                                                                          • ReleaseDC.USER32(00000000,00000000), ref: 110B74A3
                                                                                                            • Part of subcall function 110B3090: SetEvent.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30A8
                                                                                                            • Part of subcall function 110B3090: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,110B7594), ref: 110B30B5
                                                                                                            • Part of subcall function 110B3090: CloseHandle.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30C8
                                                                                                            • Part of subcall function 110B3090: CloseHandle.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30D5
                                                                                                            • Part of subcall function 110B3090: WaitForSingleObject.KERNEL32(?,000003E8,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30F3
                                                                                                            • Part of subcall function 110B3090: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,110B7594), ref: 110B3100
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandle$CapsDeviceObjectSingleTimeWait_memsettime$EventRelease__wcstoi64
                                                                                                          • String ID: TraceScrape$_debug
                                                                                                          • API String ID: 2936113293-4091781993
                                                                                                          • Opcode ID: 9cdd8e8a5d521a6398e64c309cb34abd0cea1cc8d3252b81e48429c5feacb1e5
                                                                                                          • Instruction ID: 6857b597a808110f0f281143ea82df92f461d6df4c4e0b5b1330fe4484300919
                                                                                                          • Opcode Fuzzy Hash: 9cdd8e8a5d521a6398e64c309cb34abd0cea1cc8d3252b81e48429c5feacb1e5
                                                                                                          • Instruction Fuzzy Hash: E941A679E042469BDB05CFB4C8D4FAFBBB5EB84704F1941ADE905AB285DA70EC04C7A4
                                                                                                          APIs
                                                                                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 11027053
                                                                                                          • TranslateMessage.USER32(?), ref: 11027081
                                                                                                          • DispatchMessageA.USER32(?), ref: 1102708B
                                                                                                          • Sleep.KERNEL32(000003E8), ref: 11027114
                                                                                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1102717A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Message$DispatchSleepTranslate
                                                                                                          • String ID: Bridge$BridgeThread::Attempting to open bridge...
                                                                                                          • API String ID: 3237117195-3850961587
                                                                                                          • Opcode ID: 0527f6f062edf77291c750114b7d9886b355368a75c305f9b203373b5eaba6dc
                                                                                                          • Instruction ID: 926780c6f4d8c8949c1ee256bdfa0d08ed5449f0693c43c0c5ab50156846c558
                                                                                                          • Opcode Fuzzy Hash: 0527f6f062edf77291c750114b7d9886b355368a75c305f9b203373b5eaba6dc
                                                                                                          • Instruction Fuzzy Hash: AB41B475D01626DBEB15CBEDCC84EBEBBB9AB54708F900169E92593244E735E500CBA0
                                                                                                          APIs
                                                                                                          • GetWindowPlacement.USER32(00000000,0000002C,110BFEBC,?,Norm,110BFEBC), ref: 110B90E4
                                                                                                          • MoveWindow.USER32(00000000,110BFEBC,110BFEBC,110BFEBC,110BFEBC,00000001,?,Norm,110BFEBC), ref: 110B9156
                                                                                                          • SetTimer.USER32(00000000,0000050D,000007D0,00000000), ref: 110B91B1
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Window$ErrorExitLastMessageMovePlacementProcessTimerwsprintf
                                                                                                          • String ID: Norm$e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$j CB::OnRemoteSizeNormal(%d, %d, %d, %d)$m_hWnd
                                                                                                          • API String ID: 1092798621-1973987134
                                                                                                          • Opcode ID: bb4fee7a640cddfa8292c04b347aeb0b9ef3b046aecc10af90a567252941b4bf
                                                                                                          • Instruction ID: fa08d4082dbdb83dc84805081e5a13701295f49ac71a08f55a689e0031bf859b
                                                                                                          • Opcode Fuzzy Hash: bb4fee7a640cddfa8292c04b347aeb0b9ef3b046aecc10af90a567252941b4bf
                                                                                                          • Instruction Fuzzy Hash: 6A411DB5B0020AAFDB08DFA4C895EAEF7B5FF88304F104669E519A7644DB30B945CB90
                                                                                                          APIs
                                                                                                            • Part of subcall function 1112A9E0: LoadLibraryA.KERNEL32(ws2_32.dll,00000000,?), ref: 1112AA16
                                                                                                            • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,WSAStartup), ref: 1112AA33
                                                                                                            • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,WSACleanup), ref: 1112AA3D
                                                                                                            • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,socket), ref: 1112AA4B
                                                                                                            • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,closesocket), ref: 1112AA59
                                                                                                            • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,WSAIoctl), ref: 1112AA67
                                                                                                            • Part of subcall function 1112A9E0: FreeLibrary.KERNEL32(00000000), ref: 1112AADC
                                                                                                          • LoadLibraryA.KERNEL32(ws2_32.dll,?,?,00000000), ref: 1112B38A
                                                                                                          • GetProcAddress.KERNEL32(00000000,ntohl), ref: 1112B3A2
                                                                                                          • _calloc.LIBCMT ref: 1112B3AD
                                                                                                          • _free.LIBCMT ref: 1112B44B
                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 1112B462
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$Library$FreeLoad$_calloc_free
                                                                                                          • String ID: ntohl$ws2_32.dll
                                                                                                          • API String ID: 2881363997-4165132517
                                                                                                          • Opcode ID: a62c3fe90116abab52543d5ca7f352ed5c693b003b457ddebdd86233b9ebb92f
                                                                                                          • Instruction ID: 62f3d354d7df00a53f20e52f5f0b7ab5f0e2fb1a0c0f97b8c5a029639f714dd3
                                                                                                          • Opcode Fuzzy Hash: a62c3fe90116abab52543d5ca7f352ed5c693b003b457ddebdd86233b9ebb92f
                                                                                                          • Instruction Fuzzy Hash: 67318D75E00229CBD7509F64CD80A9AF7B8FF48715F6081A6DC99A7200DF30AA858FD4
                                                                                                          APIs
                                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 1100F3FD
                                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 1100F420
                                                                                                          • std::bad_exception::bad_exception.LIBCMT ref: 1100F4A4
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 1100F4B2
                                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 1100F4C5
                                                                                                          • std::locale::facet::_Facet_Register.LIBCPMT ref: 1100F4DF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                                                                                                          • String ID: bad cast
                                                                                                          • API String ID: 2427920155-3145022300
                                                                                                          • Opcode ID: 01f71cc12634bd0a30440c36912b7c98b47e4755e7b052bf5bdff0cacdfadc3b
                                                                                                          • Instruction ID: 370362221ca7244b6b9d163162d4a533615f3e9481550f6b861c2319f727a088
                                                                                                          • Opcode Fuzzy Hash: 01f71cc12634bd0a30440c36912b7c98b47e4755e7b052bf5bdff0cacdfadc3b
                                                                                                          • Instruction Fuzzy Hash: 1D31A07AD042169FDB11DF94C890BAEF7B8FB04368F51426DEC61A7280DB71AD04CB92
                                                                                                          APIs
                                                                                                          • GetTickCount.KERNEL32 ref: 11105531
                                                                                                          • EnterCriticalSection.KERNEL32 ref: 11105548
                                                                                                          • GetTickCount.KERNEL32 ref: 1110554E
                                                                                                          • GetTickCount.KERNEL32 ref: 111055EB
                                                                                                          • LeaveCriticalSection.KERNEL32(111F060C), ref: 111055F8
                                                                                                          Strings
                                                                                                          • Warning. took %d ms to get simap lock, xrefs: 1110555F
                                                                                                          • Warning. simap lock held for %d ms, xrefs: 11105609
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CountTick$CriticalSection$EnterLeave
                                                                                                          • String ID: Warning. simap lock held for %d ms$Warning. took %d ms to get simap lock
                                                                                                          • API String ID: 956672424-625438208
                                                                                                          • Opcode ID: c1740793aff0a857699f8c8da11d168052976df0f5bdff16eb1b228a2dd960db
                                                                                                          • Instruction ID: 36f89d150e27e685f8f970f5604c93a837ba150e33a3fa1efe54dd65d22fc2b8
                                                                                                          • Opcode Fuzzy Hash: c1740793aff0a857699f8c8da11d168052976df0f5bdff16eb1b228a2dd960db
                                                                                                          • Instruction Fuzzy Hash: BA310475D042999FE315CF64C984F5AFBE6EB08328F154265E866EB290D731EC00CB90
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: InitializeStringUninitializeW@16
                                                                                                          • String ID: HID$PS/2$USB$Win32_PointingDevice
                                                                                                          • API String ID: 1826621714-1320232752
                                                                                                          • Opcode ID: 01f4c2053d6d3d5b188b910352b3af376dde63b9f7c605ac8684b23757ecbe52
                                                                                                          • Instruction ID: ec2d2041e6adeb1d612fb4c2d78acfda5a53ba2d11cec2f487d5e4dde2f70ea0
                                                                                                          • Opcode Fuzzy Hash: 01f4c2053d6d3d5b188b910352b3af376dde63b9f7c605ac8684b23757ecbe52
                                                                                                          • Instruction Fuzzy Hash: BE317075A0061A9BDB24DF54CD457EAB3B8EF08315F0040E9E909AB244EB75FA84CF50
                                                                                                          APIs
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,00000000), ref: 110F12C5
                                                                                                          • GetShortPathNameA.KERNEL32(?,?,00000104), ref: 110F12DA
