Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
iQPxJrxxaj.exe

Overview

General Information

Sample name:iQPxJrxxaj.exe
renamed because original name is a hash value
Original sample name:ca5fb5814ec62c8f04936740aabe2664b3c7d036203afbd8425cd67cf1f4b79d.exe
Analysis ID:1542283
MD5:fd379c5ed778ea1000da0b8c9458f7f8
SHA1:59fa8241388e3020e3f539ffbe3892332b59cd93
SHA256:ca5fb5814ec62c8f04936740aabe2664b3c7d036203afbd8425cd67cf1f4b79d
Infos:

Detection

PikaBot
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected PikaBot
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to behave differently if execute on a Russian/Kazak computer
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential key logger detected (key state polling based)
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • iQPxJrxxaj.exe (PID: 7352 cmdline: "C:\Users\user\Desktop\iQPxJrxxaj.exe" MD5: FD379C5ED778EA1000DA0B8C9458F7F8)
    • ctfmon.exe (PID: 7428 cmdline: "C:\Windows\SysWOW64\ctfmon.exe -p 1234" MD5: 1B19D302D7FFA3D0901B3D990A4E8E12)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
PikabotIntroducing Pikabot, an emerging malware family that comprises a downloader/installer, a loader, and a core backdoor component. Despite being in the early stages of development, it already demonstrates advanced techniques in evasion, injection, and anti-analysis. Notably, the loader component incorporates an array of sophisticated anti-debugging and anti-VM measures inspired by the open-source Al-Khaser project, while leveraging steganography to conceal its payload. Additionally, Pikabot utilizes a proprietary C2 framework and supports a diverse range of commands, encompassing host enumeration and advanced secondary payload injection options.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.pikabot
{"C2 list": ["139.84.237.229:2967", "85.239.243.155:5000", "104.129.55.104:2223", "37.60.242.85:9785", "95.179.191.137:5938", "65.20.66.218:5938", "158.220.80.157:9785", "104.129.55.103:2224", "158.220.80.167:2967"]}
SourceRuleDescriptionAuthorStrings
00000000.00000003.1821764268.00000000049D0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_PikaBotYara detected PikaBotJoe Security
    00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_PikaBotYara detected PikaBotJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.iQPxJrxxaj.exe.5340000.1.unpackJoeSecurity_PikaBotYara detected PikaBotJoe Security
        0.3.iQPxJrxxaj.exe.49d0000.0.raw.unpackJoeSecurity_PikaBotYara detected PikaBotJoe Security
          0.2.iQPxJrxxaj.exe.5340000.1.raw.unpackJoeSecurity_PikaBotYara detected PikaBotJoe Security
            0.3.iQPxJrxxaj.exe.49d0000.0.unpackJoeSecurity_PikaBotYara detected PikaBotJoe Security
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: iQPxJrxxaj.exeAvira: detected
              Source: 00000000.00000002.1857877690.0000000005694000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Pikabot {"C2 list": ["139.84.237.229:2967", "85.239.243.155:5000", "104.129.55.104:2223", "37.60.242.85:9785", "95.179.191.137:5938", "65.20.66.218:5938", "158.220.80.157:9785", "104.129.55.103:2224", "158.220.80.167:2967"]}
              Source: iQPxJrxxaj.exeReversingLabs: Detection: 79%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.1% probability
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005A2C20 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptDestroyHash,CryptReleaseContext,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CryptDestroyHash,CryptReleaseContext,std::ios_base::_Ios_base_dtor,0_2_005A2C20

              Compliance

              barindex
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeUnpacked PE file: 0.2.iQPxJrxxaj.exe.5340000.1.unpack
              Source: iQPxJrxxaj.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: iQPxJrxxaj.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: E:\cpp\Notepad3\Bin\Release_x86_v143\grepWinNP3.pdb source: iQPxJrxxaj.exe
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00649310 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00649310
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0059EBD0 PathIsDirectoryW,FindFirstFileExW,FindFirstFileW,GetLastError,FindClose,FindClose,0_2_0059EBD0

              Networking

              barindex
              Source: Malware configuration extractorIPs: 139.84.237.229:2967
              Source: Malware configuration extractorIPs: 85.239.243.155:5000
              Source: Malware configuration extractorIPs: 104.129.55.104:2223
              Source: Malware configuration extractorIPs: 37.60.242.85:9785
              Source: Malware configuration extractorIPs: 95.179.191.137:5938
              Source: Malware configuration extractorIPs: 65.20.66.218:5938
              Source: Malware configuration extractorIPs: 158.220.80.157:9785
              Source: Malware configuration extractorIPs: 104.129.55.103:2224
              Source: Malware configuration extractorIPs: 158.220.80.167:2967
              Source: global trafficTCP traffic: 192.168.2.4:49738 -> 158.220.80.167:2967
              Source: Joe Sandbox ViewIP Address: 37.60.242.85 37.60.242.85
              Source: Joe Sandbox ViewIP Address: 104.129.55.103 104.129.55.103
              Source: Joe Sandbox ViewASN Name: SINGLEHOP-LLCUS SINGLEHOP-LLCUS
              Source: Joe Sandbox ViewASN Name: CP-ASDE CP-ASDE
              Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: iQPxJrxxaj.exeString found in binary or memory: http://tools.stefankueng.com
              Source: iQPxJrxxaj.exeString found in binary or memory: http://tools.stefankueng.comgrepWinNP3
              Source: ctfmon.exe, 00000001.00000003.2787856275.0000000002BF3000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000002.3074015247.0000000002BF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://158.220.80.167:2967/
              Source: ctfmon.exe, 00000001.00000003.2787856275.0000000002BF3000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000002.3074015247.0000000002BF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://158.220.80.167:2967/GY
              Source: ctfmon.exe, 00000001.00000002.3074015247.0000000002BF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://158.220.80.167:2967/api/admin.teams.settings.setIcon
              Source: ctfmon.exe, 00000001.00000003.2787674000.0000000002C12000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000002.3074149438.0000000002C12000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2787374939.0000000002C0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://158.220.80.167:2967/api/admin.teams.settings.setIconro
              Source: iQPxJrxxaj.exeString found in binary or memory: https://www.boost.org/doc/libs/release/libs/regex/doc/html/boost_regex/syntax/character_classes.html
              Source: iQPxJrxxaj.exeString found in binary or memory: https://www.boost.org/doc/libs/release/libs/regex/doc/html/boost_regex/syntax/perl_syntax.html
              Source: iQPxJrxxaj.exeString found in binary or memory: https://www.cplusplus.com/reference/ctime/strftime/
              Source: iQPxJrxxaj.exeString found in binary or memory: https://www.regular-expressions.info/tutorial.html
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005B0B80 CloseClipboard,Sleep,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,CloseClipboard,0_2_005B0B80
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005B0B80 CloseClipboard,Sleep,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,CloseClipboard,0_2_005B0B80
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005E6780 GetDlgItem,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetFocus,SendMessageW,SendMessageW,GetFocus,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetFocus,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,SetFocus,IsDlgButtonChecked,SendMessageW,SendMessageW,0_2_005E6780
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_05341000 NtAlpcCreateSectionView,0_2_05341000
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_00781000 NtAcquireCrossVmMutant,1_2_00781000
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005A77C00_2_005A77C0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005CC1D00_2_005CC1D0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005EC1C00_2_005EC1C0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0061A2C00_2_0061A2C0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_006042D00_2_006042D0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005EE3E00_2_005EE3E0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005B15F00_2_005B15F0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005F47F00_2_005F47F0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0063382B0_2_0063382B
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005B99600_2_005B9960
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_006389F70_2_006389F7
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005F49B00_2_005F49B0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0063AA600_2_0063AA60
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005D1A200_2_005D1A20
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00633B8A0_2_00633B8A
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0064CECF0_2_0064CECF
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00641FD40_2_00641FD4
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_053435F40_2_053435F4
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0534844C0_2_0534844C
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0534B4AC0_2_0534B4AC
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0534C6A00_2_0534C6A0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_053446E00_2_053446E0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_053413940_2_05341394
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0534AF480_2_0534AF48
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_053429180_2_05342918
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0534997C0_2_0534997C
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0534A8A00_2_0534A8A0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_053481BC0_2_053481BC
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_053462A80_2_053462A8
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_05347D180_2_05347D18
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0534684C0_2_0534684C
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_053478880_2_05347888
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_0078467C1_2_0078467C
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_007867401_2_00786740
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_007859281_2_00785928
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_007880CC1_2_007880CC
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_00781A241_2_00781A24
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_0078B4E01_2_0078B4E0
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_00782EC01_2_00782EC0
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_007820881_2_00782088
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: String function: 00580704 appears 184 times
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: String function: 006296D0 appears 54 times
              Source: iQPxJrxxaj.exe, 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegrepWinNP3.exe6 vs iQPxJrxxaj.exe
              Source: iQPxJrxxaj.exeBinary or memory string: OriginalFilenamegrepWinNP3.exe6 vs iQPxJrxxaj.exe
              Source: iQPxJrxxaj.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: classification engineClassification label: mal96.troj.expl.evad.winEXE@3/0@0/9
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0062A8C0 GetLastError,FormatMessageA,LocalFree,0_2_0062A8C0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_053410E8 CreateToolhelp32Snapshot,Process32FirstW,AnyPopup,GetLastError,0_2_053410E8
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005DC3D0 CoCreateInstance,0_2_005DC3D0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005A7170 MoveWindow,CloseWindow,DestroyWindow,SendMessageW,LoadCursorW,SetCursor,ShellExecuteW,EndDialog,GetClientRect,CreateWindowExW,FindResourceW,LoadResource,LockResource,SizeofResource,SendMessageW,SendMessageW,SetFocus,SendMessageW,SendMessageW,SendMessageW,0_2_005A7170
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeMutant created: \Sessions\1\BaseNamedObjects\{6473AA76-0EAE-4C96-8C99-AFDFEFFE42B5}
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeMutant created: \Sessions\1\BaseNamedObjects\{6473AA76-0EAE-4C96-8C99-AFDFEFFE42B6}
              Source: C:\Windows\SysWOW64\ctfmon.exeMutant created: \Sessions\1\BaseNamedObjects\{6F70D3AF-34EF-433C-A803-E83654F6FD7C}
              Source: iQPxJrxxaj.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: iQPxJrxxaj.exeReversingLabs: Detection: 79%
              Source: unknownProcess created: C:\Users\user\Desktop\iQPxJrxxaj.exe "C:\Users\user\Desktop\iQPxJrxxaj.exe"
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess created: C:\Windows\SysWOW64\ctfmon.exe "C:\Windows\SysWOW64\ctfmon.exe -p 1234"
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess created: C:\Windows\SysWOW64\ctfmon.exe "C:\Windows\SysWOW64\ctfmon.exe -p 1234"Jump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: explorerframe.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: dataexchange.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: d3d11.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: dcomp.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: dxgi.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
              Source: iQPxJrxxaj.exeStatic file information: File size 1361408 > 1048576
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: iQPxJrxxaj.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: E:\cpp\Notepad3\Bin\Release_x86_v143\grepWinNP3.pdb source: iQPxJrxxaj.exe
              Source: iQPxJrxxaj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: iQPxJrxxaj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: iQPxJrxxaj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: iQPxJrxxaj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: iQPxJrxxaj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeUnpacked PE file: 0.2.iQPxJrxxaj.exe.5340000.1.unpack
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0059E040 InitCommonControlsEx,SHGetKnownFolderPath,CoTaskMemFree,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0059E040
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_006290B8 push ecx; ret 0_2_006290CB
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00565270 push 683BC3B2h; ret 0_2_005688FF
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0056533A push esp; iretd 0_2_0056536B
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005674CF pushfd ; retf 0_2_0059780D
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005675EC push ED98EC23h; ret 0_2_00567622
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005675EC push ds; retf 0_2_0056771C
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00563641 push ds; iretd 0_2_00563642
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00563856 push ecx; ret 0_2_0059490E
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0056385B push ecx; ret 0_2_0059490E
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00561899 push B0C117E4h; iretd 0_2_0056189E
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005679CE push cs; retf 0_2_005679DA
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005649E3 push cs; iretd 0_2_0056F727
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_005649AE push cs; iretd 0_2_0056F727
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00562AFD push ds; retf 0_2_0057CEBA
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00562B02 push ds; retf 0_2_0057CEBA
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00561D12 push cs; retf 0_2_00561D1F
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00563F71 pushfd ; retf 0_2_005757B1
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00563F6C pushfd ; retf 0_2_005757B1
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0534844C push esi; mov dword ptr [esp], 000013C5h0_2_05348CB9
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0534844C push edi; mov dword ptr [esp], 000013C5h0_2_05348CC3
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_05341000 push dword ptr [0535414Ch]; ret 0_2_05341064
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0534DB3C push eax; mov dword ptr [esp], 0536CCA0h0_2_0534DC12
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_00781000 push dword ptr [0078F790h]; ret 1_2_00781064
              Source: iQPxJrxxaj.exeStatic PE information: section name: .text entropy: 6.9913927134244815
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0059E040 InitCommonControlsEx,SHGetKnownFolderPath,CoTaskMemFree,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0059E040
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_05341394 GetOEMCP,GetWindowTextLengthA,GetDialogBaseUnits,GetMessageTime,GetShellWindow,GetCurrentThreadId,GetSystemDefaultLangID,GetOEMCP,GetDesktopWindow,GetModuleHandleW,GetCurrentThreadId,GetLastActivePopup, mov byte ptr [ebp-00000419h], al 0_2_05341394
              Source: C:\Windows\SysWOW64\ctfmon.exe TID: 7772Thread sleep time: -30000s >= -30000sJump to behavior
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00649310 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00649310
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0059EBD0 PathIsDirectoryW,FindFirstFileExW,FindFirstFileW,GetLastError,FindClose,FindClose,0_2_0059EBD0
              Source: ctfmon.exe, 00000001.00000002.3074218679.0000000002C26000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2787833876.0000000002C23000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2787856275.0000000002BE9000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2787374939.0000000002C20000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2787609025.0000000002C23000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2787513438.0000000002C21000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2787898793.0000000002C24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess information queried: ProcessInformationJump to behavior

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_05343548 GetModuleHandleW,CheckRemoteDebuggerPresent,0_2_05343548
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess queried: DebugFlagsJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugObjectHandleJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugFlagsJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugObjectHandleJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugFlagsJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugObjectHandleJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugFlagsJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_007852F8 LdrLoadDll,LdrLoadDll,1_2_007852F8
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_006294D1 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006294D1
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0059E040 InitCommonControlsEx,SHGetKnownFolderPath,CoTaskMemFree,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0059E040
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0534C6A0 mov eax, dword ptr fs:[00000030h]0_2_0534C6A0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_053460B0 mov edx, dword ptr fs:[00000030h]0_2_053460B0
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_00781468 mov esi, dword ptr fs:[00000030h]1_2_00781468
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_0078AE50 mov eax, dword ptr fs:[00000030h]1_2_0078AE50
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_006294D1 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006294D1
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0062986D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0062986D
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0062EA53 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0062EA53
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess created: C:\Windows\SysWOW64\ctfmon.exe "C:\Windows\SysWOW64\ctfmon.exe -p 1234"Jump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0062929C cpuid 0_2_0062929C
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: EnumSystemLocalesW,0_2_0064C014
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0064C09F
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: GetLocaleInfoW,0_2_0064C2F2
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: GetLocaleInfoW,0_2_0064642D
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0064C41B
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: GetLocaleInfoW,0_2_0064C521
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0064C5F7
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: EnumSystemLocalesW,0_2_00645EA7
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: EnumSystemLocalesW,0_2_0064BF79
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: EnumSystemLocalesW,0_2_0064BF2E
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00629715 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00629715
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_00786740 GetUserDefaultLCID,CreateMutexW,GetUserNameW,LocalAlloc,1_2_00786740
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00647559 GetTimeZoneInformation,0_2_00647559

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.iQPxJrxxaj.exe.5340000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.iQPxJrxxaj.exe.49d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.iQPxJrxxaj.exe.5340000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.iQPxJrxxaj.exe.49d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1821764268.00000000049D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.iQPxJrxxaj.exe.5340000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.iQPxJrxxaj.exe.49d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.iQPxJrxxaj.exe.5340000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.iQPxJrxxaj.exe.49d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1821764268.00000000049D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              2
              Virtualization/Sandbox Evasion
              1
              Input Capture
              2
              System Time Discovery
              Remote Services1
              Input Capture
              2
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              11
              Process Injection
              LSASS Memory221
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Deobfuscate/Decode Files or Information
              Security Account Manager2
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares2
              Clipboard Data
              1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
              Obfuscated Files or Information
              NTDS2
              Process Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Software Packing
              LSA Secrets1
              Account Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials1
              System Owner/User Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
              File and Directory Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem22
              System Information Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              iQPxJrxxaj.exe79%ReversingLabsWin32.Trojan.Pikabot
              iQPxJrxxaj.exe100%AviraTR/Redcap.kbcgw
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              https://158.220.80.167:2967/ctfmon.exe, 00000001.00000003.2787856275.0000000002BF3000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000002.3074015247.0000000002BF3000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://158.220.80.167:2967/GYctfmon.exe, 00000001.00000003.2787856275.0000000002BF3000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000002.3074015247.0000000002BF3000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://www.cplusplus.com/reference/ctime/strftime/iQPxJrxxaj.exefalse
                    unknown
                    http://tools.stefankueng.comiQPxJrxxaj.exefalse
                      unknown
                      https://158.220.80.167:2967/api/admin.teams.settings.setIconctfmon.exe, 00000001.00000002.3074015247.0000000002BF3000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://158.220.80.167:2967/api/admin.teams.settings.setIconroctfmon.exe, 00000001.00000003.2787674000.0000000002C12000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000002.3074149438.0000000002C12000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2787374939.0000000002C0F000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://tools.stefankueng.comgrepWinNP3iQPxJrxxaj.exefalse
                            unknown
                            https://www.boost.org/doc/libs/release/libs/regex/doc/html/boost_regex/syntax/character_classes.htmliQPxJrxxaj.exefalse
                              unknown
                              https://www.boost.org/doc/libs/release/libs/regex/doc/html/boost_regex/syntax/perl_syntax.htmliQPxJrxxaj.exefalse
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                37.60.242.85
                                unknownBulgaria
                                32475SINGLEHOP-LLCUStrue
                                65.20.66.218
                                unknownUnited States
                                199592CP-ASDEtrue
                                104.129.55.103
                                unknownUnited States
                                8100ASN-QUADRANET-GLOBALUStrue
                                104.129.55.104
                                unknownUnited States
                                8100ASN-QUADRANET-GLOBALUStrue
                                95.179.191.137
                                unknownNetherlands
                                20473AS-CHOOPAUStrue
                                158.220.80.167
                                unknownSwitzerland
                                8556LEVANTISCHtrue
                                139.84.237.229
                                unknownUnited States
                                16498LASALLEUStrue
                                85.239.243.155
                                unknownCzech Republic
                                15685CASABLANCA-ASInternetCollocationProviderCZtrue
                                158.220.80.157
                                unknownSwitzerland
                                8556LEVANTISCHtrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1542283
                                Start date and time:2024-10-25 18:50:08 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 5m 24s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:6
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:iQPxJrxxaj.exe
                                renamed because original name is a hash value
                                Original Sample Name:ca5fb5814ec62c8f04936740aabe2664b3c7d036203afbd8425cd67cf1f4b79d.exe
                                Detection:MAL
                                Classification:mal96.troj.expl.evad.winEXE@3/0@0/9
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 72%
                                • Number of executed functions: 56
                                • Number of non-executed functions: 203
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • VT rate limit hit for: iQPxJrxxaj.exe
                                TimeTypeDescription
                                12:51:51API Interceptor1x Sleep call for process: ctfmon.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                37.60.242.85Lisect_AVT_24003_G1B_115.exeGet hashmaliciousPikaBotBrowse
                                  Lisect_AVT_24003_G1B_115.exeGet hashmaliciousPikaBotBrowse
                                    Lisect_AVT_24003_G1B_54.exeGet hashmaliciousPikaBotBrowse
                                      Lisect_AVT_24003_G1B_54.exeGet hashmaliciousPikaBotBrowse
                                        Lisect_AVT_24003_G1B_96.exeGet hashmaliciousPikaBotBrowse
                                          Lisect_AVT_24003_G1B_90.exeGet hashmaliciousPikaBotBrowse
                                            Lisect_AVT_24003_G1B_96.exeGet hashmaliciousPikaBotBrowse
                                              Lisect_AVT_24003_G1B_102.exeGet hashmaliciousPikaBotBrowse
                                                Lisect_AVT_24003_G1B_104.exeGet hashmaliciousPikaBotBrowse
                                                  file://introwebllc.com/public/HD.zipGet hashmaliciousPikaBotBrowse
                                                    104.129.55.103Qum.jsGet hashmaliciousUnknownBrowse
                                                      Qum.jsGet hashmaliciousUnknownBrowse
                                                        QOrxv3yrK2.exeGet hashmaliciousUnknownBrowse
                                                          QOrxv3yrK2.exeGet hashmaliciousUnknownBrowse
                                                            Ifhfdhjkshfhjkgs.exeGet hashmaliciousUnknownBrowse
                                                              Ifhfdhjkshfhjkgs.exeGet hashmaliciousUnknownBrowse
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                ASN-QUADRANET-GLOBALUSla.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                                • 173.205.89.188
                                                                Play_VM.Now.matt.sibilo_Audio.wav...v.htmlGet hashmaliciousHtmlDropperBrowse
                                                                • 185.174.100.20
                                                                mpsl.elfGet hashmaliciousMiraiBrowse
                                                                • 154.205.102.28
                                                                IMG465244247443 ORDER Opmagasinering.exeGet hashmaliciousXWormBrowse
                                                                • 104.223.35.76
                                                                la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                                                • 23.153.31.252
                                                                SecuriteInfo.com.Win32.MalwareX-gen.23086.24319.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                                • 104.223.35.76
                                                                http://tfmk.sweepshop.info/fwd/P2Q9OTU0NCZlaT00NDM2NzYzMSZpZj0zMTYwJmxpPTczNwGet hashmaliciousPhisherBrowse
                                                                • 103.79.78.225
                                                                QUOTE #46789-OCT24_JAMEELA TRD LLCS.bat.exeGet hashmaliciousGuLoaderBrowse
                                                                • 72.11.142.133
                                                                sample.htaGet hashmaliciousXWormBrowse
                                                                • 107.150.23.154
                                                                Re property pdf.exeGet hashmaliciousFormBookBrowse
                                                                • 104.223.44.195
                                                                CP-ASDEhttp://www.thegioimoicau.com/Get hashmaliciousUnknownBrowse
                                                                • 65.21.45.74
                                                                Bill Of Lading_MEDUVB935991.pdf.exeGet hashmaliciousFormBookBrowse
                                                                • 65.21.196.90
                                                                arm.elfGet hashmaliciousUnknownBrowse
                                                                • 65.21.50.224
                                                                P1 BOL.exeGet hashmaliciousUnknownBrowse
                                                                • 65.21.196.90
                                                                Doc 784-01965670.exeGet hashmaliciousFormBookBrowse
                                                                • 65.21.196.90
                                                                TT Swift copy1.exeGet hashmaliciousFormBookBrowse
                                                                • 65.21.196.90
                                                                BL.exeGet hashmaliciousFormBookBrowse
                                                                • 65.21.196.90
                                                                rDRAWINGDWGSINC.exeGet hashmaliciousFormBookBrowse
                                                                • 65.21.196.90
                                                                https://eadzhost.net/quieter/QUOTE_TECNO_GAZ_INDUSTRIES_63787_MC.rarGet hashmaliciousFormBookBrowse
                                                                • 65.21.29.43
                                                                na.htaGet hashmaliciousCobalt Strike, FormBook, GuLoaderBrowse
                                                                • 65.21.196.90
                                                                SINGLEHOP-LLCUSyGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                                                • 96.127.180.42
                                                                la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                                • 216.104.42.28
                                                                la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                                                • 173.236.97.217
                                                                https://landsmith.ae/continue.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                • 69.175.95.50
                                                                arm5.elfGet hashmaliciousUnknownBrowse
                                                                • 65.60.17.27
                                                                https://www.bing.com/ck/a?!&&p=c60f44e2e0299106bbda17ed4610b6a047eac19fa538687ebec1fc78213d7903JmltdHM9MTcyOTEyMzIwMA&ptn=3&ver=2&hsh=4&fclid=234c270a-e3bc-6c48-2bf3-3210e2866d6d&psq=Siemens+v17&u=a1aHR0cHM6Ly9wbGM0bWUuY29tL2Rvd25sb2FkLXRpYS1wb3J0YWwtdjE3LWZ1bGwtdmVyc2lvbi1nb29nbGVkcml2ZS8&ntb=1Get hashmaliciousUnknownBrowse
                                                                • 172.96.186.147
                                                                INVOICE_bwallman#E785IKK2.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                • 108.178.43.142
                                                                http://www.fcc-movil.com/80th/enphem1sX2F0dG9ybmV5YXpAZmQub3JnGet hashmaliciousPhisherBrowse
                                                                • 198.20.104.206
                                                                na.elfGet hashmaliciousMiraiBrowse
                                                                • 65.63.38.146
                                                                Remittance copy.shtmlGet hashmaliciousHTMLPhisherBrowse
                                                                • 108.178.26.90
                                                                No context
                                                                No context
                                                                No created / dropped files found
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):6.904757414642191
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:iQPxJrxxaj.exe
                                                                File size:1'361'408 bytes
                                                                MD5:fd379c5ed778ea1000da0b8c9458f7f8
                                                                SHA1:59fa8241388e3020e3f539ffbe3892332b59cd93
                                                                SHA256:ca5fb5814ec62c8f04936740aabe2664b3c7d036203afbd8425cd67cf1f4b79d
                                                                SHA512:9de54ef1a15a70dcf266d24685b2c1e259170973a6c61033289303258f63e41cda1aa53335a91f8317a5963ede47a805c29dbe3f69c80f71a716515616669472
                                                                SSDEEP:24576:7yTiqxhwB8ow5KiPUIRCv1N4JFMl2K1WKT3IDC95ag62:7yTiqxhw1rx1mY1Wm4DCOg62
                                                                TLSH:0C55BE71B583C072E96212F1293D9B65666DBE648FB788CFF3C03D6D4431DC26936A0A
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............S...S...S...R...S...RY..S3..R...S...R...S...R...S...R...S...R...S...R...S...R...S...S!..S...R...S..KS...S..#S...S...R...
                                                                Icon Hash:0d66c3d363135109
                                                                Entrypoint:0x4c90a0
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x65C4C527 [Thu Feb 8 12:12:23 2024 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:6
                                                                OS Version Minor:0
                                                                File Version Major:6
                                                                File Version Minor:0
                                                                Subsystem Version Major:6
                                                                Subsystem Version Minor:0
                                                                Import Hash:639b8ce85c0ddfcaca9633440db01cad
                                                                Instruction
                                                                call 00007F2634B945B2h
                                                                jmp 00007F2634B93D6Fh
                                                                cmp ecx, dword ptr [005161C0h]
                                                                jne 00007F2634B93EF3h
                                                                ret
                                                                jmp 00007F2634B946D2h
                                                                mov ecx, dword ptr [ebp-0Ch]
                                                                mov dword ptr fs:[00000000h], ecx
                                                                pop ecx
                                                                pop edi
                                                                pop edi
                                                                pop esi
                                                                pop ebx
                                                                mov esp, ebp
                                                                pop ebp
                                                                push ecx
                                                                ret
                                                                mov ecx, dword ptr [ebp-10h]
                                                                xor ecx, ebp
                                                                call 00007F2634B93EC9h
                                                                jmp 00007F2634B93ED2h
                                                                push eax
                                                                push dword ptr fs:[00000000h]
                                                                lea eax, dword ptr [esp+0Ch]
                                                                sub esp, dword ptr [esp+0Ch]
                                                                push ebx