                                                                                                            • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                                          • CreateFileA.KERNEL32(?,00000000,00000000,00000000,00000000,04000000,00000000), ref: 110F1333
                                                                                                          • CreateFileA.KERNEL32(?,00000000,00000000,00000000,00000000,04000000,00000000), ref: 110F1378
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: File$CreateName$ModulePathShort_strrchr
                                                                                                          • String ID: \\.\$nsmvxd.386$pcdvxd.386
                                                                                                          • API String ID: 1318148156-3179819359
                                                                                                          • Opcode ID: 2f41f20b5722acf40c0130390847ae355a62842386f7592ccd3cf37bf6e28cb4
                                                                                                          • Instruction ID: ccc4368b31194543ced42f6667aa0c2d7b9d0de7acad865b100199d2ac62ce57
                                                                                                          • Opcode Fuzzy Hash: 2f41f20b5722acf40c0130390847ae355a62842386f7592ccd3cf37bf6e28cb4
                                                                                                          • Instruction Fuzzy Hash: E431C171A44725AFD724DF64D891B96F7F5EB08708F008168E2B88B6C0D3B1B984CB94
                                                                                                          APIs
                                                                                                          • SetForegroundWindow.USER32(00000000), ref: 1115F12E
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          • SystemParametersInfoA.USER32(00002000,00000000,00000001,00000000), ref: 1115F14F
                                                                                                          • SystemParametersInfoA.USER32(00002001,00000000,00000000,00000000), ref: 1115F15C
                                                                                                          • SetForegroundWindow.USER32(00000000), ref: 1115F162
                                                                                                          • SystemParametersInfoA.USER32(00002001,00000000,00000001,00000000), ref: 1115F177
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: InfoParametersSystem$ForegroundWindow$ErrorExitLastMessageProcesswsprintf
                                                                                                          • String ID: ..\ctl32\wndclass.cpp$m_hWnd
                                                                                                          • API String ID: 3960414890-2201682149
                                                                                                          • Opcode ID: a1720cd828d96b31de3ae11535927becd6a6cc7cf2a6108b9844e59effaa0828
                                                                                                          • Instruction ID: 490c9e9faa58dc1df28f1acf4c3aa341e93c1bd023cf24429d0d7fa3412acb83
                                                                                                          • Opcode Fuzzy Hash: a1720cd828d96b31de3ae11535927becd6a6cc7cf2a6108b9844e59effaa0828
                                                                                                          • Instruction Fuzzy Hash: 8F01F276790318BBE30096A9CC86F55F398EB54B14F104126F718AA1C0DAF1B851C7E1
                                                                                                          APIs
                                                                                                          • LoadMenuA.USER32(00000000,00002EFF), ref: 1100338E
                                                                                                          • GetSubMenu.USER32(00000000,00000000), ref: 110033BA
                                                                                                          • GetSubMenu.USER32(00000000,00000000), ref: 110033DC
                                                                                                          • DestroyMenu.USER32(00000000), ref: 110033EA
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Menu$DestroyErrorExitLastLoadMessageProcesswsprintf
                                                                                                          • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                                          • API String ID: 468487828-934300333
                                                                                                          • Opcode ID: 8af01ad4efa7446add9b372c4420e91d6a3bebcd66f8e1993f70f2b692afa4a5
                                                                                                          • Instruction ID: f68e039685e14a294959d37ff9e7a7cb7630811a32528fcef7aaec2fda1b7dd6
                                                                                                          • Opcode Fuzzy Hash: 8af01ad4efa7446add9b372c4420e91d6a3bebcd66f8e1993f70f2b692afa4a5
                                                                                                          • Instruction Fuzzy Hash: 2FF0E93AF8466933E312A1F53C85F5BE74C9B515ECF450031F528EAA80EE54A80041AA
                                                                                                          APIs
                                                                                                          • LoadMenuA.USER32(00000000,00002EF9), ref: 1100329D
                                                                                                          • GetSubMenu.USER32(00000000,00000000), ref: 110032C3
                                                                                                          • GetMenuItemCount.USER32(00000000), ref: 110032E7
                                                                                                          • DestroyMenu.USER32(00000000), ref: 110032F9
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Menu$CountDestroyErrorExitItemLastLoadMessageProcesswsprintf
                                                                                                          • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                                          • API String ID: 4241058051-934300333
                                                                                                          • Opcode ID: f8a0d47e41078153cbecec3a6fa3cf51a8fd2ba3eb994fe06476dedbffd054b5
                                                                                                          • Instruction ID: ea916ae31ccda8615c5aa97c2145fcab3b24ed556d1c3993920dd856584db00e
                                                                                                          • Opcode Fuzzy Hash: f8a0d47e41078153cbecec3a6fa3cf51a8fd2ba3eb994fe06476dedbffd054b5
                                                                                                          • Instruction Fuzzy Hash: F8F02E3EE945BA73D31266F53C0DF8BFA584F526ACB060030F434FA645EE14A40081A6
                                                                                                          APIs
                                                                                                          • GetClientRect.USER32(?,00000000), ref: 11119200
                                                                                                          • ClientToScreen.USER32(?,?), ref: 11119241
                                                                                                          • GetCursorPos.USER32(?), ref: 111192A1
                                                                                                          • GetTickCount.KERNEL32 ref: 111192B6
                                                                                                          • GetTickCount.KERNEL32 ref: 11119337
                                                                                                          • WindowFromPoint.USER32(?,?,?,?), ref: 1111939A
                                                                                                          • WindowFromPoint.USER32(000000FF,?), ref: 111193AE
                                                                                                          • SetCursorPos.USER32(000000FF,?,?,?), ref: 111193C2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ClientCountCursorFromPointTickWindow$RectScreen
                                                                                                          • String ID:
                                                                                                          • API String ID: 4245181967-0
                                                                                                          • Opcode ID: 838e7dc6d1b1be8e942fea838f017d3d945d3eacabb2bdd9570b2d4d2d73d52c
                                                                                                          • Instruction ID: c3d26e7f0e5f190f00e8d03b3c013bb68f2031b9d5661d68f26c10068d749f7e
                                                                                                          • Opcode Fuzzy Hash: 838e7dc6d1b1be8e942fea838f017d3d945d3eacabb2bdd9570b2d4d2d73d52c
                                                                                                          • Instruction Fuzzy Hash: 6391F6B5A0060A9FDB14DFB4D588AEEF7F5FB88314F10452ED86A9B244E735B841CB60
                                                                                                          APIs
                                                                                                          • GetWindowTextA.USER32(?,?,00000050), ref: 11025176
                                                                                                          • _strncat.LIBCMT ref: 1102518B
                                                                                                          • SetWindowTextA.USER32(?,?), ref: 11025198
                                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                          • GetDlgItemTextA.USER32(?,00001395,?,00000040), ref: 11025224
                                                                                                          • GetDlgItemTextA.USER32(?,00001397,?,00000040), ref: 11025238
                                                                                                          • SetDlgItemTextA.USER32(?,00001397,?), ref: 11025250
                                                                                                          • SetDlgItemTextA.USER32(?,00001395,?), ref: 11025262
                                                                                                          • SetFocus.USER32(?), ref: 11025265
                                                                                                            • Part of subcall function 11024C70: GetDlgItem.USER32(?,?), ref: 11024CC0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Text$Item$Window$Focus_malloc_memset_strncatwsprintf
                                                                                                          • String ID:
                                                                                                          • API String ID: 3832070631-0
                                                                                                          • Opcode ID: 60fab7655721e0b3046f2d3ba99d2d3761f65fbfa148eacead4071a3fd212dff
                                                                                                          • Instruction ID: 7712de199883e751ea03bfa735f50b434bc7bb1cc5edca5bff12a9cf5cd7df4a
                                                                                                          • Opcode Fuzzy Hash: 60fab7655721e0b3046f2d3ba99d2d3761f65fbfa148eacead4071a3fd212dff
                                                                                                          • Instruction Fuzzy Hash: 0E4192B5A10359ABE710DB74CC45BBAF7F8FB44714F01452AE61AD76C0EAB4A904CB50
                                                                                                          APIs
                                                                                                            • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(111ED708,C213C15D,1110EDDD,00000000,00000000,00000000,E8111B5E,111825D3,000000FF,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000), ref: 1107602E
                                                                                                            • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(0000000C,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,C213C15D,00000000,00000001,00000000,00000000,1118A168,000000FF), ref: 11076097
                                                                                                            • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(00000024,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,C213C15D,00000000,00000001,00000000,00000000,1118A168,000000FF), ref: 1107609D
                                                                                                            • Part of subcall function 11075FE0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,C213C15D,00000000,00000001,00000000,00000000), ref: 110760A7
                                                                                                            • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(000004D0,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,C213C15D,00000000,00000001,00000000,00000000), ref: 110760FC
                                                                                                            • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(000004F8,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,C213C15D,00000000,00000001,00000000,00000000), ref: 11076105
                                                                                                          • LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1105759C
                                                                                                          • GetProcAddress.KERNEL32(00000000,WTSGetActiveConsoleSessionId), ref: 110575E1
                                                                                                          • SetLastError.KERNEL32(00000078), ref: 110575F4
                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 110575FF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalInitializeSection$Library$AddressCreateErrorEventFreeLastLoadProc
                                                                                                          • String ID: Kernel32.dll$WTSGetActiveConsoleSessionId
                                                                                                          • API String ID: 3780373956-3165951319
                                                                                                          • Opcode ID: 13b000d7faa6fd9acbdfe3c5b590adeb65eceb06c65d3f1f2622c8f441c886b5