                                                                push esi
                                                                push edi
                                                                mov dword ptr [eax], ebp
                                                                mov ebp, eax
                                                                mov eax, dword ptr [005161C0h]
                                                                xor eax, ebp
                                                                push eax
                                                                push dword ptr [ebp-04h]
                                                                mov dword ptr [ebp-04h], FFFFFFFFh
                                                                lea eax, dword ptr [ebp-0Ch]
                                                                mov dword ptr fs:[00000000h], eax
                                                                ret
                                                                push eax
                                                                push dword ptr fs:[00000000h]
                                                                lea eax, dword ptr [esp+0Ch]
                                                                sub esp, dword ptr [esp+0Ch]
                                                                push ebx
                                                                push esi
                                                                push edi
                                                                mov dword ptr [eax], ebp
                                                                mov ebp, eax
                                                                mov eax, dword ptr [005161C0h]
                                                                xor eax, ebp
                                                                push eax
                                                                mov dword ptr [ebp-10h], eax
                                                                push dword ptr [ebp-04h]
                                                                mov dword ptr [ebp-04h], FFFFFFFFh
                                                                lea eax, dword ptr [ebp-0Ch]
                                                                mov dword ptr fs:[00000000h], eax
                                                                ret
                                                                push eax
                                                                push dword ptr fs:[00000000h]
                                                                lea eax, dword ptr [esp+0Ch]
                                                                sub esp, dword ptr [esp+0Ch]
                                                                push ebx
                                                                push esi
                                                                push edi
                                                                mov dword ptr [eax], ebp
                                                                mov ebp, eax
                                                                mov eax, dword ptr [005161C0h]
                                                                xor eax, ebp
                                                                push eax
                                                                mov dword ptr [ebp-10h], esp
                                                                push dword ptr [ebp+00h]
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x113b840x104.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x11c0000x2b9f8.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1480000x7c0c.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x1076e00x8c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x1077800x18.rdata
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1076200x40.rdata
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0xf90000x61c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000xf7cee0xf7e00e5d0129f14da84e1c0aed5958842ae7fFalse0.5985062484241049data6.9913927134244815IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0xf90000x1cde20x1ce00f6abe18b71f5b04c0a374a8593849936False0.3782890286796537data4.77550999528983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0x1160000x5d340x3e0057db2369eae20724a58ae59e568500dbFalse0.17231602822580644DOS executable (block device driver)4.748370462370597IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x11c0000x2b9f80x2ba00dba96c6dbecb72154dcdddcc17b2d61aFalse0.40728532414040114data6.255321835115764IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x1480000x7c0c0x7e00b71209090055b617bcbc68cffa550b6dFalse0.6593501984126984data6.578028479435236IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RTF0x13feb00x6053Rich Text Format data, version 1, ANSI, code page 1252, default language ID 10330.10458656068778134
                                                                RT_ICON0x11c8f00x884ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.997306127127873
                                                                RT_ICON0x1251400x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.21585531763870816
                                                                RT_ICON0x1359680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.3706306093528578
                                                                RT_ICON0x139b900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.48350622406639004
                                                                RT_ICON0x13c1380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.5530018761726079
                                                                RT_ICON0x13d1e00x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.6549180327868852
                                                                RT_ICON0x13db680x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.7730496453900709
                                                                RT_MENU0x13fe500x56data0.7325581395348837
                                                                RT_DIALOG0x13e0380xe4edata0.3735663571818678
                                                                RT_DIALOG0x13ee880x324data0.40049751243781095
                                                                RT_DIALOG0x13f1b00x15edata0.58
                                                                RT_DIALOG0x13f3100x12edata0.609271523178808
                                                                RT_DIALOG0x13f4400x1a4data0.5523809523809524
                                                                RT_DIALOG0x13f5e80xc8data0.69
                                                                RT_DIALOG0x13f6b00x7a0data0.42520491803278687
                                                                RT_STRING0x145f080x12cdata0.52
                                                                RT_STRING0x1460380x560data0.42151162790697677
                                                                RT_STRING0x1465980x200data0.5
                                                                RT_STRING0x1467980x4aadata0.40033500837520936
                                                                RT_STRING0x146c480x4d0data0.336038961038961
                                                                RT_STRING0x1471500xeadata0.5213675213675214
                                                                RT_STRING0x1471180x36data0.6481481481481481
                                                                RT_ACCELERATOR0x13fea80x8data2.0
                                                                RT_GROUP_ICON0x13dfd00x68data0.7596153846153846
                                                                RT_VERSION0x11c6000x2ecdataEnglishUnited States0.4451871657754011
                                                                RT_MANIFEST0x1472400x7b4XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1912), with CRLF line terminatorsEnglishUnited States0.32302231237322515
                                                                DLLImport
                                                                SHLWAPI.dllPathRelativePathToW, SHGetValueW, AssocQueryStringW, StrFormatByteSizeW, PathCompactPathExW, SHAutoComplete, PathRemoveFileSpecW, PathAppendW, SHDeleteKeyW, PathIsRootW, PathCanonicalizeW, PathIsRelativeW, PathIsURLW, PathIsDirectoryW, PathFileExistsW, SHSetValueW, StrCmpLogicalW
                                                                UxTheme.dllCloseThemeData, GetThemeInt, GetThemeBackgroundContentRect, SetWindowTheme, OpenThemeData, GetThemeColor, BeginBufferedPaint, BufferedPaintSetAlpha, EndBufferedPaint, DrawThemeBackground
                                                                KERNEL32.dlllstrlenW, MultiByteToWideChar, FindResourceW, LoadResource, LockResource, SizeofResource, GetCurrentThreadId, GetFullPathNameW, GetLongPathNameW, GetShortPathNameW, GetModuleFileNameW, CreateFileW, CloseHandle, CreateDirectoryW, GetCurrentDirectoryW, Sleep, SetCurrentDirectoryW, FormatMessageW, GetTickCount64, GetWindowsDirectoryW, GetCurrentProcess, GetFileTime, WriteFile, SetFileTime, GetFileSizeEx, GlobalMemoryStatusEx, ReadFile, WideCharToMultiByte, GetFileSize, FlushFileBuffers, SetFilePointer, SetEndOfFile, GetCommandLineW, SetDllDirectoryW, CreateMutexW, GetSystemDirectoryW, SystemTimeToFileTime, SetErrorMode, GetUserDefaultLCID, GetStringTypeExW, LoadLibraryA, LCMapStringW, ExpandEnvironmentStringsW, OutputDebugStringW, QueryPerformanceCounter, QueryPerformanceFrequency, GetStringTypeExA, LCMapStringA, GetSystemTime, FileTimeToSystemTime, CreateThread, CreateProcessW, GetFileInformationByHandle, CompareFileTime, CopyFileW, GetFileAttributesW, SetFileAttributesW, MoveFileExA, GetTimeZoneInformation, SystemTimeToTzSpecificLocalTime, GetDateFormatW, GetTimeFormatW, CreateFileA, CreateFileMappingW, MapViewOfFile, GlobalAddAtomW, GlobalUnlock, GetOEMCP, GetACP, IsValidCodePage, HeapReAlloc, EnumSystemLocalesW, IsValidLocale, GetLocaleInfoW, CompareStringW, ReadConsoleW, GetConsoleMode, GetConsoleOutputCP, SetFilePointerEx, GetFileType, HeapAlloc, HeapFree, GetStdHandle, ExitProcess, SetEnvironmentVariableW, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, RtlUnwind, CreateFileMappingA, GetModuleHandleA, MapViewOfFileEx, TerminateProcess, InitializeSListHead, GetCurrentProcessId, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, GetCPInfo, GetSystemTimeAsFileTime, LCMapStringEx, DecodePointer, EncodePointer, DeleteCriticalSection, InitializeCriticalSectionEx, LeaveCriticalSection, EnterCriticalSection, RaiseException, IsProcessorFeaturePresent, GetModuleHandleExW, CloseThreadpoolWork, SubmitThreadpoolWork, CreateThreadpoolWork, FreeLibraryWhenCallbackReturns, SleepConditionVariableSRW, WakeAllConditionVariable, WakeConditionVariable, GetNativeSystemInfo, InitOnceBeginInitialize, InitOnceComplete, TryAcquireSRWLockExclusive, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetStringTypeW, FormatMessageA, lstrcpyW, GlobalFree, GlobalLock, GlobalAlloc, FindNextFileW, FindClose, FindFirstFileW, FindFirstFileExW, lstrcpynW, GetModuleHandleW, MulDiv, GetLastError, GetProcAddress, FreeLibrary, LoadLibraryW, SetLastError, VerifyVersionInfoW, VerSetConditionMask, LocalFree, LocalAlloc, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, SetStdHandle, HeapSize, WriteConsoleW, DeleteAtom, UnmapViewOfFile
                                                                USER32.dllGetSysColor, PostMessageW, CheckDlgButton, GetKeyState, RedrawWindow, CreatePopupMenu, CheckMenuItem, LoadIconA, CreateWindowExA, CheckRadioButton, SendDlgItemMessageW, AppendMenuW, DestroyMenu, SetCursor, GetClassNameW, InvalidateRgn, BeginPaint, GetClientRect, GetWindowLongW, SendMessageW, GetWindowTextLengthW, GetWindowTextW, EndPaint, DrawTextW, InflateRect, GetWindowRect, GetCursorPos, GetDCEx, LoadStringA, SetTimer, PtInRect, GetFocus, GetSystemMetrics, IntersectRect, MapWindowPoints, GetParent, GetDC, ReleaseDC, ScreenToClient, SystemParametersInfoW, DialogBoxParamW, CreateDialogParamW, EnableWindow, ShowWindow, BringWindowToTop, SetForegroundWindow, LoadAcceleratorsW, GetMessageW, TranslateAcceleratorW, IsDialogMessageW, TranslateMessage, DispatchMessageW, PostQuitMessage, DestroyWindow, EndDialog, SetFocus, KillTimer, IsDlgButtonChecked, EnumWindows, RegisterWindowMessageW, TrackPopupMenu, GetSubMenu, LoadMenuW, ClientToScreen, CreateDialogIndirectParamW, GetWindowPlacement, GetDesktopWindow, CopyRect, LoadStringW, SetDlgItemTextW, DrawIconEx, GetSysColorBrush, SetClipboardData, EmptyClipboard, OpenClipboard, CloseClipboard, EnumDisplayMonitors, GetMonitorInfoW, SetWindowTextW, SetMenuItemInfoW, GetMenuItemInfoW, GetMenuItemCount, GetSystemMenu, EnumThreadWindows, EnumChildWindows, CloseWindow, LoadCursorW, InsertMenuW, SetCapture, ReleaseCapture, DrawFocusRect, RemovePropW, GetPropW, SetPropW, RegisterClipboardFormatW, IsZoomed, EndDeferWindowPos, DeferWindowPos, BeginDeferWindowPos, InvalidateRect, SetWindowRgn, CallWindowProcW, SetWindowPlacement, MoveWindow, GetWindowDC, SetLayeredWindowAttributes, MessageBoxW, SetCursorPos, GetDlgItemTextW, DefDlgProcW, CreateWindowExW, SetWindowLongW, GetDlgItem, LoadImageW, SetWindowPos, OffsetRect
                                                                GDI32.dllCombineRgn, SetRectRgn, CreateRectRgnIndirect, CreateRectRgn, SetBkMode, CreateFontIndirectW, GetObjectW, ExtTextOutW, SetBkColor, GetDeviceCaps, SetTextColor, EnumFontsW, CreateSolidBrush, SelectObject, DeleteObject, PatBlt
                                                                COMDLG32.dllGetOpenFileNameW
                                                                ADVAPI32.dllRegCloseKey, RegOpenKeyW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegDeleteValueW, CryptAcquireContextW, RegOpenKeyExW, CryptGetHashParam, CryptDestroyHash, CryptHashData, CryptReleaseContext, CryptCreateHash
                                                                SHELL32.dllDragQueryFileW, SHGetDesktopFolder, SHGetFolderPathW, SHGetFileInfoW, CommandLineToArgvW, ShellExecuteW, ShellExecuteExW, SHGetKnownFolderPath, SHCreateItemFromParsingName
                                                                ole32.dllCoCreateInstance, ReleaseStgMedium, OleDuplicateData, DoDragDrop, CoUninitialize, OleInitialize, OleUninitialize, RegisterDragDrop, CoTaskMemFree, CoTaskMemAlloc, CoInitializeEx
                                                                gdiplus.dllGdipDeleteGraphics, GdipCreateFromHDC, GdipAddPathArcI, GdipClosePathFigure, GdipStartPathFigure, GdipResetPath, GdipDeletePath, GdipCreatePath, GdipSetPenDashStyle, GdipDeletePen, GdipCreatePen1, GdipDrawRectangleI, GdipAlloc, GdipFree, GdiplusShutdown, GdiplusStartup, GdipDrawPath
                                                                COMCTL32.dllInitCommonControlsEx, ImageList_GetImageCount, ImageList_GetImageInfo
                                                                VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 25, 2024 18:51:45.552912951 CEST497382967192.168.2.4158.220.80.167
                                                                Oct 25, 2024 18:51:45.558635950 CEST296749738158.220.80.167192.168.2.4
                                                                Oct 25, 2024 18:51:45.558753967 CEST497382967192.168.2.4158.220.80.167
                                                                Oct 25, 2024 18:51:45.563097000 CEST497382967192.168.2.4158.220.80.167
                                                                Oct 25, 2024 18:51:45.568798065 CEST296749738158.220.80.167192.168.2.4
                                                                Oct 25, 2024 18:51:48.027631044 CEST296749738158.220.80.167192.168.2.4
                                                                Oct 25, 2024 18:51:48.027774096 CEST497382967192.168.2.4158.220.80.167
                                                                Oct 25, 2024 18:51:48.027901888 CEST497382967192.168.2.4158.220.80.167
                                                                Oct 25, 2024 18:51:48.028340101 CEST497392967192.168.2.4158.220.80.167
                                                                Oct 25, 2024 18:51:48.033226967 CEST296749738158.220.80.167192.168.2.4
                                                                Oct 25, 2024 18:51:48.033934116 CEST296749739158.220.80.167192.168.2.4
                                                                Oct 25, 2024 18:51:48.034013033 CEST497392967192.168.2.4158.220.80.167
                                                                Oct 25, 2024 18:51:48.035166979 CEST497392967192.168.2.4158.220.80.167
                                                                Oct 25, 2024 18:51:48.040625095 CEST296749739158.220.80.167192.168.2.4
                                                                Oct 25, 2024 18:51:51.706547976 CEST296749739158.220.80.167192.168.2.4
                                                                Oct 25, 2024 18:51:51.706676960 CEST497392967192.168.2.4158.220.80.167
                                                                Oct 25, 2024 18:51:51.706990957 CEST497392967192.168.2.4158.220.80.167
                                                                Oct 25, 2024 18:51:51.707211018 CEST497402967192.168.2.4158.220.80.167
                                                                Oct 25, 2024 18:51:51.712502003 CEST296749739158.220.80.167192.168.2.4
                                                                Oct 25, 2024 18:51:51.712716103 CEST296749740158.220.80.167192.168.2.4
                                                                Oct 25, 2024 18:51:51.712799072 CEST497402967192.168.2.4158.220.80.167
                                                                Oct 25, 2024 18:51:51.713594913 CEST497402967192.168.2.4158.220.80.167
                                                                Oct 25, 2024 18:51:51.719238997 CEST296749740158.220.80.167192.168.2.4
                                                                Oct 25, 2024 18:51:51.719300032 CEST497402967192.168.2.4158.220.80.167

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:12:51:13
                                                                Start date:25/10/2024
                                                                Path:C:\Users\user\Desktop\iQPxJrxxaj.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\iQPxJrxxaj.exe"
                                                                Imagebase:0x560000
                                                                File size:1'361'408 bytes
                                                                MD5 hash:FD379C5ED778EA1000DA0B8C9458F7F8
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_PikaBot, Description: Yara detected PikaBot, Source: 00000000.00000003.1821764268.00000000049D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_PikaBot, Description: Yara detected PikaBot, Source: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:1
                                                                Start time:12:51:18
                                                                Start date:25/10/2024
                                                                Path:C:\Windows\SysWOW64\ctfmon.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\SysWOW64\ctfmon.exe -p 1234"
                                                                Imagebase:0xb50000
                                                                File size:9'728 bytes
                                                                MD5 hash:1B19D302D7FFA3D0901B3D990A4E8E12
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:8.1%
                                                                  Dynamic/Decrypted Code Coverage:33.8%
                                                                  Signature Coverage:32%
                                                                  Total number of Nodes:1468
                                                                  Total number of Limit Nodes:41
                                                                  execution_graph 57326 628b03 57327 628b0c 57326->57327 57334 62929c IsProcessorFeaturePresent 57327->57334 57329 628b18 57335 62d45c 10 API calls 2 library calls 57329->57335 57331 628b1d 57332 628b21 57331->57332 57336 62d47b 7 API calls 2 library calls 57331->57336 57334->57329 57335->57331 57336->57332 57337 643800 GetStartupInfoW 57338 6438b1 57337->57338 57339 64381d 57337->57339 57339->57338 57343 64a372 57339->57343 57341 643845 57341->57338 57342 643875 GetFileType 57341->57342 57342->57341 57344 64a37e __FrameHandler3::FrameUnwindToState 57343->57344 57345 64a387 57344->57345 57346 64a3a8 57344->57346 57364 6301c2 14 API calls __Wcrtomb 57345->57364 57356 63dd9d EnterCriticalSection 57346->57356 57349 64a38c 57365 62ec4f 39 API calls __Getctype 57349->57365 57350 64a3b4 57355 64a3e0 57350->57355 57357 64a2c2 57350->57357 57353 64a396 57353->57341 57366 64a407 LeaveCriticalSection std::_Lockit::~_Lockit 57355->57366 57356->57350 57367 642656 57357->57367 57359 64a2d4 57363 64a2e1 57359->57363 57374 6464ed 6 API calls std::_Lockit::_Lockit 57359->57374 57361 64a336 57361->57350 57375 64261c 14 API calls 2 library calls 57363->57375 57364->57349 57365->57353 57366->57353 57372 642663 __Wcrtomb 57367->57372 57368 6426a3 57377 6301c2 14 API calls __Wcrtomb 57368->57377 57369 64268e RtlAllocateHeap 57370 6426a1 57369->57370 57369->57372 57370->57359 57372->57368 57372->57369 57376 63ec92 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 57372->57376 57374->57359 57375->57361 57376->57372 57377->57370 57378 534997c 57379 534999e 57378->57379 57380 53499b4 57379->57380 57382 5350670 4 API calls 57379->57382 57381 53499e0 57380->57381 57383 5350670 4 API calls 57380->57383 57500 5350670 57381->57500 57382->57380 57383->57381 57385 5349a03 57507 5352da4 57385->57507 57387 5349a36 57390 5349aed 57387->57390 57515 534fdf4 57387->57515 57856 534f5d0 GetLargePageMinimum AnyPopup GetParent 57387->57856 57521 5352164 57390->57521 57392 5349b10 57395 5349b55 57392->57395 57526 5352f70 57392->57526 57394 5349b68 GetLastActivePopup 57394->57395 57395->57394 57396 5349bc6 57395->57396 57397 534fdf4 2 API calls 57396->57397 57399 5349c37 57396->57399 57529 5352778 57396->57529 57397->57396 57400 5349c70 GetWindowTextLengthA 57399->57400 57400->57400 57401 5349cae GetShellWindow GetShellWindow 57400->57401 57403 5349d09 57401->57403 57402 5349d4b GetThreadUILanguage 57539 534f2a8 GetTopWindow 57402->57539 57403->57402 57405 534f2a8 GetTopWindow 57403->57405 57406 5349d9f 57403->57406 57405->57403 57407 534f2a8 GetTopWindow 57406->57407 57408 5349ded 57407->57408 57541 535225c 57408->57541 57410 5349dfc 57411 5350670 4 API calls 57410->57411 57412 5349e15 57411->57412 57413 5350670 4 API calls 57412->57413 57414 5349e87 57413->57414 57547 534844c 57414->57547 57501 5350681 GetDialogBaseUnits SetLastError 57500->57501 57503 53506ff GetThreadUILanguage 57501->57503 57505 5350744 GetLastError 57503->57505 57505->57385 57508 5352db7 SetLastError GetLargePageMinimum 57507->57508 57510 5352e42 lstrlenW 57508->57510 57512 5352e8c GetForegroundWindow SetLastError 57510->57512 57514 5352efc 57512->57514 57514->57387 57516 534fe01 GetShellWindow 57515->57516 57519 534fe5d GetWindowTextLengthW 57516->57519 57520 534ff1c 57519->57520 57520->57387 57522 535216c GetWindowTextLengthW 57521->57522 57524 53521c3 GetThreadUILanguage GetMessageTime 57522->57524 57524->57392 57528 5352f8d lstrlenW GetWindowTextLengthW 57526->57528 57528->57392 57530 5352781 57529->57530 57531 53527b4 GetDialogBaseUnits 57530->57531 57532 53527c9 GetTickCount 57530->57532 57531->57532 57534 5352873 GetLastError 57532->57534 57536 53528c9 57534->57536 57537 5352948 57536->57537 57538 535292e GetLastActivePopup 57536->57538 57537->57396 57538->57537 57540 534f2c6 57539->57540 57540->57403 57542 5352267 GetDialogBaseUnits 57541->57542 57544 53522ab 57542->57544 57545 53522df GetMessageTime GetWindowTextLengthA GetCurrentThread 57544->57545 57546 53522bc GetLastActivePopup 57544->57546 57545->57410 57546->57545 57549 534848d 57547->57549 57548 53484cf GetCurrentThreadId 57869 5350a70 57548->57869 57549->57548 57550 534ddb4 5 API calls 57549->57550 57553 534855c 57549->57553 57874 5352ab8 57549->57874 57550->57548 57554 5348619 57553->57554 58072 534fdc0 GetLastActivePopup GetLargePageMinimum 57553->58072 57557 534865d GetLargePageMinimum 57554->57557 57558 5348672 57554->57558 57556 5348609 GetUserDefaultLangID 57556->57554 57557->57558 57559 534877d 57558->57559 57560 534876c GetThreadUILanguage 57558->57560 57878 534edd8 57559->57878 57560->57559 57563 5348843 57882 534d82c 57563->57882 57565 534e2e4 GetModuleHandleW 57565->57563 57566 53488cf 57568 534d82c 6 API calls 57566->57568 57567 534886d 57567->57566 58073 5351228 57567->58073 57571 53488ee 57568->57571 57570 53489e9 57573 5350a70 2 API calls 57570->57573 57571->57570 57572 534f6d0 3 API calls 57571->57572 57572->57570 57574 5348a2f 57573->57574 57575 5348a72 57574->57575 57576 534ec6c 3 API calls 57574->57576 57577 534d82c 6 API calls 57575->57577 57576->57575 57579 5348a86 57577->57579 57578 5348ad7 GetWindowTextLengthW 57890 534fdc0 GetLastActivePopup GetLargePageMinimum 57578->57890 57579->57578 57581 534ec6c 3 API calls 57579->57581 57583 5348ac8 57581->57583 57582 5348b02 57584 534edd8 GetLastActivePopup 57582->57584 57583->57578 57585 5348b1d 57584->57585 57891 5352b74 57585->57891 57588 534edd8 GetLastActivePopup 57589 5348b5b 57588->57589 57590 5352b74 GetWindowTextLengthW 57589->57590 57591 5348b7e 57590->57591 57592 5352ab8 GetCurrentThreadId 57591->57592 57593 5348b8d 57592->57593 57895 534ddb4 57593->57895 57595 5348ba1 GetForegroundWindow GetWindowTextLengthA 57596 5348be2 57595->57596 57597 5348bfa 57596->57597 57601 534d82c 6 API calls 57596->57601 57598 5348c1f SetLastError 57597->57598 58076 5351fe4 GetDialogBaseUnits GetSystemDefaultLangID GetOEMCP 57597->58076 57600 5348c41 57598->57600 57602 5352ab8 GetCurrentThreadId 57600->57602 57601->57597 57604 5348c61 57602->57604 57603 5348c79 57900 534fdc0 GetLastActivePopup GetLargePageMinimum 57603->57900 57604->57603 57606 534ddb4 5 API calls 57604->57606 57606->57603 57607 5348c9a GetLastActivePopup GetLastActivePopup GetLastActivePopup 57608 5348cd2 57607->57608 57901 534ec6c 57608->57901 57612 5348d28 57613 5352ab8 GetCurrentThreadId 57612->57613 57614 5348d3c 57613->57614 57615 5348d5e GetTopWindow 57614->57615 57617 5348d85 57614->57617 57615->57617 57616 5348db2 57908 534f6d0 57616->57908 57617->57616 58077 5351fe4 GetDialogBaseUnits GetSystemDefaultLangID GetOEMCP 57617->58077 57621 534d82c 6 API calls 57622 5348e0c 57621->57622 57916 534e2e4 57622->57916 57624 5348ed6 GetThreadUILanguage 57629 5348f15 57624->57629 57626 534d82c 6 API calls 57627 5348ebf 57626->57627 58078 5351fe4 GetDialogBaseUnits GetSystemDefaultLangID GetOEMCP 57627->58078 57630 5348f85 GetModuleHandleW 57629->57630 57632 5348fc3 57629->57632 57631 5350a70 2 API calls 57630->57631 57631->57629 57633 534d82c 6 API calls 57632->57633 57634 5348fe8 GetThreadUILanguage 57633->57634 57635 5349035 GetTickCount 57634->57635 57635->57635 57637 534905e GetLastError 57635->57637 57638 53490d0 57637->57638 57639 53490f8 57638->57639 57641 534edd8 GetLastActivePopup 57638->57641 57920 534fdc0 GetLastActivePopup GetLargePageMinimum 57639->57920 57641->57639 57642 534911f 57643 534ec6c 3 API calls 57642->57643 57644 534913d 57643->57644 57645 5352b74 GetWindowTextLengthW 57644->57645 57646 5349180 GetLastError GetParent 57645->57646 57646->57646 57647 53491b2 57646->57647 57648 534ddb4 5 API calls 57647->57648 57649 53491c0 57647->57649 57648->57649 57650 534ddb4 5 API calls 57649->57650 57651 5349257 57649->57651 57650->57649 57921 534df38 57651->57921 57656 534c008 8 API calls 57657 53492bb 57656->57657 57658 534c008 8 API calls 57657->57658 57659 53492d3 57658->57659 57935 534b85c RtlAllocateHeap 57659->57935 57661 534934a 57936 534a8a0 57661->57936 57663 53496ff 57975 5341097 57663->57975 57668 53493b3 57668->57663 57672 53494bb 57668->57672 58079 534fdc0 GetLastActivePopup GetLargePageMinimum 57668->58079 57671 5349466 GetSystemDefaultLangID 57671->57668 57674 5351228 2 API calls 57672->57674 57676 53494df 57674->57676 57675 5349544 GetTopWindow 57677 534957a 57675->57677 57676->57675 57678 534df38 GetWindowTextLengthA 57676->57678 57680 53495b4 GetLastActivePopup 57677->57680 57679 534951c 57678->57679 57681 5352b74 GetWindowTextLengthW 57679->57681 57682 53495f6 GetOEMCP 57680->57682 57683 534953a 57681->57683 57682->57682 57684 5349609 57682->57684 57683->57675 57685 5351228 2 API calls 57684->57685 57686 534968f 57685->57686 57687 534e2e4 GetModuleHandleW 57686->57687 57689 53496bb 57687->57689 57688 53496d3 57690 5351228 2 API calls 57688->57690 57689->57688 57691 5350a70 2 API calls 57689->57691 57690->57663 57691->57688 57856->57387 57871 5350a9b GetWindowTextLengthW 57869->57871 57872 5350b3c GetSystemDefaultLangID 57871->57872 57872->57549 57875 5352ac7 GetCurrentThreadId 57874->57875 57877 5352b49 57875->57877 57877->57549 57880 534edf4 GetLastActivePopup 57878->57880 57881 534879a 57880->57881 57881->57563 57881->57565 57883 534d838 57882->57883 57884 534d8c2 GetLastActivePopup 57883->57884 57885 534d8b0 GetOEMCP 57883->57885 57887 534d90e GetForegroundWindow 57884->57887 57885->57884 57888 534d98a GetForegroundWindow GetDesktopWindow GetSystemDefaultLangID 57887->57888 57888->57567 57890->57582 57892 5352b9e GetWindowTextLengthW 57891->57892 57894 5348b40 57892->57894 57894->57588 57898 534ddbd GetLargePageMinimum 57895->57898 57897 534de74 GetWindowTextLengthW GetDesktopWindow GetModuleHandleW GetLastError 57897->57595 57898->57897 57900->57607 57902 534ec75 GetForegroundWindow GetParent 57901->57902 57905 534ed29 57902->57905 57904 5348d02 57907 534fdc0 GetLastActivePopup GetLargePageMinimum 57904->57907 57905->57904 57906 534ed74 GetLastActivePopup 57905->57906 57906->57904 57907->57612 57909 534f6ea GetUserDefaultLangID 57908->57909 57911 534f725 GetLargePageMinimum 57909->57911 57914 534f742 GetTopWindow 57911->57914 57915 5348dec 57914->57915 57915->57621 57917 534e2f4 57916->57917 57918 534e305 GetModuleHandleW 57917->57918 57919 5348e7a 57917->57919 57918->57919 57919->57624 57919->57626 57920->57642 57922 534df44 57921->57922 57923 534df51 GetWindowTextLengthA 57922->57923 57924 534927e 57922->57924 57923->57924 57925 534c008 57924->57925 57926 534c084 57925->57926 57928 534c025 57925->57928 57927 534e2e4 GetModuleHandleW 57926->57927 57929 534c09c 57927->57929 57930 534c05b GetOEMCP 57928->57930 58081 534fdc0 GetLastActivePopup GetLargePageMinimum 57929->58081 57930->57930 57932 534c06e 57930->57932 58080 534cf24 GetTopWindow GetDialogBaseUnits GetCurrentThreadId GetDialogBaseUnits 57932->58080 57934 53492a9 57934->57656 57935->57661 57937 534a8b6 57936->57937 57938 5351228 2 API calls 57937->57938 57939 534a90d GetUserDefaultLangID 57938->57939 57940 534a931 57939->57940 57941 534a94e 57940->57941 57943 534edd8 GetLastActivePopup 57940->57943 57942 5351228 2 API calls 57941->57942 57944 534a98e 57942->57944 57943->57941 57945 534edd8 GetLastActivePopup 57944->57945 57947 534a9b5 57945->57947 57946 534edd8 GetLastActivePopup 57946->57947 57947->57946 57948 534ec6c 3 API calls 57947->57948 57949 534aa04 57947->57949 57948->57947 57950 534aa4c 57949->57950 57952 534ec6c 3 API calls 57949->57952 57951 534ec6c 3 API calls 57950->57951 57953 534aa7f 57951->57953 57952->57950 57954 534d82c 6 API calls 57953->57954 57955 534aad7 CreateToolhelp32Snapshot 57953->57955 57954->57953 57958 534ab56 57955->57958 57956 534ab5b 57957 5341065 89 API calls 57956->57957 57960 534ab69 57957->57960 57958->57956 57959 534abb0 57958->57959 57961 5350a70 2 API calls 57958->57961 57962 5351228 2 API calls 57959->57962 57960->57668 57963 534ab95 57961->57963 57968 534abf2 57962->57968 58082 534fdc0 GetLastActivePopup GetLargePageMinimum 57963->58082 57965 534acbc GetLargePageMinimum AnyPopup 57966 5352b74 GetWindowTextLengthW 57965->57966 57966->57968 57967 534df38 GetWindowTextLengthA 57967->57968 57968->57956 57968->57965 57968->57967 57970 534ade0 57968->57970 58083 534cda8 GetOEMCP 57968->58083 57970->57968 57972 534ae3a 57970->57972 58084 534108d 93 API calls 57970->58084 57973 5341065 89 API calls 57972->57973 57974 534ae48 57973->57974 57974->57960 58085 5341000 57975->58085 58072->57556 58074 535123d GetModuleHandleW GetOEMCP 58073->58074 58074->57566 58076->57598 58077->57616 58078->57624 58079->57671 58080->57934 58081->57934 58082->57959 58083->57968 58084->57970 58114 534c4b4 58085->58114 58115 534c4d6 GetLastError 58114->58115 58115->58115 58116 534c4f2 GetLastActivePopup 58115->58116 58161 535150c 58116->58161 58162 535151c SetLastError AnyPopup 58161->58162 58239 59b630 CreateDialogParamW ShowWindow BringWindowToTop SetForegroundWindow LoadAcceleratorsW 58240 59b72d 58239->58240 58246 59b6b1 58239->58246 58241 59b73e DestroyWindow 58240->58241 58242 59b734 PostQuitMessage 58240->58242 58244 59b74d 58241->58244 58242->58241 58243 59b6c6 GetMessageW 58245 59b72a 58243->58245 58243->58246 58245->58240 58246->58243 58246->58245 58247 59b6ee TranslateAcceleratorW 58246->58247 58247->58246 58248 59b704 IsDialogMessageW 58247->58248 58248->58246 58249 59b716 TranslateMessage DispatchMessageW 58248->58249 58249->58246 58250 59a730 58251 59a75a CoCreateInstance 58250->58251 58253 59a790 58251->58253 58257 59a7ec 58251->58257 58258 628947 58253->58258 58255 59a7a5 58266 59aa00 58255->58266 58259 62894c 58258->58259 58261 628966 58259->58261 58263 628968 std::_Facet_Register 58259->58263 58273 63dcf7 58259->58273 58280 63ec92 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 58259->58280 58261->58255 58281 62b679 RaiseException 58263->58281 58265 6294c0 58265->58255 58269 59aa11 58266->58269 58272 59aa1f 58266->58272 58268 59aa8b 58268->58257 58269->58272 58284 59b420 58269->58284 58272->58268 58288 59b190 58272->58288 58297 59ae90 41 API calls 58272->58297 58278 6426b3 __Wcrtomb 58273->58278 58274 6426f1 58283 6301c2 14 API calls __Wcrtomb 58274->58283 58276 6426dc RtlAllocateHeap 58277 6426ef 58276->58277 58276->58278 58277->58259 58278->58274 58278->58276 58282 63ec92 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 58278->58282 58280->58259 58281->58265 58282->58278 58283->58277 58285 59b42b 58284->58285 58286 59b44c std::ios_base::_Ios_base_dtor 58284->58286 58285->58284 58285->58286 58298 62ec5f 39 API calls __Getctype 58285->58298 58286->58269 58289 59b1b5 58288->58289 58290 59b1c3 58289->58290 58291 59b245 58289->58291 58292 59b1cf 58290->58292 58299 59b310 58290->58299 58307 59b370 58291->58307 58292->58272 58296 59b21f std::locale::_Locimp::_Locimp 58296->58272 58297->58272 58300 59b35c 58299->58300 58302 59b31d 58299->58302 58300->58300 58301 59b333 58303 59b33c 58301->58303 58305 628947 std::_Facet_Register 16 API calls 58301->58305 58302->58300 58302->58301 58304 628947 std::_Facet_Register 16 API calls 58302->58304 58303->58296 58304->58301 58306 59b355 58305->58306 58306->58296 58310 626661 58307->58310 58315 626581 40 API calls std::invalid_argument::invalid_argument 58310->58315 58312 626672 58316 62b679 RaiseException 58312->58316 58314 626680 58315->58312 58316->58314 58317 5a8a90 58323 5a8d80 GetWindowTextLengthW 58317->58323 58319 5a8aa4 EnumChildWindows GetCurrentThreadId EnumThreadWindows GetSystemMenu 58320 5a8ad9 58319->58320 58321 5a8ad1 58319->58321 58402 5a8af0 45 API calls 2 library calls 58321->58402 58324 5a8dc6 __fread_nolock 58323->58324 58325 5a8dd4 GetWindowTextW 58324->58325 58326 5a8e18 58325->58326 58327 5a8fa9 __fread_nolock 58325->58327 58403 59c1c0 58326->58403 58328 5a8fd4 GetClassNameW 58327->58328 58338 5a8ff2 58328->58338 58384 5a94c5 58328->58384 58330 59b420 39 API calls 58331 5a994b 58330->58331 58331->58319 58332 5a8eb6 58336 59b190 41 API calls 58332->58336 58333 5a9773 SendMessageW SendMessageW 58334 5a9936 SendMessageW 58333->58334 58335 5a97a4 SendMessageW 58333->58335 58334->58384 58371 5a97c6 std::ios_base::_Ios_base_dtor __fread_nolock 58335->58371 58337 5a8eb4 58336->58337 58339 59b420 39 API calls 58337->58339 58338->58333 58345 5a9073 58338->58345 58341 5a8ecd 58339->58341 58340 5a97d4 SendMessageW 58340->58371 58343 59b420 39 API calls 58341->58343 58342 5a8e4a 58342->58332 58344 5a8ea8 58342->58344 58364 5a8f0d std::ios_base::_Ios_base_dtor 58343->58364 58346 59b190 41 API calls 58344->58346 58347 5a90b3 GetWindowLongW 58345->58347 58353 5a91d3 58345->58353 58346->58337 58349 5a90c4 58347->58349 58347->58384 58348 59c1c0 41 API calls 58348->58371 58350 5a90cc GetWindowDC GetWindowRect GetParent MapWindowPoints 58349->58350 58349->58384 58352 5a9119 SendMessageW SelectObject 58350->58352 58350->58384 58351 5a996e 58413 62ec5f 39 API calls __Getctype 58351->58413 58355 5a913a 58352->58355 58356 5a913d DrawTextW 58352->58356 58357 5a9213 SendMessageW 58353->58357 58365 5a9389 58353->58365 58355->58356 58361 5a91bc SelectObject ReleaseDC 58356->58361 58362 5a9154 58356->58362 58391 5a922e __fread_nolock 58357->58391 58359 59b190 41 API calls 58359->58371 58360 5a8fb9 SetWindowTextW 58360->58327 58361->58384 58411 59b4a0 48 API calls 58362->58411 58364->58327 58364->58351 58364->58360 58375 5a93c7 __fread_nolock 58365->58375 58376 5a94d3 58365->58376 58366 5a9159 58412 59b530 8 API calls 58366->58412 58368 5a9163 MulDiv GetSystemMetrics GetSystemMetrics 58372 5a91b9 58368->58372 58373 5a91a2 MoveWindow 58368->58373 58369 5a937b 58369->58384 58370 5a98ed SendMessageW SendMessageW 58374 59b420 39 API calls 58370->58374 58371->58334 58371->58335 58371->58340 58371->58348 58371->58351 58371->58359 58371->58370 58372->58361 58373->58372 58374->58371 58378 5a93fc SendMessageW 58375->58378 58381 5a9513 __fread_nolock 58376->58381 58376->58384 58377 5a9265 SendMessageW 58377->58391 58380 5a9427 58378->58380 58379 59c1c0 41 API calls 58379->58391 58380->58380 58383 59c1c0 41 API calls 58380->58383 58382 5a952f SendMessageW 58381->58382 58382->58384 58399 5a955b std::ios_base::_Ios_base_dtor 58382->58399 58388 5a9440 58383->58388 58384->58330 58385 5a9572 SendMessageW 58385->58399 58386 59b190 41 API calls 58386->58391 58387 59b420 39 API calls 58387->58391 58390 59b190 41 API calls 58388->58390 58389 59c1c0 41 API calls 58389->58399 58393 5a94a6 58390->58393 58391->58369 58391->58377 58391->58379 58391->58386 58391->58387 58392 5a934c SendMessageW 58391->58392 58394 59b420 39 API calls 58392->58394 58395 59b420 39 API calls 58393->58395 58394->58391 58396 5a94ae SendMessageW 58395->58396 58397 59b420 39 API calls 58396->58397 58397->58384 58398 59b190 41 API calls 58398->58399 58399->58351 58399->58384 58399->58385 58399->58389 58399->58398 58400 5a973f SendMessageW 58399->58400 58401 59b420 39 API calls 58399->58401 58400->58399 58401->58399 58402->58320 58404 59c25c 58403->58404 58408 59c1d4 58403->58408 58405 59b370 41 API calls 58404->58405 58407 59c261 58405->58407 58406 59c1e1 std::locale::_Locimp::_Locimp 58406->58342 58407->58342 58408->58406 58409 59b310 16 API calls 58408->58409 58410 59c230 std::locale::_Locimp::_Locimp 58409->58410 58410->58342 58411->58366 58412->58368 58414 5dc3d0 58415 628947 std::_Facet_Register 16 API calls 58414->58415 58416 5dc5cb 58415->58416 58417 59c1c0 41 API calls 58416->58417 58418 5dc801 58417->58418 58571 5b0690 58418->58571 58420 5dc813 58421 5dc877 std::ios_base::_Ios_base_dtor 58420->58421 58423 5de0a7 58420->58423 58422 59c1c0 41 API calls 58421->58422 58424 5dc8bc 58422->58424 58588 62ec5f 39 API calls __Getctype 58423->58588 58426 5b0690 41 API calls 58424->58426 58432 5dc8ce std::ios_base::_Ios_base_dtor 58426->58432 