                                                                                                          • Instruction ID: 5b2845002196474fabc536bb645ff26533f5159a1a467828fb1dae30e08bae14
                                                                                                          • Opcode Fuzzy Hash: 13b000d7faa6fd9acbdfe3c5b590adeb65eceb06c65d3f1f2622c8f441c886b5
                                                                                                          • Instruction Fuzzy Hash: C47149B4A01215AFDB10CFAAC8C0E9AFBF9FF88314F24819AE91597314D771A941CF64
                                                                                                          APIs
                                                                                                          • EnterCriticalSection.KERNEL32(?,C213C15D,75BF7CB0,75BF7AA0,?,75BF7CB0,75BF7AA0), ref: 11071554
                                                                                                          • LeaveCriticalSection.KERNEL32(?), ref: 11071568
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          • LeaveCriticalSection.KERNEL32(00000000,?,?), ref: 110716E1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$Leave$EnterErrorExitLastMessageProcesswsprintf
                                                                                                          • String ID: ..\ctl32\Connect.cpp$Register NC_CHATEX for conn=%s, q=%p$queue$r->queue != queue
                                                                                                          • API String ID: 624642848-3840833929
                                                                                                          • Opcode ID: 0c8d2ced26a2bd08ab4c29fa8ca54adca0efbc1028afe9b50eb6db0bcfa7742a
                                                                                                          • Instruction ID: f6d3c874c1d1c48a5cbc4b1d223e4c094ec3a892b4c0f1e6412567ed65325da8
                                                                                                          • Opcode Fuzzy Hash: 0c8d2ced26a2bd08ab4c29fa8ca54adca0efbc1028afe9b50eb6db0bcfa7742a
                                                                                                          • Instruction Fuzzy Hash: F061C775E04285DFD715CF68C480FAABBF6FB08318F0985A9E8968B2C1D774E944CB94
                                                                                                          APIs
                                                                                                            • Part of subcall function 110CEC60: CreateDialogParamA.USER32(00000000,?,1112D7C9,110CBCD0,00000000), ref: 110CECF1
                                                                                                            • Part of subcall function 110CEC60: GetLastError.KERNEL32 ref: 110CEE49
                                                                                                            • Part of subcall function 110CEC60: wsprintfA.USER32 ref: 110CEE78
                                                                                                            • Part of subcall function 11142DD0: _memset.LIBCMT ref: 11142DF9
                                                                                                            • Part of subcall function 11142DD0: GetVersionExA.KERNEL32(?), ref: 11142E12
                                                                                                          • GetWindowLongA.USER32(?,000000EC), ref: 110931C9
                                                                                                          • SetWindowLongA.USER32(?,000000EC,00000000), ref: 110931F7
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          • GetWindowLongA.USER32(?,000000F0), ref: 11093220
                                                                                                          • SetWindowLongA.USER32(?,000000F0,00000000), ref: 1109324E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: LongWindow$ErrorLastwsprintf$CreateDialogExitMessageParamProcessVersion_memset
                                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                          • API String ID: 3136964118-2830328467
                                                                                                          • Opcode ID: fb6c2165198b052ed1adde41c8e51930884ee91b5ce78e92da16114a67f0499d
                                                                                                          • Instruction ID: 17cdb21e99cc57644c55c5a770e75091ec79e40792fa9a2895745f392d232910
                                                                                                          • Opcode Fuzzy Hash: fb6c2165198b052ed1adde41c8e51930884ee91b5ce78e92da16114a67f0499d
                                                                                                          • Instruction Fuzzy Hash: AF31E475B04609ABC324CFA5DC95FE7B3E5BB88718F10862CF56A976D0DA34B840CB54
                                                                                                          APIs
                                                                                                          • _malloc.LIBCMT ref: 111370A6
                                                                                                          • _free.LIBCMT ref: 111370DD
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                          • _free.LIBCMT ref: 1113716D
                                                                                                            • Part of subcall function 1110F270: InterlockedDecrement.KERNEL32(?), ref: 1110F278
                                                                                                          • _free.LIBCMT ref: 1113713E
                                                                                                            • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                                            • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: _free$DecrementErrorFreeHeapInterlockedLast__wcstoi64_malloc
                                                                                                          • String ID: *HelpReqServer$Client
                                                                                                          • API String ID: 1390041139-3616015116
                                                                                                          • Opcode ID: 71aa43b1dfc4152375353722706e6e213d6d63b076ebc57cc88b85f2b8b4d0b4
                                                                                                          • Instruction ID: 8e3468a70864abf3cc9909560d123acfb2a7f2167445c6f0ed38d11247114e31
                                                                                                          • Opcode Fuzzy Hash: 71aa43b1dfc4152375353722706e6e213d6d63b076ebc57cc88b85f2b8b4d0b4
                                                                                                          • Instruction Fuzzy Hash: 6B313877B001156BDB00DE58DC81BAEF3A9EF88325F154169ED04AB380D675F904C7D5
                                                                                                          APIs
                                                                                                          • PlaySoundA.WINMM(1000,50,00000000,00020001), ref: 11143451
                                                                                                            • Part of subcall function 11163A2D: __isdigit_l.LIBCMT ref: 11163A52
                                                                                                          • Beep.KERNEL32(00000000,00000000), ref: 11143415
                                                                                                          • MessageBeep.USER32(00000000), ref: 11143427
                                                                                                          • MessageBeep.USER32(-00000010), ref: 1114343B
                                                                                                          • MessageBeep.USER32(00000000), ref: 1114345D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Beep$Message$PlaySound__isdigit_l
                                                                                                          • String ID: 1000,50
                                                                                                          • API String ID: 3904670044-1941404556
                                                                                                          • Opcode ID: c2824c85be99af7b01869709431b37e6f937a4a8314b06dcce6d67a3277ac74e
                                                                                                          • Instruction ID: 938a5c7d7fad482dacf885287002a424905fd2e62ab59dfe834b6d95de8c57fd
                                                                                                          • Opcode Fuzzy Hash: c2824c85be99af7b01869709431b37e6f937a4a8314b06dcce6d67a3277ac74e
                                                                                                          • Instruction Fuzzy Hash: 93216D66A6C6B272E60105746D847FFFF5E8F81E69F184074E87DC6982EB26E016C321
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: wsprintf
                                                                                                          • String ID: ..\CTL32\configplus.cpp$result <= buflen
                                                                                                          • API String ID: 2111968516-413741496
                                                                                                          • Opcode ID: 1e75b457f82be356380a80b6451298dc34942034e65cfc81e57d19b8d6e8b9c2
                                                                                                          • Instruction ID: 66cd83cde6406eed73dadf9a29febb3e9e016d9ffe8428f4573ae4edc325b04e
                                                                                                          • Opcode Fuzzy Hash: 1e75b457f82be356380a80b6451298dc34942034e65cfc81e57d19b8d6e8b9c2
                                                                                                          • Instruction Fuzzy Hash: 8E21DB75E041669BC301CF389C84DEE77ED9FC5369B14C251FDA69B685E631E904C390
                                                                                                          APIs
                                                                                                          • GetForegroundWindow.USER32(75BF7AA0,?,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC), ref: 110B9017
                                                                                                          • GetCursorPos.USER32(110BFEBC), ref: 110B9026
                                                                                                            • Part of subcall function 1115E6F0: GetWindowRect.USER32(?,?), ref: 1115E70C
                                                                                                          • PtInRect.USER32(110BFEBC,110BFEBC,110BFEBC), ref: 110B9044
                                                                                                          • ClientToScreen.USER32(?,110BFEBC), ref: 110B9066
                                                                                                          • SetCursorPos.USER32(110BFEBC,110BFEBC,?,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC), ref: 110B9074
                                                                                                          • LoadCursorA.USER32(00000000,00007F00), ref: 110B9081
                                                                                                          • SetCursor.USER32(00000000,?,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC), ref: 110B9088
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Cursor$RectWindow$ClientForegroundLoadScreen
                                                                                                          • String ID:
                                                                                                          • API String ID: 3235510773-0
                                                                                                          • Opcode ID: 49be05b7fef80b05594cc908f0611ebf12c6680a206dc75da7e7ca7dce7ec318
                                                                                                          • Instruction ID: ad301b5eb86ee9d8d5bbe419ceb9c49b4424cf1b2c79503272c3df1ff599c8d2
                                                                                                          • Opcode Fuzzy Hash: 49be05b7fef80b05594cc908f0611ebf12c6680a206dc75da7e7ca7dce7ec318
                                                                                                          • Instruction Fuzzy Hash: 8C112EB5E1421A9FCB08DFB4C884DBFF7B8FB84305B108669E52297244DB34E905CBA4
                                                                                                          APIs
                                                                                                          • InterlockedDecrement.KERNEL32(?), ref: 1100B280
                                                                                                          • EnterCriticalSection.KERNEL32(?,?,1100BE6B,?,00000000,00000002), ref: 1100B2B9
                                                                                                          • EnterCriticalSection.KERNEL32(?,?,1100BE6B,?,00000000,00000002), ref: 1100B2D8
                                                                                                            • Part of subcall function 1100A1D0: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,?), ref: 1100A1EE
                                                                                                            • Part of subcall function 1100A1D0: DeviceIoControl.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?), ref: 1100A218
                                                                                                            • Part of subcall function 1100A1D0: GetLastError.KERNEL32 ref: 1100A220
                                                                                                            • Part of subcall function 1100A1D0: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1100A234
                                                                                                            • Part of subcall function 1100A1D0: CloseHandle.KERNEL32(00000000), ref: 1100A23B
                                                                                                          • waveOutUnprepareHeader.WINMM(00000000,?,00000020,?,1100BE6B,?,00000000,00000002), ref: 1100B2E8
                                                                                                          • LeaveCriticalSection.KERNEL32(?,?,1100BE6B,?,00000000,00000002), ref: 1100B2EF
                                                                                                          • _free.LIBCMT ref: 1100B2F8
                                                                                                          • _free.LIBCMT ref: 1100B2FE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$Enter_free$CloseControlCreateDecrementDeviceErrorEventHandleHeaderInterlockedLastLeaveObjectSingleUnprepareWaitwave
                                                                                                          • String ID:
                                                                                                          • API String ID: 705253285-0
                                                                                                          • Opcode ID: 79ddf153cfec84683290dd42533ea7b8c8eeaab96dddec7867e8baf6a8b692f2
                                                                                                          • Instruction ID: 1708c8f2d16fe6171f6400e7ced1c046c931d624ac1b1599b235a4591b72ed62
                                                                                                          • Opcode Fuzzy Hash: 79ddf153cfec84683290dd42533ea7b8c8eeaab96dddec7867e8baf6a8b692f2
                                                                                                          • Instruction Fuzzy Hash: 06117075904719ABE711CE70CC88BEFB3ECEB48399F000529FA6656144D774B545CB61
                                                                                                          APIs
                                                                                                          • _memset.LIBCMT ref: 1101D0FE
                                                                                                          • LoadIconA.USER32(00000000,0000139A), ref: 1101D14F
                                                                                                          • LoadCursorA.USER32(00000000,00007F00), ref: 1101D15F
                                                                                                          • RegisterClassExA.USER32(00000030), ref: 1101D181
                                                                                                          • GetLastError.KERNEL32 ref: 1101D187
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Load$ClassCursorErrorIconLastRegister_memset
                                                                                                          • String ID: 0
                                                                                                          • API String ID: 430917334-4108050209
                                                                                                          • Opcode ID: a999cde5bf51422c53d54c5e2b81da0a739011e508cf178ac43a94cfc9df5e13
                                                                                                          • Instruction ID: 594e7871e039520b7580a936d726e641a3743c14917196a6b4ce4aa29f199296
                                                                                                          • Opcode Fuzzy Hash: a999cde5bf51422c53d54c5e2b81da0a739011e508cf178ac43a94cfc9df5e13
                                                                                                          • Instruction Fuzzy Hash: 9C018C74C1431DABEF00EFF0C899BDEFBB8AB04708F104029E521BA284E7BA51048F95
                                                                                                          APIs
                                                                                                          • LoadMenuA.USER32(00000000,00002EFD), ref: 1100331D
                                                                                                          • GetSubMenu.USER32(00000000,00000000), ref: 11003343
                                                                                                          • DestroyMenu.USER32(00000000), ref: 11003372
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Menu$DestroyErrorExitLastLoadMessageProcesswsprintf
                                                                                                          • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                                          • API String ID: 468487828-934300333
                                                                                                          • Opcode ID: e42f28694fc46f4086300125048bfedf8bbbd82d4e050df1718e76ccc8693524
                                                                                                          • Instruction ID: e80103f9713123d07a9bceb05cb6f887813353322251b2c4d1aa2998eabbc516
                                                                                                          • Opcode Fuzzy Hash: e42f28694fc46f4086300125048bfedf8bbbd82d4e050df1718e76ccc8693524
                                                                                                          • Instruction Fuzzy Hash: E5F0A73EF9466933D31666F53D1AF4BAB485B815ACB060031F524EA740EE14B4018166
                                                                                                          APIs
                                                                                                          • OpenThread.KERNEL32(0000004A,00000000,11147278,?,?,?,?,?,11147278), ref: 1114713A
                                                                                                          • CreateThread.KERNEL32(00000000,00001000,111470B0,?,00000000,?), ref: 1114715E
                                                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,11147278), ref: 11147169
                                                                                                          • GetExitCodeThread.KERNEL32(00000000,00000000,?,?,?,?,?,?,11147278), ref: 11147174
                                                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,11147278), ref: 11147181
                                                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,11147278), ref: 11147187
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Thread$CloseHandle$CodeCreateExitObjectOpenSingleWait
                                                                                                          • String ID:
                                                                                                          • API String ID: 180989782-0
                                                                                                          • Opcode ID: f968cd3be34acbbfc001fc2c5c2cf1c984ef6abb93f92428a018694f843edebd
                                                                                                          • Instruction ID: 262247fb5796f255492f056fed215dfab2d13c04184fcb9cbdc2136a2e7489e8
                                                                                                          • Opcode Fuzzy Hash: f968cd3be34acbbfc001fc2c5c2cf1c984ef6abb93f92428a018694f843edebd
                                                                                                          • Instruction Fuzzy Hash: 6901FA75D14219ABDB04DFA8C845BAEBBB8EF08710F108166F924E7284D774AA018B91
                                                                                                          APIs
                                                                                                          • SetEvent.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30A8
                                                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,110B7594), ref: 110B30B5
                                                                                                          • CloseHandle.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30C8
                                                                                                          • CloseHandle.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30D5
                                                                                                          • WaitForSingleObject.KERNEL32(?,000003E8,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30F3
                                                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,110B7594), ref: 110B3100
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandle$EventObjectSingleWait
                                                                                                          • String ID:
                                                                                                          • API String ID: 2857295742-0
                                                                                                          • Opcode ID: de728af195af138cefa6dff90218103564fc584f7cc06855e29f8d807c559bfa
                                                                                                          • Instruction ID: 8ed48fa67f8c8c814876f8dc7215a606f8693e2702a4d531ac155f54366f369e
                                                                                                          • Opcode Fuzzy Hash: de728af195af138cefa6dff90218103564fc584f7cc06855e29f8d807c559bfa
                                                                                                          • Instruction Fuzzy Hash: 46011A75A087049BE7A0DFB988D4A96F7ECEF58300F11592EE5AAC3200CB78B8448F50
                                                                                                          APIs
                                                                                                          • MapWindowPoints.USER32(?,00000000,?,00000002), ref: 1107712B
                                                                                                            • Part of subcall function 11076470: DeferWindowPos.USER32(8B000EA9,00000000,D8E85BC0,33CD335E,?,00000000,33CD335E,110771C6), ref: 110764B3
                                                                                                          • EqualRect.USER32(?,?), ref: 1107713C
                                                                                                          • SetWindowPos.USER32(00000000,00000000,?,33CD335E,D8E85BC0,8B000EA9,00000014,?,?,?,?,?,1107731A,00000000,?), ref: 11077196
                                                                                                          Strings
                                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11077172
                                                                                                          • m_hWnd, xrefs: 11077177
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Window$DeferEqualPointsRect
                                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                          • API String ID: 2754115966-2830328467
                                                                                                          • Opcode ID: 99985b2635142920f8b9c22496a84f2b0050643658386b35a5a33d160634cd24
                                                                                                          • Instruction ID: 41b5b1a8551b5e1f2f99f8414896ea4fcac58e3e889cf17ca758b789060a613c
                                                                                                          • Opcode Fuzzy Hash: 99985b2635142920f8b9c22496a84f2b0050643658386b35a5a33d160634cd24
                                                                                                          • Instruction Fuzzy Hash: E0413EB5A006099FDB14CFA9C884EAAFBF5FF88704F108559E9559B344D770AD00CBA4
                                                                                                          APIs
                                                                                                          • FindResourceA.KERNEL32(00000000,00001770,0000000A), ref: 1108918F
                                                                                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000,?,110CEF56,?), ref: 110891A4
                                                                                                          • LockResource.KERNEL32(00000000,?,00000000,?,110CEF56,?), ref: 110891D6
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Resource$FindLoadLock
                                                                                                          • String ID: ..\ctl32\Errorhan.cpp$hMap
                                                                                                          • API String ID: 2752051264-327499879
                                                                                                          • Opcode ID: 822e2482afd153fa47cf4ddbc35e772a2b3a06937125cb698dae634270013ce3
                                                                                                          • Instruction ID: ac104577f0cb8d44e6482e86c7e4f76e51294e6aac98140987b3b76ba3c25106
                                                                                                          • Opcode Fuzzy Hash: 822e2482afd153fa47cf4ddbc35e772a2b3a06937125cb698dae634270013ce3
                                                                                                          • Instruction Fuzzy Hash: 08110D3AF4C22556DB12EBE9AC45B69B7E89BC07A8B410475FC6CD71C4FA61D440C3E1
                                                                                                          APIs
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000), ref: 1114314B
                                                                                                          • _strrchr.LIBCMT ref: 1114315A
                                                                                                          • _strrchr.LIBCMT ref: 1114316A
                                                                                                          • wsprintfA.USER32 ref: 11143185
                                                                                                            • Part of subcall function 111456A0: GetModuleHandleA.KERNEL32(NSMTRACE,11194AB8), ref: 111456BA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Module_strrchr$FileHandleNamewsprintf
                                                                                                          • String ID: BILD
                                                                                                          • API String ID: 2529650285-1114602597
                                                                                                          • Opcode ID: 832b53a00f043e857d3b8e09e9a2ce5d770147cd639c4bf1822df3017942b825
                                                                                                          • Instruction ID: d978b5afe12e8555e920acd6faf46f6bc40337599c773746d871781ff4fb06a8
                                                                                                          • Opcode Fuzzy Hash: 832b53a00f043e857d3b8e09e9a2ce5d770147cd639c4bf1822df3017942b825
                                                                                                          • Instruction Fuzzy Hash: DD21DD31A182698FE712EF348D407DAFBB4DF15B0CF2000D8D8850B182D7716885C7A0
                                                                                                          APIs
                                                                                                          • GetProfileStringA.KERNEL32(Windows,Device,No default printer,,LPT1:,?,00000050), ref: 11065366
                                                                                                          • _memmove.LIBCMT ref: 110653B1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ProfileString_memmove