58430 59c1c0 41 API calls 58431 5dc97a 58430->58431 58433 59c1c0 41 API calls 58431->58433 58432->58430 58434 5dc9a1 58433->58434 58435 5b0690 41 API calls 58434->58435 58436 5dc9b3 58435->58436 58437 59b190 41 API calls 58436->58437 58438 5dc9c9 58437->58438 58439 59b190 41 API calls 58438->58439 58440 5dc9d9 std::ios_base::_Ios_base_dtor 58439->58440 58441 59c1c0 41 API calls 58440->58441 58442 5dcaba 58441->58442 58443 5b0690 41 API calls 58442->58443 58446 5dcacc std::ios_base::_Ios_base_dtor 58443->58446 58444 59c1c0 41 API calls 58445 5dcb75 58444->58445 58447 5b0690 41 API calls 58445->58447 58446->58444 58449 5dcb87 std::ios_base::_Ios_base_dtor 58447->58449 58448 59c1c0 41 API calls 58450 5dcc30 58448->58450 58449->58448 58451 5b0690 41 API calls 58450->58451 58453 5dcc42 std::ios_base::_Ios_base_dtor 58451->58453 58452 59c1c0 41 API calls 58454 5dcceb 58452->58454 58453->58452 58455 5b0690 41 API calls 58454->58455 58457 5dccfd std::ios_base::_Ios_base_dtor 58455->58457 58456 59c1c0 41 API calls 58458 5dcda6 58456->58458 58457->58456 58459 5b0690 41 API calls 58458->58459 58461 5dcdb8 std::ios_base::_Ios_base_dtor 58459->58461 58460 59c1c0 41 API calls 58462 5dce61 58460->58462 58461->58460 58463 5b0690 41 API calls 58462->58463 58466 5dce73 std::ios_base::_Ios_base_dtor 58463->58466 58464 59c1c0 41 API calls 58465 5dcf1c 58464->58465 58467 5b0690 41 API calls 58465->58467 58466->58464 58469 5dcf2e std::ios_base::_Ios_base_dtor 58467->58469 58468 59c1c0 41 API calls 58470 5dcfd7 58468->58470 58469->58468 58471 5b0690 41 API calls 58470->58471 58473 5dcfe9 std::ios_base::_Ios_base_dtor 58471->58473 58472 59c1c0 41 API calls 58474 5dd092 58472->58474 58473->58472 58475 5b0690 41 API calls 58474->58475 58478 5dd0a4 std::ios_base::_Ios_base_dtor 58475->58478 58476 59c1c0 41 API calls 58477 5dd14d 58476->58477 58479 5b0690 41 API calls 58477->58479 58478->58476 58481 5dd15f std::ios_base::_Ios_base_dtor 58479->58481 58480 59c1c0 41 API calls 58482 5dd2b1 58480->58482 58481->58480 58483 5b0690 41 API calls 58482->58483 58485 5dd2c3 std::ios_base::_Ios_base_dtor 58483->58485 58484 59c1c0 41 API calls 58486 5dd36c 58484->58486 58485->58484 58487 5b0690 41 API calls 58486->58487 58489 5dd37e std::ios_base::_Ios_base_dtor 58487->58489 58488 59c1c0 41 API calls 58490 5dd427 58488->58490 58489->58488 58491 5b0690 41 API calls 58490->58491 58493 5dd439 std::ios_base::_Ios_base_dtor 58491->58493 58492 59c1c0 41 API calls 58494 5dd4e4 58492->58494 58493->58492 58495 59c1c0 41 API calls 58494->58495 58496 5dd50b 58495->58496 58497 5b0690 41 API calls 58496->58497 58498 5dd51d 58497->58498 58499 59b190 41 API calls 58498->58499 58500 5dd533 58499->58500 58501 59b190 41 API calls 58500->58501 58503 5dd543 std::ios_base::_Ios_base_dtor 58501->58503 58502 59c1c0 41 API calls 58504 5dd626 58502->58504 58503->58502 58505 59c1c0 41 API calls 58504->58505 58506 5dd64d 58505->58506 58507 5b0690 41 API calls 58506->58507 58508 5dd65f 58507->58508 58509 59b190 41 API calls 58508->58509 58510 5dd675 58509->58510 58511 59b190 41 API calls 58510->58511 58513 5dd685 std::ios_base::_Ios_base_dtor 58511->58513 58512 59c1c0 41 API calls 58514 5dd768 58512->58514 58513->58512 58515 59c1c0 41 API calls 58514->58515 58516 5dd78f 58515->58516 58517 5b0690 41 API calls 58516->58517 58518 5dd7a1 58517->58518 58519 59b190 41 API calls 58518->58519 58520 5dd7b7 58519->58520 58521 59b190 41 API calls 58520->58521 58523 5dd7c7 std::ios_base::_Ios_base_dtor 58521->58523 58522 59c1c0 41 API calls 58524 5dd8aa 58522->58524 58523->58522 58525 59c1c0 41 API calls 58524->58525 58526 5dd8d1 58525->58526 58527 5b0690 41 API calls 58526->58527 58528 5dd8e3 58527->58528 58529 59b190 41 API calls 58528->58529 58530 5dd8f9 58529->58530 58531 59b190 41 API calls 58530->58531 58535 5dd909 std::ios_base::_Ios_base_dtor 58531->58535 58532 59c1c0 41 API calls 58533 5dd9ea 58532->58533 58534 5b0690 41 API calls 58533->58534 58537 5dd9fc std::ios_base::_Ios_base_dtor 58534->58537 58535->58532 58536 59c1c0 41 API calls 58538 5ddaa5 58536->58538 58537->58536 58539 5b0690 41 API calls 58538->58539 58541 5ddab7 std::ios_base::_Ios_base_dtor 58539->58541 58540 59c1c0 41 API calls 58542 5ddb60 58540->58542 58541->58540 58543 5b0690 41 API calls 58542->58543 58545 5ddb72 std::ios_base::_Ios_base_dtor 58543->58545 58544 59c1c0 41 API calls 58546 5ddc1b 58544->58546 58545->58544 58547 5b0690 41 API calls 58546->58547 58549 5ddc2d std::ios_base::_Ios_base_dtor 58547->58549 58548 59c1c0 41 API calls 58550 5ddcd6 58548->58550 58549->58548 58551 5b0690 41 API calls 58550->58551 58554 5ddce8 std::ios_base::_Ios_base_dtor 58551->58554 58552 59c1c0 41 API calls 58553 5ddd91 58552->58553 58555 5b0690 41 API calls 58553->58555 58554->58552 58557 5ddda3 std::ios_base::_Ios_base_dtor 58555->58557 58556 59c1c0 41 API calls 58558 5dde4c 58556->58558 58557->58556 58559 5b0690 41 API calls 58558->58559 58561 5dde5e std::ios_base::_Ios_base_dtor 58559->58561 58560 59c1c0 41 API calls 58562 5ddf07 58560->58562 58561->58560 58563 5b0690 41 API calls 58562->58563 58566 5ddf19 std::ios_base::_Ios_base_dtor 58563->58566 58564 59c1c0 41 API calls 58565 5ddfc2 58564->58565 58567 5b0690 41 API calls 58565->58567 58566->58564 58570 5ddfd4 std::ios_base::_Ios_base_dtor 58567->58570 58568 5de042 CoCreateInstance 58569 5de06e 58568->58569 58570->58568 58572 59b190 41 API calls 58571->58572 58573 5b06cc 58572->58573 58574 59c1c0 41 API calls 58573->58574 58575 5b0768 58574->58575 58576 59b420 39 API calls 58575->58576 58579 5b0777 std::ios_base::_Ios_base_dtor 58575->58579 58576->58579 58577 5b08ad 58589 59d850 41 API calls 58577->58589 58578 5b0802 58582 59c1c0 41 API calls 58578->58582 58579->58577 58579->58578 58585 5b0832 58579->58585 58584 5b0821 58582->58584 58584->58585 58586 59b420 39 API calls 58584->58586 58587 5b088e std::ios_base::_Ios_base_dtor 58585->58587 58590 62ec5f 39 API calls __Getctype 58585->58590 58586->58585 58587->58420 58591 5353598 58594 534bbac SetLastError 58591->58594 58595 534bbd0 58594->58595 58609 534cfb8 58595->58609 58600 534bc6f 58601 534bc9c 58600->58601 58602 534cfb8 GetSystemDefaultLangID 58600->58602 58620 535131c 58601->58620 58602->58601 58605 534bcc7 58625 534b8bc 58605->58625 58607 534bd38 58610 534cfc9 GetSystemDefaultLangID 58609->58610 58612 534bc29 GetOEMCP 58610->58612 58613 535264c 58612->58613 58614 5352657 GetTopWindow 58613->58614 58616 53526bc 58614->58616 58617 53526d1 GetCurrentThreadId 58616->58617 58618 53526e6 lstrlenW 58616->58618 58617->58618 58618->58600 58621 5351336 GetMessageTime 58620->58621 58623 5351377 GetSystemDefaultLangID 58621->58623 58623->58605 58697 53465d8 58625->58697 58628 534b8cb 58628->58607 58684 534bd40 58628->58684 59328 534e1c0 58684->59328 58686 534bda2 58689 534e1c0 2 API calls 58686->58689 58691 534bdba 58686->58691 58689->58691 58690 535264c 3 API calls 58690->58691 58691->58690 58692 534bee7 58691->58692 59334 534b85c RtlAllocateHeap 58692->59334 58694 534bf0b 59335 53498f4 58694->59335 58698 53465e4 58697->58698 58699 53466ad GetOEMCP 58698->58699 59205 534f108 58698->59205 58700 5346703 58699->58700 58701 53466eb 58699->58701 58704 535058c 3 API calls 58700->58704 59210 5352084 GetOEMCP 58701->59210 58706 5346746 58704->58706 58705 5346694 GetTopWindow 58705->58699 58707 5351790 2 API calls 58706->58707 58708 534678a 58707->58708 59155 5341079 58708->59155 58710 53467bd 58710->58628 58715 53462a8 GetTickCount 58710->58715 58712 5351790 2 API calls 58713 5346816 58712->58713 58713->58710 59215 5353328 58713->59215 58716 53462c7 58715->58716 58717 534f108 3 API calls 58716->58717 58718 5346308 58717->58718 58719 534e000 GetUserDefaultLangID 58718->58719 58720 5346327 GetLargePageMinimum 58719->58720 58721 5346357 58720->58721 58722 534638e 58721->58722 59223 5353454 GetForegroundWindow GetUserDefaultLangID 58721->59223 59221 53502e0 GetTickCount 58722->59221 58726 5346374 GetCurrentThread 58726->58722 58727 5341083 93 API calls 58728 53463d0 58727->58728 58729 534f108 3 API calls 58728->58729 58734 53465b0 58728->58734 58731 5346452 58729->58731 58730 53513d4 4 API calls 58730->58731 58731->58730 58732 535058c 3 API calls 58731->58732 58735 5346538 58731->58735 59230 53515c0 58731->59230 58732->58731 58734->58628 58738 5346184 GetSystemDefaultLangID 58734->58738 58735->58734 58736 53513d4 4 API calls 58735->58736 58737 5346596 GetSystemDefaultLangID 58736->58737 58737->58734 58739 534f108 3 API calls 58738->58739 58740 53461c9 58739->58740 59233 534d76c 58740->59233 59156 5341000 71 API calls 59155->59156 59157 534107e 59156->59157 59158 5341000 71 API calls 59157->59158 59159 5341083 59158->59159 59160 5341000 71 API calls 59159->59160 59161 534108d 59160->59161 59162 5341000 71 API calls 59161->59162 59163 5341097 59162->59163 59164 5341000 71 API calls 59163->59164 59165 53410a1 59164->59165 59166 5341000 71 API calls 59165->59166 59167 53410ab 59166->59167 59168 5341000 71 API calls 59167->59168 59169 53410b5 59168->59169 59170 5341000 71 API calls 59169->59170 59171 53410bf 59170->59171 59172 5341000 71 API calls 59171->59172 59173 53410c9 59172->59173 59174 5341000 71 API calls 59173->59174 59175 53410d3 59174->59175 59176 5341000 71 API calls 59175->59176 59177 53410dd 59176->59177 59178 5341000 71 API calls 59177->59178 59179 53410e7 59178->59179 59180 53513d4 4 API calls 59179->59180 59182 534113b 59180->59182 59181 5341165 59183 534eb18 3 API calls 59181->59183 59182->59181 59184 534eb18 3 API calls 59182->59184 59185 53411c1 CreateToolhelp32Snapshot 59183->59185 59184->59181 59187 5341224 Process32FirstW 59185->59187 59188 534121d 59185->59188 59189 53412a9 59187->59189 59190 5341249 59187->59190 59188->58710 59188->58712 59193 53412c6 AnyPopup 59189->59193 59200 534137e 59189->59200 59220 534cda8 GetOEMCP 59189->59220 59192 5341065 89 API calls 59190->59192 59196 5341251 59192->59196 59195 535058c 3 API calls 59193->59195 59194 5341276 59197 5351790 2 API calls 59194->59197 59198 5341306 GetLastError 59195->59198 59196->59194 59199 534e000 GetUserDefaultLangID 59196->59199 59197->59188 59201 534132b 59198->59201 59199->59194 59202 5341065 89 API calls 59200->59202 59203 5341065 89 API calls 59201->59203 59204 5341386 59202->59204 59203->59188 59204->59204 59206 534f118 GetShellWindow GetTickCount 59205->59206 59208 534f13e lstrlenW 59206->59208 59208->58705 59211 535209e GetLastActivePopup GetModuleHandleW 59210->59211 59213 53520e0 GetDialogBaseUnits GetWindowTextLengthW 59211->59213 59213->58700 59217 535334a GetLargePageMinimum 59215->59217 59219 5353407 GetWindowTextLengthW 59217->59219 59219->58710 59220->59189 59222 53463a7 59221->59222 59222->58727 59224 5353474 GetDesktopWindow 59223->59224 59227 53534a1 GetTopWindow 59224->59227 59229 535353c AnyPopup 59227->59229 59229->58726 59231 53515c9 GetTickCount GetCurrentThreadId 59230->59231 59235 534d7b5 GetThreadUILanguage GetUserDefaultLangID 59233->59235 59329 534e1ea 59328->59329 59330 534e1fc GetUserDefaultLangID 59329->59330 59331 534e21a GetMessageTime 59329->59331 59330->59331 59333 534bd67 59331->59333 59333->58686 59357 534d16c AnyPopup AnyPopup GetLastActivePopup 59333->59357 59334->58694 59336 53498fc 59335->59336 59337 5349922 59336->59337 59338 534990d GetSystemDefaultLangID 59336->59338 59358 53472a4 GetDesktopWindow 59337->59358 59338->59337 59357->58686 59360 53472dc 59358->59360 59359 5347337 GetLargePageMinimum 59359->59360 59360->59359 59362 53473ef 59360->59362 59391 535050c GetDialogBaseUnits GetCurrentThreadId 59360->59391 59396 534e6d4 59362->59396 59392 535054b GetDesktopWindow 59391->59392 59395 5350568 GetLastError 59392->59395 59395->59360 59397 534e6e3 GetThreadUILanguage 59396->59397 59399 534741f 59397->59399 59400 53507b0 GetForegroundWindow 59399->59400 59401 534745d 59400->59401 59402 535099c GetLastError 59401->59402 59403 5347478 59402->59403 59404 534a6ac 59403->59404 59405 534a6e0 59404->59405 59424 534da00 GetUserDefaultLangID 59405->59424 59409 534a731 59411 534e6d4 GetThreadUILanguage 59409->59411 59415 534a772 59409->59415 59417 534a755 59411->59417 59414 534a801 59446 534b85c RtlAllocateHeap 59414->59446 59437 534ea00 59415->59437 59417->59415 59473 534f300 GetOEMCP GetOEMCP GetOEMCP GetParent 59417->59473 59418 534a80f 59447 534684c 59418->59447 59421 534a830 59472 534b88c RtlFreeHeap 59421->59472 59423 534a87c 59425 534da2a GetOEMCP 59424->59425 59427 534da63 GetLastActivePopup GetTopWindow 59425->59427 59429 534a70d 59427->59429 59430 534f860 GetForegroundWindow 59429->59430 59431 534f893 GetCurrentThreadId 59430->59431 59433 534f8c9 AnyPopup 59431->59433 59436 534f966 GetCurrentThread GetLastError 59433->59436 59436->59409 59438 534ea16 GetCurrentThreadId 59437->59438 59440 534ea6a 59438->59440 59441 534ea7f GetDialogBaseUnits 59440->59441 59442 534ea91 lstrlenW 59440->59442 59441->59442 59444 534a7f5 59442->59444 59445 534b85c RtlAllocateHeap 59444->59445 59445->59414 59446->59418 59474 534e3dc GetLargePageMinimum 59447->59474 59450 53468c0 59451 53469eb 59450->59451 59489 5351098 GetCurrentThreadId AnyPopup GetMessageTime GetLastError 59450->59489 59480 534b85c RtlAllocateHeap 59451->59480 59454 5346a53 59481 534cdd8 59454->59481 59456 5346e58 GetWindowTextLengthW 59488 534b88c RtlFreeHeap 59456->59488 59458 5346a71 59458->59456 59460 5346ae4 SetLastError 59458->59460 59468 5346ada 59458->59468 59459 5346e87 59459->59421 59461 534e3dc 3 API calls 59460->59461 59461->59468 59463 5346be3 GetParent 59463->59468 59465 5351838 SetLastError 59465->59468 59466 534f9b0 GetParent GetTickCount GetWindowTextLengthW 59466->59468 59467 534e3dc 3 API calls 59467->59468 59468->59458 59468->59460 59468->59463 59468->59465 59468->59466 59468->59467 59469 5352974 GetLastActivePopup GetThreadUILanguage 59468->59469 59490 5351d28 GetTopWindow GetLastError GetTopWindow 59468->59490 59491 5351098 GetCurrentThreadId AnyPopup GetMessageTime GetLastError 59468->59491 59492 534db3c GetWindowTextLengthA GetModuleHandleW 59468->59492 59469->59468 59471 5346dbf GetThreadUILanguage 59471->59468 59472->59423 59473->59415 59475 534e405 GetParent 59474->59475 59477 534e459 GetParent 59475->59477 59479 5346877 GetParent 59477->59479 59479->59450 59480->59454 59482 534cdee GetCurrentThreadId 59481->59482 59493 534e910 59482->59493 59486 534ce41 GetShellWindow 59486->59486 59487 534ce5b 59486->59487 59487->59458 59488->59459 59489->59450 59490->59468 59491->59468 59492->59471 59494 534e929 59493->59494 59495 534e936 GetLargePageMinimum 59494->59495 59496 534e941 GetSystemDefaultLangID 59494->59496 59495->59496 59498 534ce36 59496->59498 59498->59486 59509 6235f0 59520 6258b0 59509->59520 59511 623677 59514 59df80 92 API calls 59511->59514 59512 623602 59512->59511 59571 59df80 59512->59571 59515 62367c 59514->59515 59517 623636 #412 59519 623647 EnumChildWindows GetCurrentThreadId EnumThreadWindows RedrawWindow 59517->59519 59518 62361e #410 59518->59519 59519->59511 59521 6258d6 59520->59521 59522 6258e9 59520->59522 59521->59512 59523 6258ee 59522->59523 59524 59c1c0 41 API calls 59522->59524 59523->59512 59525 625929 59524->59525 59581 5ad450 59525->59581 59527 62593b 59528 62596f std::ios_base::_Ios_base_dtor 59527->59528 59531 625b3a 59527->59531 59599 59e6d0 41 API calls std::ios_base::_Ios_base_dtor 59528->59599 59530 6259a5 59533 625aa1 59530->59533 59600 6301c2 14 API calls __Wcrtomb 59530->59600 59606 62ec5f 39 API calls __Getctype 59531->59606 59537 625ade 59533->59537 59541 625b14 std::ios_base::_Ios_base_dtor 59533->59541 59544 59b420 39 API calls 59533->59544 59535 625b3f 59607 626641 41 API calls CallUnexpected 59535->59607 59537->59541 59546 625b7b 59537->59546 59538 6259c3 59601 630093 50 API calls 2 library calls 59538->59601 59539 59b420 39 API calls 59542 625b26 59539->59542 59540 625b49 59608 626681 41 API calls 2 library calls 59540->59608 59541->59539 59542->59512 59544->59533 59613 62ec5f 39 API calls __Getctype 59546->59613 59547 625b53 59609 626641 41 API calls CallUnexpected 59547->59609 59548 6259ec 59548->59535 59551 6259fe 59548->59551 59551->59540 59554 625a0a 59551->59554 59553 625b5d 59610 626681 41 API calls 2 library calls 59553->59610 59602 6301c2 14 API calls __Wcrtomb 59554->59602 59557 625b67 59611 626641 41 API calls CallUnexpected 59557->59611 59558 625a0f 59603 630093 50 API calls 2 library calls 59558->59603 59560 625b71 59612 626681 41 API calls 2 library calls 59560->59612 59562 625a39 59562->59547 59564 625a4b 59562->59564 59564->59553 59565 625a57 59564->59565 59604 6301c2 14 API calls __Wcrtomb 59565->59604 59567 625a5c 59605 630093 50 API calls 2 library calls 59567->59605 59569 625a84 59569->59557 59570 625a95 59569->59570 59570->59533 59570->59560 59572 59dfe7 59571->59572 59573 59dfae 59571->59573 59572->59517 59572->59518 59640 628a29 AcquireSRWLockExclusive 59573->59640 59575 59dfb8 59575->59572 59645 59e040 InitCommonControlsEx SHGetKnownFolderPath 59575->59645 59577 59dfd0 59723 628cc9 42 API calls 59577->59723 59579 59dfda 59724 6289d8 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 59579->59724 59582 5ad4ab 59581->59582 59583 5ad4ad GetFileVersionInfoSizeW 59581->59583 59582->59583 59585 5ad4ca __fread_nolock 59583->59585 59593 5ad638 std::ios_base::_Ios_base_dtor 59583->59593 59584 5ad539 GetFileVersionInfoW VerQueryValueW 59614 5b09b0 59584->59614 59585->59584 59585->59593 59588 5ad588 59590 59b420 39 API calls 59588->59590 59589 59b420 39 API calls 59589->59588 59591 5ad5c6 VerQueryValueW 59590->59591 59594 5ad5e8 59591->59594 59595 5ad60c 59591->59595 59593->59527 59594->59595 59624 59c7d0 59594->59624 59595->59593 59634 62ec5f 39 API calls __Getctype 59595->59634 59599->59530 59600->59538 59601->59548 59602->59558 59603->59562 59604->59567 59605->59569 59615 5b0a00 59614->59615 59616 5ad575 59614->59616 59635 5b1190 51 API calls _swprintf 59615->59635 59616->59588 59616->59589 59618 5b0a09 59618->59616 59636 5b0c50 41 API calls 59618->59636 59620 5b0a1f 59637 5b1160 51 API calls _swprintf 59620->59637 59622 5b0a3a 59638 5b0c50 41 API calls 59622->59638 59628 59c7e1 std::locale::_Locimp::_Locimp 59624->59628 59629 59c81d 59624->59629 59625 59c8da 59626 59b370 41 API calls 59625->59626 59627 59c8df 59626->59627 59628->59595 59629->59625 59630 59b310 16 API calls 59629->59630 59631 59c86c std::locale::_Locimp::_Locimp 59630->59631 59632 59c8be std::ios_base::_Ios_base_dtor 59631->59632 59639 62ec5f 39 API calls __Getctype 59631->59639 59632->59595 59635->59618 59636->59620 59637->59622 59638->59616 59641 628a3d 59640->59641 59642 628a42 ReleaseSRWLockExclusive 59641->59642 59725 628a78 SleepConditionVariableSRW 59641->59725 59642->59575 59646 59e140 59645->59646 59647 59e315 59645->59647 59652 59c7d0 41 API calls 59646->59652 59649 59e312 59647->59649 59648 59e32f LoadLibraryW 59650 59e539 59648->59650 59651 59e342 59648->59651 59649->59647 59649->59648 59653 59e565 std::ios_base::_Ios_base_dtor 59650->59653 59659 59e5c6 59650->59659 59651->59650 59656 59e35d GetProcAddress 59651->59656 59657 59e36c GetProcAddress 59651->59657 59654 59e169 CoTaskMemFree 59652->59654 59653->59577 59726 59e660 59654->59726 59660 59e379 10 API calls 59656->59660 59657->59660 59658 59e17f 59661 5ad450 57 API calls 59658->59661 59745 62ec5f 39 API calls __Getctype 59659->59745 59663 59e42a 59660->59663 59664 59e444 59660->59664 59665 59e18a 59661->59665 59663->59664 59667 59e432 GetProcAddress 59663->59667 59668 59e467 59664->59668 59672 59e455 GetProcAddress 59664->59672 59731 59e6d0 41 API calls std::ios_base::_Ios_base_dtor 59665->59731 59667->59664 59669 59e470 GetProcAddress 59668->59669 59670 59e482 59668->59670 59669->59670 59673 59e48b GetProcAddress 59670->59673 59674 59e49d 59670->59674 59672->59668 59673->59674 59676 59e4b8 59674->59676 59677 59e4a6 GetProcAddress 59674->59677 59675 59e1b6 59690 59e292 59675->59690 59732 6301c2 14 API calls __Wcrtomb 59675->59732 59678 59e4c1 GetProcAddress 59676->59678 59679 59e4d3 59676->59679 59677->59676 59678->59679 59683 59e4dc GetProcAddress 59679->59683 59684 59e4ee 59679->59684 59681 59e2c6 59687 59e300 std::ios_base::_Ios_base_dtor 59681->59687 59691 59e5c1 