                                                                                                          • String ID: Device$No default printer,,LPT1:$Windows
                                                                                                          • API String ID: 1665476579-2460060945
                                                                                                          • Opcode ID: b42f47fad53366f1e4ac447008a1a2d6fd591c8f9db6545ab0f545fe689f24a8
                                                                                                          • Instruction ID: a358cf5610f4a81608be9fe47ec1da84b056d0ceaed1d9bd2f397f709d6f9fc8
                                                                                                          • Opcode Fuzzy Hash: b42f47fad53366f1e4ac447008a1a2d6fd591c8f9db6545ab0f545fe689f24a8
                                                                                                          • Instruction Fuzzy Hash: 0E119E35D002669AD700CFB0DC45BFEBBACDF01788F144158DC869B240EAF22609C3E1
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: FreeString$__wcsicoll_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 3719176846-0
                                                                                                          • Opcode ID: 441a99ce500d99f467cd7fd3aeec64a7d709f35996a15428944c20697e7ebd2f
                                                                                                          • Instruction ID: f73372903cd30c0382670b71593fb0b3797c4e2875fb117f6f51c869b4ccb2fb
                                                                                                          • Opcode Fuzzy Hash: 441a99ce500d99f467cd7fd3aeec64a7d709f35996a15428944c20697e7ebd2f
                                                                                                          • Instruction Fuzzy Hash: 53A10A75E006299FCB21CF59CC84ADEB7B9AF89305F2045D9E50DAB610DB32AE85CF50
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: FreeString$__wcsicoll_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 3719176846-0
                                                                                                          • Opcode ID: 630363bdb13d22254993ecf68dacbf692c7bf3f03afba6e05313967c32aba816
                                                                                                          • Instruction ID: afd3f22c8fe7dd5f2f13fef18bd13733cf22d578236402d79b842a18f9b7ad91
                                                                                                          • Opcode Fuzzy Hash: 630363bdb13d22254993ecf68dacbf692c7bf3f03afba6e05313967c32aba816
                                                                                                          • Instruction Fuzzy Hash: E3A11871E006299FCB21DF59CC84ADEB7B9AF89305F2041D9E50DAB610DB32AE85CF50
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          • ..\CTL32\DataStream.cpp, xrefs: 1108139E
                                                                                                          • m_iPos=%d, m_nLen=%d, m_nExt=%d, m_pData=%x {%s}, xrefs: 11081387
                                                                                                          • %02x, xrefs: 11081350
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: wsprintf
                                                                                                          • String ID: %02x$..\CTL32\DataStream.cpp$m_iPos=%d, m_nLen=%d, m_nExt=%d, m_pData=%x {%s}
                                                                                                          • API String ID: 2111968516-476189988
                                                                                                          • Opcode ID: 2e0a70d7f48be011b9f6aa9edf4a09ec59e0beebed33c2f057e62bcad71544d0
                                                                                                          • Instruction ID: f12dac7d373f74f5fe212c0395a9fec3f200c40d2e0a4ddded7d9712e57ff33a
                                                                                                          • Opcode Fuzzy Hash: 2e0a70d7f48be011b9f6aa9edf4a09ec59e0beebed33c2f057e62bcad71544d0
                                                                                                          • Instruction Fuzzy Hash: E621A375A052299FD724CF65DCC4EAEB3F8EF44308F0085AEE45A97640D670AD45CB60
                                                                                                          APIs
                                                                                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110253E7
                                                                                                          • GetDlgItem.USER32(?,00001399), ref: 11025421
                                                                                                          • TranslateMessage.USER32(?), ref: 1102543A
                                                                                                          • DispatchMessageA.USER32(?), ref: 11025444
                                                                                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 11025486
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Message$DispatchItemTranslate
                                                                                                          • String ID:
                                                                                                          • API String ID: 1381171329-0
                                                                                                          • Opcode ID: bebdcbb2c02c8b11af5fb3a0b68c2766af8923a7f1998c3c6d7298e063844038
                                                                                                          • Instruction ID: 26246af105c186e59b646e9f33a047c98996dcd180a805fce9500a05ed718ca0
                                                                                                          • Opcode Fuzzy Hash: bebdcbb2c02c8b11af5fb3a0b68c2766af8923a7f1998c3c6d7298e063844038
                                                                                                          • Instruction Fuzzy Hash: 7B21CF70F0030A67E718DB72C885BABF7F8AB4430DF804429EA2696180FB75A441CB95
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: wsprintf$VisibleWindow
                                                                                                          • String ID: %d,%d,%d,%d,%d,%d
                                                                                                          • API String ID: 1671172596-1913222166
                                                                                                          • Opcode ID: 8791ca63a79dced235f4e3776a7ea81ab1c93e4dd005f09928dbe6592e314a28
                                                                                                          • Instruction ID: 208af751730b9df0a36513b51cfb93f89bd03d9f93b9dbce85b9ce09b73d059e
                                                                                                          • Opcode Fuzzy Hash: 8791ca63a79dced235f4e3776a7ea81ab1c93e4dd005f09928dbe6592e314a28
                                                                                                          • Instruction Fuzzy Hash: 465181746001159FD710DB68CC90F9AB7F9BF88708F108698F6599B391DB70ED45CBA0
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          • BltPending skipping Blt, sinceUpdate=%d ms, sinceBlt=%d ms, from=%s, xrefs: 1111706E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CountTick$DeleteObject
                                                                                                          • String ID: BltPending skipping Blt, sinceUpdate=%d ms, sinceBlt=%d ms, from=%s
                                                                                                          • API String ID: 3011517232-3209293507
                                                                                                          • Opcode ID: 3804ad2b8b8d45a3881d6a1d8f9e7176cbf39d2a15b6b3a9b1851c2b4258d80b
                                                                                                          • Instruction ID: 71694b1901628e7c3f0e0f97bec8b89b6520565b9ddb22d4603e25af3e6b7442
                                                                                                          • Opcode Fuzzy Hash: 3804ad2b8b8d45a3881d6a1d8f9e7176cbf39d2a15b6b3a9b1851c2b4258d80b
                                                                                                          • Instruction Fuzzy Hash: 62414F75A00F058FD724CF79CD856ABF7E1FF84219F104A3ED56A9A244EB3565418F00
                                                                                                          APIs
                                                                                                          • GetWindowLongA.USER32(?,000000F0), ref: 11077241
                                                                                                          • CopyRect.USER32(?,00000004), ref: 1107726F
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11077229
                                                                                                          • m_hWnd, xrefs: 1107722E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CopyErrorExitLastLongMessageProcessRectWindowwsprintf
                                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                          • API String ID: 2755825785-2830328467
                                                                                                          • Opcode ID: 52b039dbae3ac474573174c2f07e54e0dc35dacba2b0f62a005c55ea2bccfa41
                                                                                                          • Instruction ID: de278a2cd4c0b5f0839ddad857aefe36ed68345845b5ae66c69d21e7740d687e
                                                                                                          • Opcode Fuzzy Hash: 52b039dbae3ac474573174c2f07e54e0dc35dacba2b0f62a005c55ea2bccfa41
                                                                                                          • Instruction Fuzzy Hash: 3841A331E00A06DBCB14CE68C9C8A5EF7F1FF84344F10C569E86597644EB30E941CB58
                                                                                                          APIs
                                                                                                          • _memmove.LIBCMT ref: 110D1128
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorExitLastMessageProcess_memmovewsprintf
                                                                                                          • String ID: ..\CTL32\NSMString.cpp$IsA()$cchLen<=0 || cchLen<=(int) _tcslen(pszStr)
                                                                                                          • API String ID: 1528188558-323366856
                                                                                                          • Opcode ID: 68b70f9a2bf70a58353feb4a735461465b776518e9ae676a20bb0fc5dc14d86d
                                                                                                          • Instruction ID: cd45fd8f54c028a965d30ceca3f2b81ac61ec80aecbdd09916459db7febd3670
                                                                                                          • Opcode Fuzzy Hash: 68b70f9a2bf70a58353feb4a735461465b776518e9ae676a20bb0fc5dc14d86d
                                                                                                          • Instruction Fuzzy Hash: AE21263EB003476BDB11DE69EC50F9BB7D99FC528CB108498F98887301EE72F4058294
                                                                                                          APIs
                                                                                                          • GetProcAddress.KERNEL32(00000000,0000000E), ref: 1115FFD1
                                                                                                            • Part of subcall function 1115FE60: RegOpenKeyExA.ADVAPI32(80000000,CLSID\{ADB880A6-D8FF-11CF-9377-00AA003B7A11}\InprocServer32,00000000,00020019,?,?), ref: 1115FE98
                                                                                                            • Part of subcall function 1115FE60: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,?,?,?), ref: 1115FED9
                                                                                                            • Part of subcall function 1115FE60: ExpandEnvironmentStringsA.KERNEL32(?,?,00000104), ref: 1115FEFD
                                                                                                            • Part of subcall function 1115FE60: RegCloseKey.ADVAPI32(?), ref: 1115FF2A
                                                                                                          • LoadLibraryA.KERNEL32(?,?,?,?,?), ref: 1115FF93
                                                                                                          • LoadLibraryA.KERNEL32(hhctrl.ocx,?,?,?,?), ref: 1115FFA9
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad$AddressCloseEnvironmentExpandOpenProcQueryStringsValue
                                                                                                          • String ID: hhctrl.ocx
                                                                                                          • API String ID: 1060647816-2298675154
                                                                                                          • Opcode ID: a3853af9b5ec3e1502db0b4bafb9ef45656db84a0f437c905b28bfddd73cca6c
                                                                                                          • Instruction ID: 21cf1aba31526e8ead5fc6aa4b71c903af58d6e9e090c4be98d1d971a6eb0305
                                                                                                          • Opcode Fuzzy Hash: a3853af9b5ec3e1502db0b4bafb9ef45656db84a0f437c905b28bfddd73cca6c
                                                                                                          • Instruction Fuzzy Hash: E911663260826B9BDB84DF65C994BDAF7A8EB4B758B41003FE521D3544EB70D844CB92
                                                                                                          APIs
                                                                                                          • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 110B91EF
                                                                                                          • MoveWindow.USER32(8D111939,?,?,?,?,00000001,?,?,?,?,?,?,?,?,?,110BA3F5), ref: 110B9228
                                                                                                          • SetTimer.USER32(8D111939,0000050D,000007D0,00000000), ref: 110B9260
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: InfoMoveParametersSystemTimerWindow
                                                                                                          • String ID: Max
                                                                                                          • API String ID: 1521622399-2772132969
                                                                                                          • Opcode ID: dd270aeb1ce9957f205ba7153b0c8123e734f44cde7feed230d9f6d1d20fe2b6
                                                                                                          • Instruction ID: cbc035c590c08491bc6b7e29ca505f880cfdd662cf6ac53e8412c44867f4f71a
                                                                                                          • Opcode Fuzzy Hash: dd270aeb1ce9957f205ba7153b0c8123e734f44cde7feed230d9f6d1d20fe2b6
                                                                                                          • Instruction Fuzzy Hash: EA2130B5A40309AFD714CFA4C885FAFF7B8FB48714F10452EE95597380CA70A941CBA0
                                                                                                          APIs
                                                                                                          • IsWindow.USER32(?), ref: 110ED118
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorExitLastMessageProcessWindowwsprintf
                                                                                                          • String ID: ..\CTL32\NSWin32.cpp$IsWindow(hRich)$lpNmHdr!=0
                                                                                                          • API String ID: 2577986331-1331251348
                                                                                                          • Opcode ID: 0130043435edc3a22456987cf30c2144a781c09618dcf41b74824cb74998b838
                                                                                                          • Instruction ID: a6e56e2616b3f757a7bedb7841b960acd04ffc41865bfa7298ab7df9715bb4c1
                                                                                                          • Opcode Fuzzy Hash: 0130043435edc3a22456987cf30c2144a781c09618dcf41b74824cb74998b838
                                                                                                          • Instruction Fuzzy Hash: 85F02735F02126BBC6228E579C09F8EB378CF90BACF0200A4F81C26140E734B51082D5
                                                                                                          APIs
                                                                                                          • _free.LIBCMT ref: 11081417
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorExitLastMessageProcess_freewsprintf
                                                                                                          • String ID: ..\CTL32\DataStream.cpp$IsA()$e:\nsmsrc\nsm\1210\1210f\ctl32\DataStream.h
                                                                                                          • API String ID: 2441568934-1875806619
                                                                                                          • Opcode ID: af1373b32a9bb4e1f8f26d5d02c3c702896290850c3687507677e6fe67b99708
                                                                                                          • Instruction ID: 32575625ee732fca108261b890e952c9fd6c17214e61566243eaf6e55242290c
                                                                                                          • Opcode Fuzzy Hash: af1373b32a9bb4e1f8f26d5d02c3c702896290850c3687507677e6fe67b99708
                                                                                                          • Instruction Fuzzy Hash: D1F0A0BCE086651BD730DE99BC00FCAB7D05F1434CF050498EA8627682DBBA7549C2E6
                                                                                                          APIs
                                                                                                          • RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 1106117C
                                                                                                          • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 110611D4
                                                                                                          • RegEnumValueA.ADVAPI32(?,00000001,?,00000080,00000000,?,?,00000480), ref: 110612C3
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 110612D4
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: EnumValue$CloseOpen
                                                                                                          • String ID:
                                                                                                          • API String ID: 3785232357-0
                                                                                                          • Opcode ID: 385e5134d3de21a01a15670ba88f4417c14cd2c8775287df043cdc8206fa1483
                                                                                                          • Instruction ID: e119b506798adee895546c353bca4cd72f80153627c59e78ac85c5ed933e93b3
                                                                                                          • Opcode Fuzzy Hash: 385e5134d3de21a01a15670ba88f4417c14cd2c8775287df043cdc8206fa1483
                                                                                                          • Instruction Fuzzy Hash: 14412CB190061E9EDB20CB54CC84FDBBBBDAB89305F0045D9E649D7141EA70AA98CFA0
                                                                                                          APIs
                                                                                                          • CreateThread.KERNEL32(00000000,00001000,11027030,00000000,00000000,111ED468), ref: 110291F3
                                                                                                          • Sleep.KERNEL32(00000032,?,1102A9A3,00000000,?,00000000,000001E8,Bridge,LoadOnStartup,00000000,00000000), ref: 11029212
                                                                                                          • PostThreadMessageA.USER32(00000000,00000500,00000000,00000000), ref: 11029234
                                                                                                          • Sleep.KERNEL32(00000032,?,1102A9A3,00000000,?,00000000,000001E8,Bridge,LoadOnStartup,00000000,00000000), ref: 1102923C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: SleepThread$CreateMessagePost
                                                                                                          • String ID:
                                                                                                          • API String ID: 3347742789-0
                                                                                                          • Opcode ID: 7f55f862f45cabdbc49d2828a68d0c06d0eeafcbd3f137c249c1e94448b790d1
                                                                                                          • Instruction ID: 6c329cfe7713c70c74540dd837a6755ec0a493dd99a0e0f492d5b7c5eaff94cf
                                                                                                          • Opcode Fuzzy Hash: 7f55f862f45cabdbc49d2828a68d0c06d0eeafcbd3f137c249c1e94448b790d1
                                                                                                          • Instruction Fuzzy Hash: E831D476D42230ABD602DBDCCC80FAABBA8A755758F914134F9395B6C8D6717805CBD0
                                                                                                          APIs
                                                                                                          • EnterCriticalSection.KERNEL32(0000002C,C213C15D,?,?,00000000,00000000,?,Function_00182078,000000FF,?,1103D500,?,?,?,00000000,C213C15D), ref: 110B325F
                                                                                                          • LeaveCriticalSection.KERNEL32(0000002C,?,1103D500,?,?,?,00000000,C213C15D,?,?,00000000,?,00000015,00000000), ref: 110B329F
                                                                                                          • SetEvent.KERNEL32(?), ref: 110B331A
                                                                                                          • LeaveCriticalSection.KERNEL32(0000002C), ref: 110B3321
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$Leave$EnterEvent
                                                                                                          • String ID:
                                                                                                          • API String ID: 3394196147-0
                                                                                                          • Opcode ID: fd4f52dacf6346c68deca50a419aba338554c765379c0af81f02942a775e7cd5
                                                                                                          • Instruction ID: 1c2cd706bfc580d94f6c8d94d17799be7df3d247d13d912ddb644fcd1bc25a9e
                                                                                                          • Opcode Fuzzy Hash: fd4f52dacf6346c68deca50a419aba338554c765379c0af81f02942a775e7cd5
                                                                                                          • Instruction Fuzzy Hash: FC310575A04B059FD315CF69C884B9AFBE4FB4C314F10866EE85AC7750EB34A854CB90
                                                                                                          APIs
                                                                                                          • EnterCriticalSection.KERNEL32(0000002C,C213C15D,?,?,00000000,00000000,00000000,Function_00182078,000000FF,?,1103D571,?,C213C15D,?,?,00000000), ref: 110B336F
                                                                                                          • LeaveCriticalSection.KERNEL32(0000002C,?,1103D571,?,C213C15D,?,?,00000000,?,00000015,00000000), ref: 110B338E
                                                                                                          • SetEvent.KERNEL32(?,?,?,1103D571,?,C213C15D,?,?,00000000,?,00000015,00000000), ref: 110B33D4
                                                                                                          • LeaveCriticalSection.KERNEL32(0000002C,?,?,1103D571,?,C213C15D,?,?,00000000,?,00000015,00000000), ref: 110B33DB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$Leave$EnterEvent
                                                                                                          • String ID:
                                                                                                          • API String ID: 3394196147-0
                                                                                                          • Opcode ID: e042a88a3925eb2d51153c2a6544309ecf0762f38e12571a01f1b65a48f17828
                                                                                                          • Instruction ID: 2836c68be1e173ca97a40bbc94208784cbdba460b006acea4806f33579668287
                                                                                                          • Opcode Fuzzy Hash: e042a88a3925eb2d51153c2a6544309ecf0762f38e12571a01f1b65a48f17828
                                                                                                          • Instruction Fuzzy Hash: 6221DF76A087089FD315CFA8D884B9AF7E8FB4C715F008A2EE816C7640DB79B404CB94
                                                                                                          APIs
                                                                                                          • LoadCursorA.USER32(00000000,00007F00), ref: 11113252
                                                                                                          • SetCursor.USER32(00000000,?,?,11120606,00000000,00000000,11124B99,00000000,00000000,00000000,00000000,View,BlankAll,00000000,00000000,00000004), ref: 11113259
                                                                                                          • DestroyCursor.USER32(?), ref: 11113270
                                                                                                          • DestroyCursor.USER32(?), ref: 1111327D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Cursor$Destroy$Load
                                                                                                          • String ID:
                                                                                                          • API String ID: 3167891023-0
                                                                                                          • Opcode ID: cf8b1945f01808845252a66b1172c4e509a608c0218fa3bfec4bfdca6e73ac18
                                                                                                          • Instruction ID: a2e30b34d5d2f1c91a37dce4984a5637c3bf472293567a6a29e36ae9608199f7
                                                                                                          • Opcode Fuzzy Hash: cf8b1945f01808845252a66b1172c4e509a608c0218fa3bfec4bfdca6e73ac18
                                                                                                          • Instruction Fuzzy Hash: 5EE09B7091CB009BDB019B798CCC957F7E8BBD4711B20093DE17EC210CC735A4418B10
                                                                                                          APIs
                                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                          • CreateWindowExA.USER32(00000000,edit,00000000,40040004,?,?,?,?,?,00000002,00000000,?), ref: 110072F7
                                                                                                          • SetFocus.USER32(?), ref: 11007353
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CreateFocusWindow_malloc_memsetwsprintf
                                                                                                          • String ID: edit
                                                                                                          • API String ID: 1305092643-2167791130
                                                                                                          • Opcode ID: 9ab5e62bba32fe41a4b3d3dad999fb9395a40b928699cb569382db604b8d03bd
                                                                                                          • Instruction ID: cb86e9af08271205595a6f41abc8b2cb286fac045a185d6d6013f354b30fec65
                                                                                                          • Opcode Fuzzy Hash: 9ab5e62bba32fe41a4b3d3dad999fb9395a40b928699cb569382db604b8d03bd
                                                                                                          • Instruction Fuzzy Hash: 8951B1B6A00606AFE741CF64CC80BABB7E5FB88354F15816DF955C7340EB34E9428B61
                                                                                                          APIs
                                                                                                          • std::_Xinvalid_argument.LIBCPMT ref: 11009265
                                                                                                          • _memmove.LIBCMT ref: 110092B6
                                                                                                            • Part of subcall function 11008D50: std::_Xinvalid_argument.LIBCPMT ref: 11008D6A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Xinvalid_argumentstd::_$_memmove