59681->59691 59682 59e1d4 59733 630093 50 API calls 2 library calls 59682->59733 59683->59684 59688 59e4f7 GetProcAddress 59684->59688 59689 59e506 59684->59689 59685 59b420 39 API calls 59685->59649 59686 59b420 39 API calls 59686->59690 59687->59685 59688->59689 59693 59e50f GetProcAddress 59689->59693 59694 59e51e 59689->59694 59690->59681 59690->59686 59690->59687 59744 62ec5f 39 API calls __Getctype 59691->59744 59693->59694 59694->59650 59697 59e527 GetProcAddress 59694->59697 59696 59e1f5 59698 59e585 59696->59698 59699 59e204 59696->59699 59697->59650 59738 626641 41 API calls CallUnexpected 59698->59738 59701 59e58f 59699->59701 59702 59e210 59699->59702 59739 626681 41 API calls 2 library calls 59701->59739 59734 6301c2 14 API calls __Wcrtomb 59702->59734 59705 59e215 59735 630093 50 API calls 2 library calls 59705->59735 59706 59e599 59740 626641 41 API calls CallUnexpected 59706->59740 59709 59e5a3 59741 626681 41 API calls 2 library calls 59709->59741 59710 59e237 59710->59706 59712 59e246 59710->59712 59712->59709 59715 59e252 59712->59715 59713 59e5ad 59742 626641 41 API calls CallUnexpected 59713->59742 59736 6301c2 14 API calls __Wcrtomb 59715->59736 59716 59e5b7 59743 626681 41 API calls 2 library calls 59716->59743 59719 59e257 59737 630093 50 API calls 2 library calls 59719->59737 59721 59e277 59721->59713 59722 59e286 59721->59722 59722->59690 59722->59716 59723->59579 59724->59572 59725->59641 59727 59e670 59726->59727 59727->59727 59730 59e68b std::locale::_Locimp::_Locimp 59727->59730 59746 59da70 41 API calls 2 library calls 59727->59746 59729 59e6ca 59729->59658 59730->59658 59731->59675 59732->59682 59733->59696 59734->59705 59735->59710 59736->59719 59737->59721 59746->59729 59747 622df0 59748 622e24 59747->59748 59767 622fcd 59747->59767 59749 628a29 3 API calls 59748->59749 59751 622e2e 59749->59751 59750 622fe3 59753 628947 std::_Facet_Register 16 API calls 59751->59753 59751->59767 59754 622e80 59753->59754 59786 5f4eb0 41 API calls 2 library calls 59754->59786 59756 622ed8 59757 59c1c0 41 API calls 59756->59757 59758 622f09 59757->59758 59759 5b0690 41 API calls 59758->59759 59760 622f1e 59759->59760 59761 622f94 std::ios_base::_Ios_base_dtor 59760->59761 59763 622ff6 59760->59763 59787 628cc9 42 API calls 59761->59787 59789 62ec5f 39 API calls __Getctype 59763->59789 59764 622fbc 59788 6289d8 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 59764->59788 59767->59750 59769 623000 59767->59769 59770 6258b0 58 API calls 59769->59770 59771 623011 59770->59771 59790 625490 SystemParametersInfoW 59771->59790 59774 623021 59852 5be380 55 API calls 59774->59852 59775 623035 59776 623084 59775->59776 59778 62304c GetTickCount64 59775->59778 59781 623033 59776->59781 59853 5be810 59776->59853 59780 623064 59778->59780 59780->59776 59782 6258b0 58 API calls 59781->59782 59785 6230c2 59781->59785 59783 6230b3 59782->59783 59784 59df80 92 API calls 59783->59784 59783->59785 59784->59785 59785->59750 59786->59756 59787->59764 59788->59767 59791 6254da GetSysColor 59790->59791 59800 625513 59790->59800 59860 625b90 59791->59860 59792 625537 59861 5be380 55 API calls 59792->59861 59793 62554b 59796 62559e 59793->59796 59799 625562 GetTickCount64 59793->59799 59798 5be810 3 API calls 59796->59798 59802 625549 59796->59802 59797 6254fa GetSysColor 59797->59800 59798->59802 59801 625578 59799->59801 59800->59792 59800->59793 59801->59796 59803 59c1c0 41 API calls 59802->59803 59805 6255d9 59802->59805 59810 623018 59802->59810 59804 625608 59803->59804 59806 5ad450 57 API calls 59804->59806 59807 59df80 92 API calls 59805->59807 59805->59810 59808 62561a 59806->59808 59807->59810 59809 62564e std::ios_base::_Ios_base_dtor 59808->59809 59812 625865 59808->59812 59862 59e6d0 41 API calls std::ios_base::_Ios_base_dtor 59809->59862 59810->59774 59810->59775 59869 62ec5f 39 API calls __Getctype 59812->59869 59813 62568b 59824 625772 59813->59824 59863 6301c2 14 API calls __Wcrtomb 59813->59863 59815 62586a 59870 626641 41 API calls CallUnexpected 59815->59870 59817 59b420 39 API calls 59817->59805 59819 6257b0 59825 6258a6 59819->59825 59826 6257ea std::ios_base::_Ios_base_dtor 59819->59826 59820 625874 59871 626681 41 API calls 2 library calls 59820->59871 59821 59b420 39 API calls 59821->59824 59822 6256b5 59864 630093 50 API calls 2 library calls 59822->59864 59824->59819 59824->59821 59824->59826 59876 62ec5f 39 API calls __Getctype 59825->59876 59826->59817 59829 62587e 59872 626641 41 API calls CallUnexpected 59829->59872 59830 6256d6 59830->59815 59833 6256e5 59830->59833 59833->59820 59834 6256f1 59833->59834 59865 6301c2 14 API calls __Wcrtomb 59834->59865 59835 625888 59873 626681 41 API calls 2 library calls 59835->59873 59838 6256fb 59866 630093 50 API calls 2 library calls 59838->59866 59839 625892 59874 626641 41 API calls CallUnexpected 59839->59874 59842 62589c 59875 626681 41 API calls 2 library calls 59842->59875 59844 625718 59844->59829 59845 625727 59844->59845 59845->59835 59846 625733 59845->59846 59867 6301c2 14 API calls __Wcrtomb 59846->59867 59848 62573b 59868 630093 50 API calls 2 library calls 59848->59868 59850 625758 59850->59839 59851 625766 59850->59851 59851->59824 59851->59842 59852->59781 59854 5be83a 59853->59854 59855 5be83c RegOpenKeyExW 59853->59855 59854->59855 59856 5be88a GetTickCount64 59855->59856 59857 5be855 59855->59857 59856->59781 59858 5be87d RegCloseKey 59857->59858 59859 5be872 59857->59859 59858->59856 59859->59858 59860->59797 59861->59802 59862->59813 59863->59822 59864->59830 59865->59838 59866->59844 59867->59848 59868->59850 59877 63c934 59880 63c768 59877->59880 59881 63c7a7 59880->59881 59882 63c795 59880->59882 59892 63c5f9 59881->59892 59907 62961c GetModuleHandleW 59882->59907 59885 63c79a 59885->59881 59908 63c849 GetModuleHandleExW 59885->59908 59887 63c7e4 59893 63c605 __FrameHandler3::FrameUnwindToState 59892->59893 59914 63dd9d EnterCriticalSection 59893->59914 59895 63c60f 59915 63c680 59895->59915 59897 63c61c 59919 63c63a 59897->59919 59900 63c7ff 59924 63c830 59900->59924 59902 63c809 59903 63c81d 59902->59903 59904 63c80d GetCurrentProcess TerminateProcess 59902->59904 59905 63c849 CallUnexpected 3 API calls 59903->59905 59904->59903 59906 63c825 ExitProcess 59905->59906 59907->59885 59909 63c8a9 59908->59909 59910 63c888 GetProcAddress 59908->59910 59912 63c7a6 59909->59912 59913 63c8af FreeLibrary 59909->59913 59910->59909 59911 63c89c 59910->59911 59911->59909 59912->59881 59913->59912 59914->59895 59917 63c68c __FrameHandler3::FrameUnwindToState CallUnexpected 59915->59917 59916 63c6f0 CallUnexpected 59916->59897 59917->59916 59922 63f714 14 API calls 3 library calls 59917->59922 59923 63dde5 LeaveCriticalSection 59919->59923 59921 63c628 59921->59887 59921->59900 59922->59916 59923->59921 59927 647ad3 5 API calls CallUnexpected 59924->59927 59926 63c835 CallUnexpected 59926->59902 59927->59926 59928 59f580 6 API calls 59929 59f688 59928->59929 59930 59f60e CreateRectRgn CreateRectRgnIndirect 59928->59930 59931 59f659 SetWindowRgn 59930->59931 59932 59f633 SetRectRgn CombineRgn 59930->59932 59931->59929 59933 59f66c 59931->59933 59932->59931 59932->59932 59936 59fa50 GetClientRect SetWindowPos IsZoomed 59933->59936 59935 59f673 ShowWindow 59935->59929 59937 59fa9e EnableWindow ShowWindow 59936->59937 59938 59fab7 EnableWindow ShowWindow 59936->59938 59937->59935 59938->59935 59939 59b9a0 59940 59b9b9 59939->59940 59941 59bd7b 59939->59941 59942 59ba40 GetWindowLongW 59940->59942 59943 59b9c5 SetWindowLongW CreateWindowExW SetWindowPos SendMessageW SendMessageW 59940->59943 59942->59941 59944 59ba56 59942->59944 59943->59942 59945 59bcfd 59944->59945 59946 59ba75 59944->59946 59949 59bd64 SetWindowLongW 59945->59949 59950 59bd04 59945->59950 59947 59bc09 59946->59947 59948 59ba7b 59946->59948 59973 59a4e0 7 API calls 59947->59973 59948->59949 59953 59ba8d 59948->59953 59974 59a4e0 7 API calls 59950->59974 59972 59a4e0 7 API calls 59953->59972 59954 59bd0c 59954->59949 59975 59a4e0 7 API calls 59954->59975 59955 59bc11 59955->59949 59957 59bc19 GetClientRect MapWindowPoints 59955->59957 59959 59bc7b PtInRect 59957->59959 59960 59bc4d PtInRect SetWindowLongW 59957->59960 59958 59ba95 59958->59949 59963 59ba9d DefDlgProcW GetClientRect 59958->59963 59961 59bcbd PtInRect 59959->59961 59962 59bce5 SetWindowLongW 59959->59962 59961->59962 59965 59bcca SetWindowLongW 59961->59965 59966 59bb0d 6 API calls 59963->59966 59967 59bad3 SetBkColor ExtTextOutW SetWindowLongW 59963->59967 59968 59bd25 59968->59949 59969 59bd29 GetProcAddress 59968->59969 59970 59bd5a 59969->59970 59971 59bd3d GetLastError SetWindowLongW 59969->59971 59970->59949 59972->59958 59973->59955 59974->59954 59975->59968 59976 5ada40 59978 5ada6d 59976->59978 59993 5adb99 std::ios_base::_Ios_base_dtor 59976->59993 59977 5adb0c 59980 59c1c0 41 API calls 59977->59980 59983 5ada98 59978->59983 59994 5adc80 59978->59994 59981 5adb49 59980->59981 60018 5ae7a0 41 API calls 59981->60018 59983->59977 59984 5adb9e 59983->59984 60019 5ae710 39 API calls 59984->60019 59986 5adbb6 59989 59c1c0 41 API calls 59986->59989 59990 5adbe9 59989->59990 60020 5ae7a0 41 API calls 59990->60020 59992 5adb61 59992->59993 60021 62ec5f 39 API calls __Getctype 59992->60021 59997 5adca7 __wsopen_s 59994->59997 59995 5ae0db 59995->59983 59996 5adcee 59999 59c7d0 41 API calls 59996->59999 59997->59995 59997->59996 59998 59b420 39 API calls 59997->59998 59998->59997 60000 5add1e 59999->60000 60001 59c7d0 41 API calls 60000->60001 60016 5add3f std::ios_base::_Ios_base_dtor __fread_nolock 60001->60016 60002 5b0640 51 API calls 60002->60016 60005 59c1c0 41 API calls 60005->60016 60007 5b0690 41 API calls 60007->60016 60008 59c7d0 41 API calls 60008->60016 60009 59b190 41 API calls 60009->60016 60010 5ae0bd std::ios_base::_Ios_base_dtor 60010->59983 60012 5ae079 60012->60010 60043 62ec5f 39 API calls __Getctype 60012->60043 60016->60002 60016->60005 60016->60007 60016->60008 60016->60009 60016->60012 60017 59b420 39 API calls 60016->60017 60022 5af0e0 60016->60022 60039 5af9f0 55 API calls _strftime 60016->60039 60040 5afa80 55 API calls _strftime 60016->60040 60041 5af780 55 API calls _strftime 60016->60041 60042 59ae90 41 API calls 60016->60042 60017->60016 60018->59992 60019->59986 60020->59992 60023 5af106 60022->60023 60025 5af14b 60022->60025 60024 5af117 GetTickCount64 60023->60024 60023->60025 60033 5af129 60024->60033 60026 5af191 RegOpenKeyExW 60025->60026 60028 5af157 60025->60028 60029 59c7d0 41 API calls 60025->60029 60030 5af1c8 60026->60030 60031 5af21f GetTickCount64 60026->60031 60028->60016 60029->60026 60032 59b190 41 API calls 60030->60032 60031->60016 60035 5af1d1 60032->60035 60033->60025 60034 5af20b RegCloseKey 60036 59b420 39 API calls 60034->60036 60035->60034 60037 5af1fd 60035->60037 60036->60031 60038 59c7d0 41 API calls 60037->60038 60038->60034 60039->60016 60040->60016 60041->60016 60042->60016 60044 5a77c0 60045 5a7832 60044->60045 60046 5a7805 60044->60046 60106 630251 60045->60106 60047 628a29 3 API calls 60046->60047 60048 5a780f 60047->60048 60048->60045 60116 628cc9 42 API calls 60048->60116 60051 5a785c 60055 628947 std::_Facet_Register 16 API calls 60051->60055 60070 5a791e std::ios_base::_Ios_base_dtor 60051->60070 60052 5a7825 60117 6289d8 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 60052->60117 60054 5a7935 PathFileExistsW 60056 5a7af9 60054->60056 60057 5a7944 60054->60057 60063 5a787c 60055->60063 60058 5a7964 60057->60058 60064 59c7d0 41 API calls 60057->60064 60122 5ab620 67 API calls std::_Facet_Register 60058->60122 60059 5a78da 60060 5a7906 60059->60060 60119 59df10 39 API calls std::ios_base::_Ios_base_dtor 60059->60119 60121 59df10 39 API calls std::ios_base::_Ios_base_dtor 60060->60121 60063->60059 60073 59c7d0 41 API calls 60063->60073 60118 5aa990 41 API calls std::_Facet_Register 60063->60118 60064->60058 60066 5a7a40 60123 5ab060 45 API calls std::_Facet_Register 60066->60123 60068 5a78ec 60120 5abe40 41 API calls 60068->60120 60070->60054 60072 5a7a79 60124 5ab490 85 API calls 60072->60124 60073->60063 60075 5a7a97 60125 5a2af0 41 API calls 2 library calls 60075->60125 60077 5a7adb 60078 5a7aee 60077->60078 60104 5a7b0e std::ios_base::_Ios_base_dtor __fread_nolock ___vcrt_InitializeCriticalSectionEx 60077->60104 60126 5a8870 77 API calls std::ios_base::_Ios_base_dtor 60078->60126 60082 5a869d MultiByteToWideChar 60082->60104 60083 5a8865 60136 62ec5f 39 API calls __Getctype 60083->60136 60084 5a87f2 60131 5aaf70 77 API calls 60084->60131 60088 5a87fd 60089 5a882a 60088->60089 60132 5a2af0 41 API calls 2 library calls 60088->60132 60133 59ada0 39 API calls std::ios_base::_Ios_base_dtor 60089->60133 60090 59c1c0 41 API calls 60090->60104 60093 5a8835 60134 5a8870 77 API calls std::ios_base::_Ios_base_dtor 60093->60134 60094 59ca00 41 API calls 60094->60104 60096 5a884b 60097 5a8860 60135 59d850 41 API calls 60097->60135 60099 59b190 41 API calls 60099->60104 60101 59b420 39 API calls 60101->60104 60102 59d7f0 41 API calls 60102->60104 60104->60082 60104->60083 60104->60084 60104->60090 60104->60094 60104->60097 60104->60099 60104->60101 60104->60102 60105 59c7d0 41 API calls 60104->60105 60127 5aa8d0 65 API calls 60104->60127 60128 634a2c GetStringTypeW _strftime 60104->60128 60129 5aa990 41 API calls std::_Facet_Register 60104->60129 60130 59c8e0 41 API calls 60104->60130 60105->60104 60107 630282 60106->60107 60108 63025f 60106->60108 60139 63029a 49 API calls 3 library calls 60107->60139 60108->60107 60109 630265 60108->60109 60137 6301c2 14 API calls __Wcrtomb 60109->60137 60111 630295 60111->60051 60113 63026a 60138 62ec4f 39 API calls __Getctype 60113->60138 60115 630275 60115->60051 60116->60052 60117->60045 60118->60063 60119->60068 60120->60060 60121->60070 60122->60066 60123->60072 60124->60075 60125->60077 60126->60056 60127->60104 60128->60104 60129->60104 60130->60104 60131->60088 60132->60089 60133->60093 60134->60096 60137->60113 60138->60115 60139->60111 60140 5f0f00 60266 59be30 GetDlgItem GetWindowTextLengthW 60140->60266 60142 5f0f4a IsDlgButtonChecked 60144 5f15ef SetDlgItemTextW GetDlgItem 60142->60144 60145 5f0f8e 60142->60145 60146 5f161f 60144->60146 60147 5f1616 EnableWindow 60144->60147 60148 5f153f SetDlgItemTextW GetDlgItem 60145->60148 60149 5f0fa1 60145->60149 60278 59bda0 GetDlgItem 60146->60278 60147->60146 60151 5f156a GetDlgItem 60148->60151 60152 5f1561 EnableWindow 60148->60152 60161 59c1c0 41 API calls 60149->60161 60153 5f159e GetDlgItem 60151->60153 60154 5f157a GetFocus 60151->60154 60152->60151 60158 5f15ae GetFocus 60153->60158 60159 5f15d2 GetDlgItem RedrawWindow 60153->60159 60156 5f1585 SendMessageW 60154->60156 60157 5f1593 EnableWindow 60154->60157 60155 5f1632 60160 59bda0 5 API calls 60155->60160 60156->60157 60157->60153 60162 5f15b9 SendMessageW 60158->60162 60163 5f15c7 EnableWindow 60158->60163 60164 5f1660 60159->60164 60165 5f1640 GetDlgItem RedrawWindow 60160->60165 60166 5f0fd9 60161->60166 60162->60163 60163->60159 60168 59be30 3 API calls 60164->60168 60165->60164 60167 59c1c0 41 API calls 60166->60167 60169 5f100b 60167->60169 60177 5f1673 60168->60177 60170 59c1c0 41 API calls 60169->60170 60171 5f1032 60170->60171 60269 59ca00 41 API calls std::ios_base::_Ios_base_dtor 60171->60269 60173 5f1801 GetDlgItem RedrawWindow IsDlgButtonChecked 60174 5f19f8 GetDlgItem RedrawWindow 60173->60174 60175 5f1834 60173->60175 60178 5f1a19 60174->60178 60181 59be30 3 API calls 60175->60181 60176 59b420 39 API calls 60182 5f1098 60176->60182 60177->60173 60183 59c1c0 41 API calls 60177->60183 60179 5f1a36 60285 62ec5f 39 API calls __Getctype 60179->60285 60180 5f1048 std::ios_base::_Ios_base_dtor 60180->60176 60180->60179 60198 5f1844 60181->60198 60185 59c1c0 41 API calls 60182->60185 60186 5f16fe 60183->60186 60188 5f10ba 60185->60188 60194 628947 std::_Facet_Register 16 API calls 60186->60194 60187 5f1a3b 60286 62ec5f 39 API calls __Getctype 60187->60286 60189 59c1c0 41 API calls 60188->60189 60191 5f10ed 60189->60191 60270 59ca00 41 API calls std::ios_base::_Ios_base_dtor 60191->60270 60196 5f174e 60194->60196 60195 5f1103 60197 59b420 39 API calls 60195->60197 60200 628947 std::_Facet_Register 16 API calls 60196->60200 60203 5f1111 std::ios_base::_Ios_base_dtor 60197->60203 60198->60174 60199 59c1c0 41 API calls 60198->60199 60201 5f18ce 60199->60201 60207 5f1772 60200->60207 60206 628947 std::_Facet_Register 16 API calls 60201->60206 60202 59c1c0 41 API calls 60204 5f117d 60202->60204 60203->60179 60203->60202 60205 59c1c0 41 API calls 60204->60205 60208 5f11a4 60205->60208 60211 5f191e 60206->60211 60210 59b420 39 API calls 60207->60210 60271 59ca00 41 API calls std::ios_base::_Ios_base_dtor 60208->60271 60212 5f17d8 60210->60212 60213 628947 std::_Facet_Register 16 API calls 60211->60213 60212->60173 60218 5f1942 60213->60218 60214 5f11ba std::ios_base::_Ios_base_dtor 60214->60179 60215 5f1232 std::ios_base::_Ios_base_dtor 60214->60215 60216 628947 std::_Facet_Register 16 API calls 60215->60216 60217 5f128c 60216->60217 60220 628947 std::_Facet_Register 16 API calls 60217->60220 60218->60174 60218->60187 60219 5f19d6 std::ios_base::_Ios_base_dtor 60218->60219 60219->60174 60221 5f12b0 60220->60221 60222 59b420 39 API calls 60221->60222 60223 5f1316 60222->60223 60224 5f134b 60223->60224 60225 5f1418 60223->60225 60272 5a9980 50 API calls std::_Facet_Register 60224->60272 60275 5a9980 50 API calls std::_Facet_Register 60225->60275 60228 5f1350 60273 5b7240 42 API calls std::ios_base::_Ios_base_dtor 60228->60273 60229 5f141d 60276 5b7240 42 API calls std::ios_base::_Ios_base_dtor 60229->60276 60232 5f1365 60274 5a8a00 41 API calls 60232->60274 60233 5f1432 60277 5a8a00 41 API calls 60233->60277 60236 5f1378 SetDlgItemTextW 60240 59b420 39 API calls 60236->60240 60237 5f1445 SetDlgItemTextW 60241 59b420 39 API calls 60237->60241 60242 5f13a6 60240->60242 60243 5f1473 60241->60243 60245 59b420 39 API calls 60242->60245 60244 59b420 39 API calls 60243->60244 60246 5f147f GetDlgItem 60244->60246 60247 5f13b2 GetDlgItem 60245->60247 60248 5f14b6 GetDlgItem 60246->60248 60249 5f1492 GetFocus 60246->60249 60250 5f13cb GetDlgItem 60247->60250 60251 5f13c2 EnableWindow 60247->60251 60256 5f14ea GetDlgItem 60248->60256 60257 5f14c6 GetFocus 60248->60257 60254 5f149d SendMessageW 60249->60254 60255 5f14ab EnableWindow 60249->60255 60252 5f13d8 EnableWindow 60250->60252 60253 5f13e1 GetDlgItem 60250->60253 60251->60250 60252->60253 60258 5f13ee EnableWindow 60253->60258 60259 5f13f7 GetDlgItem RedrawWindow 60253->60259 60254->60255 60255->60248 60262 5f151e GetDlgItem RedrawWindow 60256->60262 60263 5f14fa GetFocus 60256->60263 60260 5f14df EnableWindow 60257->60260 60261 5f14d1 SendMessageW 60257->60261 60258->60259 60259->60164 60260->60256 60261->60260 60262->60164 60264 5f1505 SendMessageW 60263->60264 60265 5f1513 EnableWindow 60263->60265 60264->60265 60265->60262 60267 59be6c __fread_nolock 60266->60267 60268 59be77 GetDlgItemTextW 60267->60268 60268->60142 60269->60180 60270->60195 60271->60214 60272->60228 60273->60232 60274->60236 60275->60229 60276->60233 60277->60237 60279 59bdbe 60278->60279 60280 59bdb7 60278->60280 60281 59bddb GetFocus 60279->60281 60282 59bdc6 KiUserCallbackDispatcher 60279->60282 60280->60155 60283 59bde5 SendMessageW 60281->60283 60284 59bdf4 KiUserCallbackDispatcher 60281->60284 60282->60155 60283->60284 60284->60155
                                                                  APIs
                                                                  • GetTopWindow.USER32 ref: 0534472C
                                                                  • GetThreadUILanguage.KERNEL32 ref: 05344788
                                                                  • SetLastError.KERNEL32 ref: 05344848
                                                                  • GetDesktopWindow.USER32 ref: 05344972
                                                                    • Part of subcall function 05351790: GetOEMCP.KERNEL32 ref: 0535179E