                                                                                                          • String ID: string too long
                                                                                                          • API String ID: 2168136238-2556327735
                                                                                                          • Opcode ID: 1f1b424e40fb871dbeacd2805d2b31d3ae09b279eb3827a2ae8406d4573c0ed5
                                                                                                          • Instruction ID: 8571876bfdcccba51c928a6a288fcd5c1e124ad980ef247a8f71a2e078b75a0c
                                                                                                          • Opcode Fuzzy Hash: 1f1b424e40fb871dbeacd2805d2b31d3ae09b279eb3827a2ae8406d4573c0ed5
                                                                                                          • Instruction Fuzzy Hash: A731C732B14A104BF720DE9CE88095FF7EDEBE57A4B20061FE599C7640E7719C5083A1
                                                                                                          APIs
                                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                          • std::exception::exception.LIBCMT ref: 1108F38C
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 1108F3A1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                          • String ID: L
                                                                                                          • API String ID: 1338273076-2909332022
                                                                                                          • Opcode ID: 3896e810ab9ec8afa04ae16f69e355a36910fef65e5343e495f94c92c586995c
                                                                                                          • Instruction ID: a4fae97c5fdb08f5bbe7be2be84186cb3cec15bbd065a55e87689edd9833ea14
                                                                                                          • Opcode Fuzzy Hash: 3896e810ab9ec8afa04ae16f69e355a36910fef65e5343e495f94c92c586995c
                                                                                                          • Instruction Fuzzy Hash: E73177B5D04259AFDB10DFA5C880BDEFBF8FB08754F04826DE915A7280D775A904CB51
                                                                                                          APIs
                                                                                                          • std::exception::exception.LIBCMT ref: 11041413
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 11041421
                                                                                                          Strings
                                                                                                          • VolumeControl exception : %hs, xrefs: 11041431
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8Throwstd::exception::exception
                                                                                                          • String ID: VolumeControl exception : %hs
                                                                                                          • API String ID: 3728558374-910296547
                                                                                                          • Opcode ID: 118abbde1ebe4424435f64918357d89c4207cb987e7db87aca0e3b34d3970159
                                                                                                          • Instruction ID: 3351f46422f9e7833a0dd597507e069f064f33e0319a204fc915276dbd9183a5
                                                                                                          • Opcode Fuzzy Hash: 118abbde1ebe4424435f64918357d89c4207cb987e7db87aca0e3b34d3970159
                                                                                                          • Instruction Fuzzy Hash: A721E775F006059FCF01CF65C890BFEF7E8EB49609FA085A9E81697A40DB35B904CBA1
                                                                                                          APIs
                                                                                                          • std::_Xinvalid_argument.LIBCPMT ref: 1100F27B
                                                                                                            • Part of subcall function 111603E3: std::exception::exception.LIBCMT ref: 111603F8
                                                                                                            • Part of subcall function 111603E3: __CxxThrowException@8.LIBCMT ref: 1116040D
                                                                                                            • Part of subcall function 111603E3: std::exception::exception.LIBCMT ref: 1116041E
                                                                                                          • std::_Xinvalid_argument.LIBCPMT ref: 1100F292
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                                                                                                          • String ID: string too long
                                                                                                          • API String ID: 963545896-2556327735
                                                                                                          • Opcode ID: 6b1525799c9edef334f4852062e8405e18519a63a5733119385c965e45330704
                                                                                                          • Instruction ID: bb54faa7590d99a912cddc2b6cd1eeb78aa94a45d21c5f83dac251cd0972bc34
                                                                                                          • Opcode Fuzzy Hash: 6b1525799c9edef334f4852062e8405e18519a63a5733119385c965e45330704
                                                                                                          • Instruction Fuzzy Hash: EE119A377046544FE321D99CE880B6AF7E9EF956A4F20066FE59187650C7A1A84483A2
                                                                                                          APIs
                                                                                                          • ShowWindow.USER32(8D111939,00000009,?,?,?,?,?,?,?,?,?,?,110BA3E6,110BFEBC), ref: 110B92CB
                                                                                                            • Part of subcall function 110B8610: GetSystemMetrics.USER32(0000004C), ref: 110B8642
                                                                                                            • Part of subcall function 110B8610: GetSystemMetrics.USER32(0000004D), ref: 110B8649
                                                                                                            • Part of subcall function 110B8610: GetSystemMetrics.USER32(0000004E), ref: 110B8650
                                                                                                            • Part of subcall function 110B8610: GetSystemMetrics.USER32(0000004F), ref: 110B8657
                                                                                                            • Part of subcall function 110B8610: SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 110B8666
                                                                                                            • Part of subcall function 110B8610: GetSystemMetrics.USER32(?), ref: 110B8674
                                                                                                            • Part of subcall function 110B8610: GetSystemMetrics.USER32(00000001), ref: 110B8683
                                                                                                          • MoveWindow.USER32(8D111939,?,?,?,?,00000001), ref: 110B92F3
                                                                                                          Strings
                                                                                                          • j CB::OnRemoteSizeRestore(%d, %d, %d, %d), xrefs: 110B930D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: System$Metrics$Window$InfoMoveParametersShow
                                                                                                          • String ID: j CB::OnRemoteSizeRestore(%d, %d, %d, %d)
                                                                                                          • API String ID: 2940908497-693965840
                                                                                                          • Opcode ID: eeba164e39b9a206ee0bd13021fe79c14c8f790cdcea3297abcc58d2d41d4cb3
                                                                                                          • Instruction ID: ea8a17caf2cab53e8fa0eb5ee6ebbdabb1f0cf5c0d35e4c5ce58ed4944f537fe
                                                                                                          • Opcode Fuzzy Hash: eeba164e39b9a206ee0bd13021fe79c14c8f790cdcea3297abcc58d2d41d4cb3
                                                                                                          • Instruction Fuzzy Hash: FF21EA75B0060AAFDB08DFA8C995DBEF7B5FB88304F104668E51997354DA30BD01CBA4
                                                                                                          APIs
                                                                                                            • Part of subcall function 11143C20: GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                                            • Part of subcall function 11143C20: GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Pictures\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                                          • _memmove.LIBCMT ref: 11147211
                                                                                                          Strings
                                                                                                          • Failed to get callstack, xrefs: 111471BD
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CurrentFileModuleNameProcess_memmove
                                                                                                          • String ID: Failed to get callstack
                                                                                                          • API String ID: 4135527288-766476014
                                                                                                          • Opcode ID: 63529710b4138f6f81ad4f3080514690bdb2b876b6fb0115b81c75db0389a908
                                                                                                          • Instruction ID: 4fb2fbc616631b5574b6180649b942946bf04768c5170edb731833e4cde01d29
                                                                                                          • Opcode Fuzzy Hash: 63529710b4138f6f81ad4f3080514690bdb2b876b6fb0115b81c75db0389a908
                                                                                                          • Instruction Fuzzy Hash: D3219875A0011D9BCB14DF64DD94BAEB3B9EF8871CF1041AAEC0DA7240DB31AE54CB90
                                                                                                          APIs
                                                                                                          • RegQueryValueExA.ADVAPI32(00020019,?,00000000,C213C15D,00000000,00020019,?,00000000), ref: 110ED280
                                                                                                            • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: QueryValuewvsprintf
                                                                                                          • String ID: ($Error %d getting %s
                                                                                                          • API String ID: 141982866-3697087921
                                                                                                          • Opcode ID: ef2d7f3509dbd67b9f71e6e81423e7131c7de3edf52ba7e7570321b23b06e68c
                                                                                                          • Instruction ID: 38ad67af7cf9c35c8db4f97e6700948d2d14c8bc089a0f5a48db9c7a16624884
                                                                                                          • Opcode Fuzzy Hash: ef2d7f3509dbd67b9f71e6e81423e7131c7de3edf52ba7e7570321b23b06e68c
                                                                                                          • Instruction Fuzzy Hash: 7011A372E01118AFDB00DEA9DD45DEFB3B8EB94225F00816EF81597140DA71E914C761
                                                                                                          APIs
                                                                                                          • wvsprintfA.USER32(?,?,00000000), ref: 110D1322
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorExitLastMessageProcesswsprintfwvsprintf
                                                                                                          • String ID: ..\CTL32\NSMString.cpp$pszBuffer[1024]==0
                                                                                                          • API String ID: 175691280-2052047905
                                                                                                          • Opcode ID: 5efc2b1b499c19e22c0b11ea56c1799b84258173eef5baac531c406e2266982d
                                                                                                          • Instruction ID: 2d49a6c718824c4fb39b7936eb355b27ab8e956fb5db8f47369f869790572c39
                                                                                                          • Opcode Fuzzy Hash: 5efc2b1b499c19e22c0b11ea56c1799b84258173eef5baac531c406e2266982d
                                                                                                          • Instruction Fuzzy Hash: 91F0F979B0021D6BCB01DFA4DC50BFEBBFC9B45208F044099EA04A7240DE706A05C7A5
                                                                                                          APIs
                                                                                                          • wvsprintfA.USER32(?,?,1102C511), ref: 110D139B
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorExitLastMessageProcesswsprintfwvsprintf
                                                                                                          • String ID: ..\CTL32\NSMString.cpp$pszBuffer[1024]==0
                                                                                                          • API String ID: 175691280-2052047905
                                                                                                          • Opcode ID: 7dd045176ee68b653aa13a97f0e759d1521d44633953b37ee1248efe406da090
                                                                                                          • Instruction ID: 95fe0cd820de1796fd70713afb7a02e85a0165c228f84a05359d3cb2f5b90ec5
                                                                                                          • Opcode Fuzzy Hash: 7dd045176ee68b653aa13a97f0e759d1521d44633953b37ee1248efe406da090