                                                                    • Part of subcall function 05351790: GetLastActivePopup.USER32 ref: 053517B9
                                                                  • GetShellWindow.USER32 ref: 05344E01
                                                                  • GetCurrentThread.KERNEL32 ref: 05344EAF
                                                                  • GetTopWindow.USER32 ref: 05344EBC
                                                                  • SetLastError.KERNEL32(?), ref: 053454C2
                                                                  • GetCurrentThreadId.KERNEL32 ref: 05345790
                                                                  • AnyPopup.USER32 ref: 05345806
                                                                  • SetLastError.KERNEL32 ref: 053458B0
                                                                  • GetTopWindow.USER32 ref: 053458E7
                                                                  • GetLastActivePopup.USER32(00000001), ref: 05345B21
                                                                  • GetForegroundWindow.USER32(00000001), ref: 05345CE4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$Last$ErrorPopupThread$ActiveCurrent$DesktopForegroundLanguageShell
                                                                  • String ID: An operation was attempted to a volume after it was dismounted.$AslPathWildcardFindFirst/Next failed to find a file [%x]$Built-in WEBP Codec$Business rule scripts are disabled for the calling application.$DebugProcessHeapOnly$Initializing TLS slots failed with status 0x%08lx$Invalid COM Descriptor virtual address encountered$Invalid value type$LdrpResGetMappingSize Exit$Microsoft Time-Stamp PCA 2010$NonRFGImageLoad$Nullsoft.NSIS$RtlStringCchPrintfW failed [%x]$STATUS_ABANDONED_WAIT_0$SXS: %s() NtMapViewOfSection failed$SdbpOpenLocalDatabaseEx$Specified present path is not in VidPN's topology.$The QUIC connection handshake failed.$The action type is not compatible with the layer.$The cloud sync provider failed user authentication.$The directory is a reparse point.$The operation is not supported by the specified layer.$The printer power has been turned off.$The remote user session has been deleted.$The requested system device cannot be found.$The specified object has already been initialized.$WER/CrashAPI:%u: TRACE WERP_DEBUGGER_INFO.ProtectionLevel: %08X${Virtual Memory Minimum Too Low}
                                                                  • API String ID: 1879556982-341976307
                                                                  • Opcode ID: 6946599b006502724313d815d1944d44cbc8b6df2b4ae2f94db59d08a37f616a
                                                                  • Instruction ID: f7304e2fe47d7073a1bd59b4b5d659eda159596f73852c3f785b38cd4347f44e
                                                                  • Opcode Fuzzy Hash: 6946599b006502724313d815d1944d44cbc8b6df2b4ae2f94db59d08a37f616a
                                                                  • Instruction Fuzzy Hash: F5D212749282988FEB11CF78D4853A97FF5FB05308F9488AED889DB301DA749985CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 519 59e040-59e13a InitCommonControlsEx SHGetKnownFolderPath 520 59e140-59e148 519->520 521 59e315-59e319 519->521 524 59e150-59e159 520->524 522 59e31b-59e320 521->522 523 59e322-59e329 521->523 525 59e32f-59e33c LoadLibraryW 522->525 526 59e32b 523->526 527 59e32e 523->527 524->524 528 59e15b-59e185 call 59c7d0 CoTaskMemFree call 59e660 call 5ad450 524->528 529 59e539-59e53f 525->529 530 59e342-59e349 525->530 526->527 527->525 550 59e18a-59e1c9 call 59e6d0 528->550 532 59e56f-59e584 529->532 533 59e541-59e553 529->533 530->529 534 59e34f-59e35b 530->534 537 59e565-59e56c call 628977 533->537 538 59e555-59e563 533->538 539 59e35d-59e36a GetProcAddress 534->539 540 59e36c-59e374 GetProcAddress 534->540 537->532 538->537 542 59e5c6-59e5cb call 62ec5f 538->542 544 59e379-59e428 GetProcAddress * 8 GetModuleHandleW GetProcAddress 539->544 540->544 548 59e42a-59e430 544->548 549 59e444-59e44b 544->549 548->549 552 59e432-59e43f GetProcAddress 548->552 553 59e44d-59e453 549->553 554 59e467-59e46e 549->554 564 59e1cf-59e1df call 6301c2 550->564 565 59e2ae-59e2b0 550->565 552->549 553->554 558 59e455-59e462 GetProcAddress 553->558 555 59e470-59e47d GetProcAddress 554->555 556 59e482-59e489 554->556 555->556 559 59e48b-59e498 GetProcAddress 556->559 560 59e49d-59e4a4 556->560 558->554 559->560 562 59e4b8-59e4bf 560->562 563 59e4a6-59e4b3 GetProcAddress 560->563 568 59e4c1-59e4ce GetProcAddress 562->568 569 59e4d3-59e4da 562->569 563->562 580 59e1e1 564->580 581 59e1e3-59e1fe call 630093 564->581 566 59e30a-59e312 call 59b420 565->566 567 59e2b2-59e2b6 565->567 566->521 571 59e2b8-59e2c4 call 59b420 567->571 572 59e2c6-59e2ea 567->572 568->569 574 59e4dc-59e4e9 GetProcAddress 569->574 575 59e4ee-59e4f5 569->575 571->572 578 59e2ec-59e2fa 572->578 579 59e300-59e307 call 628977 572->579 574->575 582 59e4f7-59e501 GetProcAddress 575->582 583 59e506-59e50d 575->583 578->579 586 59e5c1 call 62ec5f 578->586 579->566 580->581 595 59e585-59e58a call 626641 581->595 596 59e204-59e20a 581->596 582->583 589 59e50f-59e519 GetProcAddress 583->589 590 59e51e-59e525 583->590 586->542 589->590 590->529 594 59e527-59e534 GetProcAddress 590->594 594->529 598 59e58f-59e594 call 626681 595->598 596->598 599 59e210-59e221 call 6301c2 596->599 603 59e599-59e59e call 626641 598->603 604 59e223 599->604 605 59e225-59e240 call 630093 599->605 608 59e5a3-59e5a8 call 626681 603->608 604->605 605->603 611 59e246-59e24c 605->611 612 59e5ad-59e5b2 call 626641 608->612 611->608 614 59e252-59e261 call 6301c2 611->614 615 59e5b7-59e5bc call 626681 612->615 619 59e263 614->619 620 59e265-59e280 call 630093 614->620 615->586 619->620 620->612 623 59e286-59e28c 620->623 623->615 624 59e292-59e296 623->624 625 59e298 624->625 626 59e2a7 624->626 625->565 627 59e29a-59e29e 625->627 626->565 627->626 628 59e2a0-59e2a5 627->628 628->565 628->626
                                                                  APIs
                                                                  • InitCommonControlsEx.COMCTL32(?), ref: 0059E0EF
                                                                  • SHGetKnownFolderPath.SHELL32(00659740,00000000,00000000,00000000), ref: 0059E132
                                                                  • CoTaskMemFree.OLE32(00000000,00000000,-00000002), ref: 0059E16C
                                                                  • LoadLibraryW.KERNEL32(?), ref: 0059E32F
                                                                  • GetProcAddress.KERNEL32(00000000,AllowDarkModeForApp), ref: 0059E363
                                                                  • GetProcAddress.KERNEL32(00000000,SetPreferredAppMode), ref: 0059E372
                                                                  • GetProcAddress.KERNEL32(AllowDarkModeForWindow), ref: 0059E384
                                                                  • GetProcAddress.KERNEL32(ShouldAppsUseDarkMode), ref: 0059E396
                                                                  • GetProcAddress.KERNEL32(IsDarkModeAllowedForWindow), ref: 0059E3A8
                                                                  • GetProcAddress.KERNEL32(IsDarkModeAllowedForApp), ref: 0059E3BA
                                                                  • GetProcAddress.KERNEL32(ShouldSystemUseDarkMode), ref: 0059E3CC
                                                                  • GetProcAddress.KERNEL32(RefreshImmersiveColorPolicyState), ref: 0059E3DE
                                                                  • GetProcAddress.KERNEL32(GetIsImmersiveColorUsingHighContrast), ref: 0059E3F0
                                                                  • GetProcAddress.KERNEL32(FlushMenuThemes), ref: 0059E402
                                                                  • GetModuleHandleW.KERNEL32(user32.dll,SetWindowCompositionAttribute), ref: 0059E413
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0059E41A
                                                                  • GetProcAddress.KERNEL32(00000087), ref: 0059E43D
                                                                  • GetProcAddress.KERNEL32(00000087), ref: 0059E460
                                                                  • GetProcAddress.KERNEL32(00000085), ref: 0059E47B
                                                                  • GetProcAddress.KERNEL32(00000084), ref: 0059E496
                                                                  • GetProcAddress.KERNEL32(00000089), ref: 0059E4B1
                                                                  • GetProcAddress.KERNEL32(0000008B), ref: 0059E4CC
                                                                  • GetProcAddress.KERNEL32(0000008A), ref: 0059E4E7
                                                                  • GetProcAddress.KERNEL32(00000068), ref: 0059E4FF
                                                                  • GetProcAddress.KERNEL32(0000006A), ref: 0059E517
                                                                  • GetProcAddress.KERNEL32(00000088), ref: 0059E532
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$CommonControlsFolderFreeHandleInitKnownLibraryLoadModulePathTask
                                                                  • String ID: AllowDarkModeForApp$AllowDarkModeForWindow$FlushMenuThemes$GetIsImmersiveColorUsingHighContrast$IsDarkModeAllowedForApp$IsDarkModeAllowedForWindow$RefreshImmersiveColorPolicyState$SetPreferredAppMode$SetWindowCompositionAttribute$ShouldAppsUseDarkMode$ShouldSystemUseDarkMode$\uxtheme.dll$invalid stol argument$stol argument out of range$user32.dll$uxtheme.dll
                                                                  • API String ID: 1016854174-2742066203
                                                                  • Opcode ID: 9412fdde13e27784252e46781f4e9534afd3bfc3ba3034f64363e4e781a0ee68
                                                                  • Instruction ID: 6949abbc76811268f0df7c73fa6c547b408b10fe35ede68cfd077abe0b901577
                                                                  • Opcode Fuzzy Hash: 9412fdde13e27784252e46781f4e9534afd3bfc3ba3034f64363e4e781a0ee68
                                                                  • Instruction Fuzzy Hash: 53E1AFB4D102189FDF18DF64EC5ABAD7FB6FB05B04F042529E808AB2A4DB755980CF91
                                                                  APIs
                                                                  • GetCurrentThreadId.KERNEL32 ref: 053484DE
                                                                  • GetUserDefaultLangID.KERNEL32 ref: 05348613
                                                                  • GetLargePageMinimum.KERNEL32 ref: 05348667
                                                                  • GetThreadUILanguage.KERNEL32 ref: 05348777
                                                                  • GetWindowTextLengthW.USER32 ref: 05348AEE
                                                                  • GetForegroundWindow.USER32 ref: 05348BBC
                                                                  • GetWindowTextLengthA.USER32 ref: 05348BCA
                                                                  • SetLastError.KERNEL32(00000000), ref: 05348C35
                                                                  • GetLastActivePopup.USER32(00000000), ref: 05348CB6
                                                                  • GetLastActivePopup.USER32(Failed to get the database ID), ref: 05348CC0
                                                                  • GetLastActivePopup.USER32(?), ref: 05348CCA
                                                                  • GetTopWindow.USER32(00000000), ref: 05348D6F
                                                                  • GetThreadUILanguage.KERNEL32(00000000), ref: 05348EFF
                                                                  • GetModuleHandleW.KERNEL32 ref: 05348F9B
                                                                  • GetThreadUILanguage.KERNEL32 ref: 05349006
                                                                  • GetTickCount.KERNEL32 ref: 05349049
                                                                  • GetLastError.KERNEL32 ref: 05349098
                                                                  • GetLastError.KERNEL32 ref: 05349180
                                                                  • GetParent.USER32 ref: 0534918E
                                                                    • Part of subcall function 0534A8A0: GetUserDefaultLangID.KERNEL32 ref: 0534A90D
                                                                  • GetSystemDefaultLangID.KERNEL32 ref: 05349475
                                                                  • GetTopWindow.USER32 ref: 05349564
                                                                  • GetLastActivePopup.USER32(0000003F), ref: 053495B7
                                                                  • GetOEMCP.KERNEL32(82040462), ref: 053495F6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Last$Window$ActivePopupThread$DefaultErrorLangLanguage$LengthTextUser$CountCurrentForegroundHandleLargeMinimumModulePageParentSystemTick
                                                                  • String ID: #$&$2$?$A key manager capable of key dictation is already registered$An error occurred while NDIS tried to map the file.$DaylightBias$DefaultBrowser_NOPUBLISHERID$Failed to get the database ID$H$M$SXS: %s() BaseDllMapResourceIdA failed$The operation was blocked by parental controls.$[$^$drvGetDefaultCommConfigW
                                                                  • API String ID: 2889099878-380783571
                                                                  • Opcode ID: 6af329a8d55531f1a836f304488bc7d86ba5658f8c7de167ff66691de6e7bba4
                                                                  • Instruction ID: 99545cf59211e6444db9ec38a754fed176b6b436c79d6f48cf46f5992d81fc18
                                                                  • Opcode Fuzzy Hash: 6af329a8d55531f1a836f304488bc7d86ba5658f8c7de167ff66691de6e7bba4
                                                                  • Instruction Fuzzy Hash: 5BB2CE719252448FCB11DF69E48A6AABFF9FB44308FC485AEE488CF241EB359541CF85
                                                                  APIs
                                                                  • CoCreateInstance.OLE32(00659790,00000000,00000001,0066592C,?), ref: 005DE064
                                                                  Strings
                                                                  • Software\grepWinNP3\OpacityNoFocus, xrefs: 005DDF92
                                                                  • $!f, xrefs: 005DC77A
                                                                  • Software\grepWinNP3\DotMatchesNewline, xrefs: 005DD33C
                                                                  • }, xrefs: 005DDE4F
                                                                  • Software\grepWinNP3\SizeCombo, xrefs: 005DCA98
                                                                  • Software\grepWinNP3\Date1High, xrefs: 005DDBEB
                                                                  • Software\grepWinNP3\CaseSensitive, xrefs: 005DD28F
                                                                  • $!f, xrefs: 005DC7B6
                                                                  • Software\grepWinNP3\backupinfolder, xrefs: 005DD9C8
                                                                  • $!f, xrefs: 005DC798
                                                                  • Software\grepWinNP3\DateLimit, xrefs: 005DDA75
                                                                  • Software\grepWinNP3\IncludeBinary, xrefs: 005DCE31
                                                                  • Software\grepWinNP3\pattern, xrefs: 005DD4EC
                                                                  • 2000, xrefs: 005DC954
                                                                  • Software\grepWinNP3\searchpath, xrefs: 005DD770
                                                                  • $!f, xrefs: 005DC73E
                                                                  • Software\grepWinNP3\StayOnTop, xrefs: 005DDED7
                                                                  • Software\grepWinNP3\KeepFileDate, xrefs: 005DCFA7
                                                                  • Software\grepWinNP3\Date2High, xrefs: 005DDD61
                                                                  • Software\grepWinNP3\UseFileMatchRegex, xrefs: 005DD3F7
                                                                  • Software\grepWinNP3\IncludeSymLinks, xrefs: 005DCD76
                                                                  • Software\grepWinNP3\ExcludeDirsPattern, xrefs: 005DD62E
                                                                  • Software\grepWinNP3\ShowContent, xrefs: 005DDE1C
                                                                  • Software\grepWinNP3\IncludeHidden, xrefs: 005DCC00
                                                                  • Software\grepWinNP3\AllSize, xrefs: 005DC88C
                                                                  • Software\grepWinNP3\IncludeSubfolders, xrefs: 005DCCBB
                                                                  • $!f, xrefs: 005DC75C
                                                                  • Software\grepWinNP3\UseRegex, xrefs: 005DC7DC
                                                                  • Software\grepWinNP3\Size, xrefs: 005DC982
                                                                  • Software\grepWinNP3\WholeWords, xrefs: 005DD062
                                                                  • Software\grepWinNP3\Date1Low, xrefs: 005DDB30
                                                                  • Software\grepWinNP3\UTF8, xrefs: 005DD11D
                                                                  • Software\grepWinNP3\CreateBackup, xrefs: 005DCEEC
                                                                  • Software\grepWinNP3\editorcmd, xrefs: 005DD8B2
                                                                  • Software\grepWinNP3\IncludeSystem, xrefs: 005DCB45
                                                                  • Software\grepWinNP3\Date2Low, xrefs: 005DDCA6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CreateInstance
                                                                  • String ID: $!f$$!f$$!f$$!f$$!f$2000$Software\grepWinNP3\AllSize$Software\grepWinNP3\CaseSensitive$Software\grepWinNP3\CreateBackup$Software\grepWinNP3\Date1High$Software\grepWinNP3\Date1Low$Software\grepWinNP3\Date2High$Software\grepWinNP3\Date2Low$Software\grepWinNP3\DateLimit$Software\grepWinNP3\DotMatchesNewline$Software\grepWinNP3\ExcludeDirsPattern$Software\grepWinNP3\IncludeBinary$Software\grepWinNP3\IncludeHidden$Software\grepWinNP3\IncludeSubfolders$Software\grepWinNP3\IncludeSymLinks$Software\grepWinNP3\IncludeSystem$Software\grepWinNP3\KeepFileDate$Software\grepWinNP3\OpacityNoFocus$Software\grepWinNP3\ShowContent$Software\grepWinNP3\Size$Software\grepWinNP3\SizeCombo$Software\grepWinNP3\StayOnTop$Software\grepWinNP3\UTF8$Software\grepWinNP3\UseFileMatchRegex$Software\grepWinNP3\UseRegex$Software\grepWinNP3\WholeWords$Software\grepWinNP3\backupinfolder$Software\grepWinNP3\editorcmd$Software\grepWinNP3\pattern$Software\grepWinNP3\searchpath$}