                                                                                                          • Instruction Fuzzy Hash: 4FF0A47AA0025CBBCB00DEA5DD40BEEFBBD9B45248F044199E608A7140DE706A45C7A5
                                                                                                          APIs
                                                                                                          • GetProcAddress.KERNEL32(00000000,ConvertStringSecurityDescriptorToSecurityDescriptorA), ref: 1109D404
                                                                                                          • SetLastError.KERNEL32(00000078,00000000,?,1109E29C,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109D42D
                                                                                                          Strings
                                                                                                          • ConvertStringSecurityDescriptorToSecurityDescriptorA, xrefs: 1109D3FE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AddressErrorLastProc
                                                                                                          • String ID: ConvertStringSecurityDescriptorToSecurityDescriptorA
                                                                                                          • API String ID: 199729137-262600717
                                                                                                          • Opcode ID: 72b6cad3dfc85a2363e3c34f7b358bf502283420fca47eee65f37d335c1a72b0
                                                                                                          • Instruction ID: e717ac8c1df76163528922924e3c5170e1254239c9623c731bd739b822e2347b
                                                                                                          • Opcode Fuzzy Hash: 72b6cad3dfc85a2363e3c34f7b358bf502283420fca47eee65f37d335c1a72b0
                                                                                                          • Instruction Fuzzy Hash: C2F05E72A55228AFD724DFA4E844A97B7E8EB48720F00451AF95597240C670FC14DBA0
                                                                                                          APIs
                                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                          • CreateThread.KERNEL32(00000000,00000000,11026ED0,00000000,00000000,00000000), ref: 110291BE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CreateThread__wcstoi64
                                                                                                          • String ID: *TapiFixPeriod$Bridge
                                                                                                          • API String ID: 1152747075-2058455932
                                                                                                          • Opcode ID: 455249c5f577f5bc371cc96f4979fefb060ee84a49910c717fadbdf2b24322f5
                                                                                                          • Instruction ID: bf80e38bc05b38b2fab7e3f27e0d367de778c9bee9065702c43ca09430eaf323
                                                                                                          • Opcode Fuzzy Hash: 455249c5f577f5bc371cc96f4979fefb060ee84a49910c717fadbdf2b24322f5
                                                                                                          • Instruction Fuzzy Hash: 60F0E57074532D7EFB11DAD6CC45F79B6989300B08FA0003DF528551C8E6B1B9008766
                                                                                                          APIs
                                                                                                          • SendDlgItemMessageA.USER32(?,?,?,?,?), ref: 110010B7
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001091
                                                                                                          • m_hWnd, xrefs: 11001096
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Message$ErrorExitItemLastProcessSendwsprintf
                                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                          • API String ID: 2046328329-2830328467
                                                                                                          • Opcode ID: 870a264c4857fd7c20b43c7043125336c03270db109b755264ed45be6d9d6118
                                                                                                          • Instruction ID: 77f34a7b6d351dc7c2bdf78fd4e91b5ab9e9d0feae3f5383371c0572f9fc60e5
                                                                                                          • Opcode Fuzzy Hash: 870a264c4857fd7c20b43c7043125336c03270db109b755264ed45be6d9d6118
                                                                                                          • Instruction Fuzzy Hash: 98E01ABA71025DBFD714CE95EC81EE7B3ACEB48364F008529FA2997640D6B0E85087A1
                                                                                                          APIs
                                                                                                          • SendMessageA.USER32(?,?,?,?), ref: 11001073
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001051
                                                                                                          • m_hWnd, xrefs: 11001056
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Message$ErrorExitLastProcessSendwsprintf
                                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                          • API String ID: 819365019-2830328467
                                                                                                          • Opcode ID: 46c3cce5aab5cc82a9d8ff0d4253417d22b235869f514457b0a8909ae4eb1d0c
                                                                                                          • Instruction ID: cf35a841ff9db8a25d072bdd62e9da3c8eef3a8b3e547f8f1cf52fd96b7d4918
                                                                                                          • Opcode Fuzzy Hash: 46c3cce5aab5cc82a9d8ff0d4253417d22b235869f514457b0a8909ae4eb1d0c
                                                                                                          • Instruction Fuzzy Hash: 3CE04FB570021DABD310CA95DC85ED7B39CEB54354F008429F92887600D6B0F89087A0
                                                                                                          APIs
                                                                                                          • PostMessageA.USER32(?,?,?,?), ref: 11001103
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 110010E1
                                                                                                          • m_hWnd, xrefs: 110010E6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: Message$ErrorExitLastPostProcesswsprintf
                                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                          • API String ID: 906220102-2830328467
                                                                                                          • Opcode ID: 27df700c695a826ec584c3a5c6c16cda0f02aa3721c02321218cde4e7ec8e80e
                                                                                                          • Instruction ID: e326bc5325dc434b8864e09602644acab64ba33727794dfa8c4f249b36814fc9
                                                                                                          • Opcode Fuzzy Hash: 27df700c695a826ec584c3a5c6c16cda0f02aa3721c02321218cde4e7ec8e80e
                                                                                                          • Instruction Fuzzy Hash: 81E04FB970025DAFD314CA95DC45ED6B3ACEB54764F008429F92887600DA70F84087A0
                                                                                                          APIs
                                                                                                          • ShowWindow.USER32(?,?), ref: 1100113B
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001121
                                                                                                          • m_hWnd, xrefs: 11001126
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorExitLastMessageProcessShowWindowwsprintf
                                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                          • API String ID: 1604732272-2830328467
                                                                                                          • Opcode ID: b62a108dd0f1a298b3da6ec4c3cd6e44d75acd6edd0f1b2899dc5cb61eb0235d
                                                                                                          • Instruction ID: 825df7ee52a795a689a6901b0494195ba864db9fe7d9b2cdbf909eadc0dc9b6b
                                                                                                          • Opcode Fuzzy Hash: b62a108dd0f1a298b3da6ec4c3cd6e44d75acd6edd0f1b2899dc5cb61eb0235d
                                                                                                          • Instruction Fuzzy Hash: 4ED02BB561031CABC314DA92DC41FD2F38CAB20364F004435F52542500D571F54083A4
                                                                                                          APIs
                                                                                                          • KillTimer.USER32(?,?), ref: 1100102B
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001011
                                                                                                          • m_hWnd, xrefs: 11001016
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorExitKillLastMessageProcessTimerwsprintf
                                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                          • API String ID: 2229609774-2830328467
                                                                                                          • Opcode ID: 76242f1f7a5656083f48ec4c6fb46d4250b195dfa3fd92ba0bbd6b47707e0e7b
                                                                                                          • Instruction ID: d507351e39c60ba8400a42a64aee1b3b281c2e630578985a984e8bb8925e1fd6
                                                                                                          • Opcode Fuzzy Hash: 76242f1f7a5656083f48ec4c6fb46d4250b195dfa3fd92ba0bbd6b47707e0e7b
                                                                                                          • Instruction Fuzzy Hash: 21D02B76B4031DABD310C691DC44FD2F39CD714364F008035F55446500D570F8408390
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: _strncpy
                                                                                                          • String ID: 1000,50$1000,50
                                                                                                          • API String ID: 2961919466-2776873633
                                                                                                          • Opcode ID: 81d6864d565fa8250d3fb3330302d5ba6346bad85999c22dbebb076b7baf886a
                                                                                                          • Instruction ID: bd0c201b9adf6a5d857793fbf3440ac1f90bcd045974f847078f01ed738f2ada
                                                                                                          • Opcode Fuzzy Hash: 81d6864d565fa8250d3fb3330302d5ba6346bad85999c22dbebb076b7baf886a
                                                                                                          • Instruction Fuzzy Hash: 7ED0A7706883996FE7008E69EC00B5DBBCC6B01E14F408021FC98CB780DB70F9508351
                                                                                                          APIs
                                                                                                          • SetEvent.KERNEL32(00000000,?,1102C44F), ref: 1110F364
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorEventExitLastMessageProcesswsprintf
                                                                                                          • String ID: ..\ctl32\Refcount.cpp$this->hReadyEvent
                                                                                                          • API String ID: 2400454052-4183089485
                                                                                                          • Opcode ID: 41d0f825f3bbd18f317b206de87baf67605da20620eb9fcb5cb917e3173e7c4c
                                                                                                          • Instruction ID: 9b03986313e8994d60ed52ed66d1c026156e8c3194449c112131b18896cf505e
                                                                                                          • Opcode Fuzzy Hash: 41d0f825f3bbd18f317b206de87baf67605da20620eb9fcb5cb917e3173e7c4c
                                                                                                          • Instruction Fuzzy Hash: EDD0223AE142369FD2A09BA8AC06FC2F3B49B08318F018438F00096080DAB0B445CB88
                                                                                                          APIs
                                                                                                          • GetWindowTextLengthA.USER32(00000000), ref: 11153524
                                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                          Strings
                                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 1115350E
                                                                                                          • m_hWnd, xrefs: 11153513
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.3580252701.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                          • Associated: 00000001.00000002.3580237002.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580367971.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580404001.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580423035.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          • Associated: 00000001.00000002.3580441264.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorExitLastLengthMessageProcessTextWindowwsprintf
                                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                          • API String ID: 67735064-2830328467
                                                                                                          • Opcode ID: fad9644258b9fcb2970ce22f50fed9297b46cc15e0ab03ded2db0d651ee77a36
                                                                                                          • Instruction ID: 41066489dfbac7b1bedb0840a1a625780406ac6dbed52086b597086e3eac16ab
                                                                                                          • Opcode Fuzzy Hash: fad9644258b9fcb2970ce22f50fed9297b46cc15e0ab03ded2db0d651ee77a36
                                                                                                          • Instruction Fuzzy Hash: 5FD022B5B69229ABC31096A1EC84FC1B3849B0832CF011834F03553400E660B8C08341