                                                                  • API String ID: 542301482-2027641394
                                                                  • Opcode ID: 8d9a6534ce6907cbb6ac2cbe6d284181ae5ad13c9d894269ddb5aa8f04c2efe8
                                                                  • Instruction ID: 222fc85387bd49ca4c381e7ae77b60d0900e764ab02174c55103136c6472003f
                                                                  • Opcode Fuzzy Hash: 8d9a6534ce6907cbb6ac2cbe6d284181ae5ad13c9d894269ddb5aa8f04c2efe8
                                                                  • Instruction Fuzzy Hash: FC1346B0D01749AEDB64DFA8C89879EBFF1BF08304F10461EE059AB791E7796654CB80
                                                                  APIs
                                                                  • GetOEMCP.KERNEL32 ref: 0534164D
                                                                  • GetWindowTextLengthA.USER32 ref: 053417F5
                                                                  • GetDialogBaseUnits.USER32 ref: 05341D06
                                                                  • GetMessageTime.USER32 ref: 05341DFA
                                                                    • Part of subcall function 05350240: GetModuleHandleW.KERNEL32 ref: 053502B1
                                                                    • Part of subcall function 05350240: GetLastActivePopup.USER32(00000000), ref: 053502CC
                                                                  • GetShellWindow.USER32 ref: 0534208C
                                                                  • GetCurrentThreadId.KERNEL32 ref: 05342262
                                                                  • GetSystemDefaultLangID.KERNEL32 ref: 05342290
                                                                  • GetOEMCP.KERNEL32 ref: 05342331
                                                                  • GetDesktopWindow.USER32 ref: 0534240E
                                                                    • Part of subcall function 05351790: GetOEMCP.KERNEL32 ref: 0535179E
                                                                    • Part of subcall function 05351790: GetLastActivePopup.USER32 ref: 053517B9
                                                                  • GetModuleHandleW.KERNEL32 ref: 05342794
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0534280F
                                                                  • GetLastActivePopup.USER32 ref: 053428B6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ActiveLastPopupWindow$CurrentHandleModuleThread$BaseDefaultDesktopDialogLangLengthMessageShellSystemTextTimeUnits
                                                                  • String ID: Business rule scripts are disabled for the calling application.$Debugger received RIP exception.$Failed to get HWID$Floating-point inexact result.$Large Screen$MachinePreferredUILanguages$Network access is denied.$Object Path Component was not a directory object.$SXS: %s() NtMapViewOfSection failed$SdbpCheckPackageAttributes$The RPC call completed before all pipes were processed.$The cloud file provider exited unexpectedly.$The cluster node already exists.$The command was not recognized by the security core$The driver stack doesn't match the expected driver model.$rswop.icm$services.exe
                                                                  • API String ID: 474283001-2113168018
                                                                  • Opcode ID: 3c45c63fba451e4a94ab6442935b79bbc1ea36b13a8aee6a1cdfdb776b94dd66
                                                                  • Instruction ID: 47013d44f956d05c052a355bb6a4cd45e3cdfc85d33c86b7502fc8a338e38e75
                                                                  • Opcode Fuzzy Hash: 3c45c63fba451e4a94ab6442935b79bbc1ea36b13a8aee6a1cdfdb776b94dd66
                                                                  • Instruction Fuzzy Hash: E4C26835A142994ECB148FF998803EA7FF5FB46304F64D5BEE8889B241CA749985CF90
                                                                  APIs
                                                                  • GetWindowTextLengthA.USER32 ref: 053436DA
                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 05343798
                                                                  • GetMessageTime.USER32 ref: 053439B3
                                                                  • SetLastError.KERNEL32 ref: 05343AEE
                                                                  • GetForegroundWindow.USER32(00000000), ref: 05343D71
                                                                  • GetModuleHandleW.KERNEL32 ref: 05343EBF
                                                                    • Part of subcall function 0535058C: GetTopWindow.USER32 ref: 053505AC
                                                                    • Part of subcall function 0535058C: GetWindowTextLengthA.USER32 ref: 053505DC
                                                                    • Part of subcall function 0535058C: GetLargePageMinimum.KERNEL32(00000000), ref: 05350609
                                                                  • GetShellWindow.USER32 ref: 05343FF6
                                                                  • GetParent.USER32 ref: 05344041
                                                                  • GetOEMCP.KERNEL32 ref: 053440E3
                                                                  • GetThreadUILanguage.KERNEL32 ref: 053441ED
                                                                  • GetLastError.KERNEL32 ref: 05344305
                                                                  • GetUserDefaultLangID.KERNEL32 ref: 05344589
                                                                    • Part of subcall function 0534EB18: GetMessageTime.USER32 ref: 0534EB42
                                                                    • Part of subcall function 0534EB18: GetForegroundWindow.USER32 ref: 0534EB57
                                                                    • Part of subcall function 0534EB18: lstrlenW.KERNEL32 ref: 0534EC17
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$ErrorForegroundHandleLastLengthMessageModuleTextTime$DefaultLangLanguageLargeMinimumPageParentShellThreadUserlstrlen
                                                                  • String ID: AVRF: AVrfDllUnloadNotification called for a provider (%p) $AVRF: exception raised while probing provider %ws $FrontHeapLockCount$L$P$The callback data queue has been disabled.$The disk contains non-simple volumes.$The package is currently not available.$The server version does not match the requested version.$Too many Sids have been specified.$UUUUUUUU$Win32AppCompat${Mapped View Alignment Incorrect}
                                                                  • API String ID: 3832088895-2269772536
                                                                  • Opcode ID: 905de9bed24a97d2ba47f4c0c3a0676b17fad47045e560c02d71c2328006513b
                                                                  • Instruction ID: 93d041018959834fe93efb182f2374054bd5b9cfa2a752f5d04e9186f24b4cbd
                                                                  • Opcode Fuzzy Hash: 905de9bed24a97d2ba47f4c0c3a0676b17fad47045e560c02d71c2328006513b
                                                                  • Instruction Fuzzy Hash: C09232B19182988EDB51CF7894893A97FF9FB46304F54C8ADD8CD8B241CA34D985CFA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1800 534997c-534999c 1801 534999e-53499a5 1800->1801 1802 53499a7-53499ad 1801->1802 1803 53499be-53499d9 1801->1803 1802->1801 1804 53499af-53499b4 call 5350670 1802->1804 1805 53499ea-5349a3b call 5350670 call 5352da4 1803->1805 1806 53499db-53499e0 call 5350670 1803->1806 1804->1803 1815 5349a40-5349a4b 1805->1815 1806->1805 1815->1815 1816 5349a4d-5349a52 1815->1816 1817 5349a57-5349a6b 1816->1817 1818 5349a70-5349a74 1817->1818 1819 5349a76-5349a7c 1818->1819 1820 5349a8e-5349a9d 1818->1820 1821 5349a7e-5349a89 1819->1821 1822 5349a8b-5349a8c 1819->1822 1823 5349aa2-5349aab 1820->1823 1821->1820 1822->1818 1824 5349acd-5349ae7 call 534fdf4 1823->1824 1825 5349aad-5349ab5 1823->1825 1824->1817 1830 5349aed-5349b21 call 5352164 1824->1830 1825->1823 1826 5349ab7-5349ac3 call 534f5d0 1825->1826 1826->1824 1834 5349b26-5349b53 call 5352f70 1830->1834 1837 5349b55-5349b63 1834->1837 1838 5349b68-5349b86 GetLastActivePopup 1837->1838 1839 5349b8b-5349b91 1838->1839 1840 5349ba7-5349bc4 1839->1840 1841 5349b93-5349b9b 1839->1841 1840->1838 1843 5349bc6-5349bd0 1840->1843 1841->1839 1842 5349b9d-5349ba2 1841->1842 1842->1840 1844 5349bd5-5349be1 1843->1844 1844->1844 1845 5349be3-5349be8 1844->1845 1846 5349bf2-5349c35 call 534fdf4 call 5352778 1845->1846 1851 5349c37-5349c6b 1846->1851 1852 5349c70-5349cac GetWindowTextLengthA 1851->1852 1852->1852 1853 5349cae-5349d04 GetShellWindow * 2 1852->1853 1854 5349d09 1853->1854 1855 5349d0b-5349d12 1854->1855 1856 5349d14-5349d1a 1855->1856 1857 5349d4b-5349d99 GetThreadUILanguage call 534f2a8 1855->1857 1856->1855 1858 5349d1c-5349d41 call 534f2a8 1856->1858 1857->1854 1862 5349d9f-5349e44 call 53515e4 call 534f2a8 call 535225c call 5350670 1857->1862 1858->1857 1872 5349e49-5349e69 1862->1872 1872->1872 1873 5349e6b-5349ea1 call 5350670 call 534844c 1872->1873 1878 5349ea3-5349ea5 1873->1878 1879 5349eaa-5349f2d call 534fb34 call 534b85c GetThreadUILanguage 1873->1879 1880 534a6a3-534a6aa 1878->1880 1886 5349f30-5349f39 1879->1886 1887 5349f54-5349fa4 call 534fdf4 GetParent call 5341083 1886->1887 1888 5349f3b-5349f43 1886->1888 1894 5349fa6-5349faf 1887->1894 1888->1886 1889 5349f45-5349f4f 1888->1889 1889->1887 1895 5349fc5-5349fca 1894->1895 1896 5349fb1-5349fb7 1894->1896 1898 5349fd1-534a05a SetLastError call 534fdf4 call 5352da4 call 534b85c call 53410ab call 534b88c 1895->1898 1899 5349fcc call 5352da4 1895->1899 1896->1894 1897 5349fb9-5349fc3 1896->1897 1897->1899 1911 534a075-534a07a 1898->1911 1912 534a05c-534a070 1898->1912 1899->1898 1914 534a07f-534a085 1911->1914 1913 534a1de-534a1e9 1912->1913 1917 534a585-534a593 call 53410dd 1913->1917 1915 534a087-534a08f 1914->1915 1916 534a09b-534a162 call 53410b5 call 534b85c call 534b7e8 call 53410bf 1914->1916 1915->1914 1918 534a091 1915->1918 1934 534a1ee-534a206 call 534b88c 1916->1934 1935 534a168-534a183 GetCurrentThread 1916->1935 1925 534a598-534a5a2 GetDialogBaseUnits 1917->1925 1918->1916 1927 534a5ad-534a5b9 call 534b85c 1925->1927 1933 534a5bb-534a5c2 1927->1933 1937 534a5c4-534a5cb 1933->1937 1938 534a5d7-534a699 call 53410c9 call 53410d3 call 53410bf call 53410dd call 534b88c 1933->1938 1946 534a21f-534a22b 1934->1946 1936 534a188-534a1a8 call 5352778 1935->1936 1948 534a1aa-534a1b9 call 534b88c 1936->1948 1937->1933 1941 534a5cd 1937->1941 1938->1880 1941->1938 1946->1927 1947 534a231-534a2ad call 534b85c call 534b7e8 call 53410bf 1946->1947 1969 534a2b3-534a31f call 5351c34 call 5350670 call 5351c34 1947->1969 1970 534a208-534a214 call 534b88c 1947->1970 1957 534a1ca-534a1d9 1948->1957 1958 534a1bb-534a1c0 call 5352778 1948->1958 1957->1913 1958->1957 1979 534a324-534a332 1969->1979 1973 534a219 1970->1973 1973->1946 1980 534a334-534a345 1979->1980 1981 534a35b-534a374 call 534fdf4 1979->1981 1980->1979 1982 534a347-534a356 call 534fb34 1980->1982 1985 534a379-534a3a4 GetLastActivePopup 1981->1985 1982->1981 1985->1985 1987 534a3a6-534a3f3 call 5351c34 * 2 1985->1987 1991 534a3f8-534a416 call 5351f1c call 5352f70 1987->1991 1996 534a418-534a41f 1991->1996 1997 534a421-534a427 1996->1997 1998 534a433-534a457 GetThreadUILanguage call 5352da4 1996->1998 1997->1996 1999 534a429 1997->1999 2002 534a45c-534a462 1998->2002 1999->1998 2002->1925 2003 534a468-534a470 2002->2003 2003->2002 2004 534a472-534a4a0 call 5351f1c 2003->2004 2004->1991 2007 534a4a6-534a4b8 2004->2007 2008 534a4be-534a4c7 2007->2008 2009 534a4e2-534a513 2008->2009 2010 534a4c9-534a4d1 2008->2010 2011 534a518-534a524 2009->2011 2010->2008 2012 534a4d3-534a4dd 2010->2012 2013 534a529-534a531 2011->2013 2012->2009 2014 534a533-534a53c 2013->2014 2015 534a548-534a571 call 53515e4 2013->2015 2014->2013 2016 534a53e-534a543 2014->2016 2015->2011 2019 534a573-534a581 call 534b88c 2015->2019 2016->2015 2019->1917
                                                                  APIs
                                                                  • GetLastActivePopup.USER32 ref: 05349B75
                                                                  • GetWindowTextLengthA.USER32 ref: 05349C91
                                                                  • GetShellWindow.USER32 ref: 05349CCC
                                                                  • GetThreadUILanguage.KERNEL32 ref: 05349D55
                                                                    • Part of subcall function 0534FB34: lstrlenW.KERNEL32 ref: 0534FB79
                                                                    • Part of subcall function 0534FB34: GetWindowTextLengthW.USER32(00000000), ref: 0534FBC7
                                                                    • Part of subcall function 0534FB34: GetShellWindow.USER32 ref: 0534FBDD
                                                                    • Part of subcall function 0534FB34: SetLastError.KERNEL32 ref: 0534FC37
                                                                    • Part of subcall function 0534FB34: GetUserDefaultLangID.KERNEL32 ref: 0534FC3E
                                                                    • Part of subcall function 0534FB34: GetForegroundWindow.USER32 ref: 0534FC5F
                                                                    • Part of subcall function 0534B85C: RtlAllocateHeap.NTDLL(?,?,?,?,?,0534BF0B), ref: 0534B882
                                                                  • GetShellWindow.USER32 ref: 05349CE9
                                                                    • Part of subcall function 0534F2A8: GetTopWindow.USER32 ref: 0534F2BD
                                                                  • GetThreadUILanguage.KERNEL32 ref: 05349EE4
                                                                  • GetParent.USER32 ref: 05349F78
                                                                  • SetLastError.KERNEL32 ref: 05349FE3
                                                                  • GetCurrentThread.KERNEL32 ref: 0534A168
                                                                    • Part of subcall function 0534B88C: RtlFreeHeap.NTDLL ref: 0534B8B0
                                                                  • GetLastActivePopup.USER32(00000000), ref: 0534A38B
                                                                  • GetThreadUILanguage.KERNEL32 ref: 0534A43D
                                                                  • GetDialogBaseUnits.USER32 ref: 0534A5A2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$LastThread$LanguageShell$ActiveErrorHeapLengthPopupText$AllocateBaseCurrentDefaultDialogForegroundFreeLangParentUnitsUserlstrlen
                                                                  • String ID: *$,$;$@$An attempt was made to execute an illegal instruction.$AslpFileGetClrVersionAttribute failed [%x]$Error reading size data$InitOnceGetStringTableOffset$Microsoft Himalaya$[
                                                                  • API String ID: 3023793282-4021808248
                                                                  • Opcode ID: fc0bdf45dcef72c34bea12eb8bb6f76ea988013f99be597a76ac135c32e27516
                                                                  • Instruction ID: 0dcbab7b6e7b863737aa650ce28e99197452661343b0fdfc66cf9e6f688aa83d
                                                                  • Opcode Fuzzy Hash: fc0bdf45dcef72c34bea12eb8bb6f76ea988013f99be597a76ac135c32e27516
                                                                  • Instruction Fuzzy Hash: C7727AB5A243458FE710DF78D48A65ABBF9FB44348F80896EE489CB640EB74E940DF41

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2022 5342918-5342962 GetLargePageMinimum 2023 5342964-5342971 2022->2023 2023->2023 2024 5342973-5342977 2023->2024 2025 534297c-53429b7 2024->2025 2025->2025 2026 53429b9-53429c7 2025->2026 2027 53429c9-5342a15 2026->2027 2027->2027 2028 5342a17-5342b05 call 535058c GetForegroundWindow call 5353328 GetWindowTextLengthA call 5350240 2027->2028 2035 5342b07-5342b14 2028->2035 2035->2035 2036 5342b16-5342b18 2035->2036 2037 5342b1a 2036->2037 2038 5342b1c-5342b25 2037->2038 2039 5342b27-5342b2d 2038->2039 2040 5342b3b-5342b40 2038->2040 2039->2038 2041 5342b2f-5342b39 2039->2041 2042 5342b42-5342b56 call 53502e0 2040->2042 2043 5342b58 2040->2043 2041->2042 2045 5342b62-5342b9b call 535058c 2042->2045 2043->2045 2049 5342ba0-5342ba6 2045->2049 2050 5342bd3-5342c31 call 5352084 call 53502e0 2049->2050 2051 5342ba8-5342bb0 2049->2051 2059 5342c33-5342c3c 2050->2059 2051->2049 2053 5342bb2-5342bc9 call 5353454 2051->2053 2053->2050 2060 5342c53-5342c56 2059->2060 2061 5342c3e-5342c45 2059->2061 2063 5342c8d-5342c92 2060->2063 2064 5342c58-5342c8b call 53513d4 2060->2064 2061->2059 2062 5342c47-5342c51 2061->2062 2062->2064 2066 5342c97-5342cfe call 5350240 * 2 2063->2066 2064->2066 2066->2037 2072 5342d04-5342d08 2066->2072 2073 5342d0a-5342dad GetTickCount GetTopWindow call 534eb18 2072->2073 2076 5342db3-5342e31 call 5353328 call 53513d4 lstrlenW 2073->2076 2081 5342e32-5342e3f 2076->2081 2081->2081 2082 5342e41-5342e43 2081->2082 2083 5342e45-5342e76 2082->2083 2084 5342e7c-5342e80 2083->2084 2085 5342e82-5342e87 2084->2085 2086 5342ebe-5342ef9 GetLastActivePopup 2084->2086 2087 5342e89-5342ea5 call 5353454 2085->2087 2088 5342ebb-5342ebc 2085->2088 2086->2083 2089 5342eff-5342f03 2086->2089 2092 5342eaa-5342eb9 2087->2092 2088->2084 2091 5342f05-5342f51 2089->2091 2091->2091 2093 5342f53-5342f87 2091->2093 2092->2086 2094 5342f93-5342f9f 2093->2094 2095 5342f89 2093->2095 2096 5342fa5-5342fb3 2094->2096 2095->2094 2096->2096 2097 5342fb5-5342fd6 2096->2097 2098 5342fdb 2097->2098 2099 5342fe0-5342fe4 2098->2099 2100 5342fe6-5342feb 2099->2100 2101 5343001-5343056 call 5350240 2099->2101 2102 5342fed-5342ffc 2100->2102 2103 5342ffe-5342fff 2100->2103 2101->2098 2106 5343058-5343063 2101->2106 2102->2101 2103->2099 2107 5343068-53430b5 2106->2107 2107->2107 2108 53430b7-53430e4 2107->2108 2109 53430ea-53430ee 2108->2109 2110 53430f0-53430f6 2109->2110 2111 534310c-534312c GetOEMCP 2109->2111 2112 53430f8-5343107 2110->2112 2113 5343109-534310a 2110->2113 2114 5343132-5343139 2111->2114 2112->2111 2113->2109 2115 5343167-53431a6 GetCurrentThreadId 2114->2115 2116 534313b-5343162 call 5352084 2114->2116 2115->2114 2118 53431a8-53431aa 2115->2118 2116->2115 2120 53431ac-53431e1 call 53502e0 2118->2120 2123 53431e6-53431ea 2120->2123 2124 5343207-534323e call 5353454 2123->2124 2125 53431ec-53431f1 2123->2125 2124->2120 2130 5343244 2124->2130 2126 5343204-5343205 2125->2126 2127 53431f3-5343202 2125->2127 2126->2123 2127->2124 2131 5343249-5343250 2130->2131 2132 5343255-534328a call 535058c 2131->2132 2133 5343252-5343253 2131->2133 2136 534328c-5343336 call 535058c 2132->2136 2133->2131 2139 534333c-534334c 2136->2139 2140 5343362-53433fe call 53513d4 call 53502e0 call 5350240 2139->2140 2141 534334e-534335d call 5353328 2139->2141 2150 5343400-5343407 2140->2150 2141->2140 2151 5343428-534342e 2150->2151 2152 5343409-5343410 2150->2152 2154 5343430-534343f 2151->2154 2155 5343441-5343446 2151->2155 2152->2150 2153 5343412-5343426 call 534eb18 2152->2153 2153->2154 2157 534344b-5343487 2154->2157 2155->2157 2159 534348d-53434a0 call 53410e8 2157->2159 2162 53434a2-53434e6 call 534d76c 2159->2162 2163 53434e8-53434ec 2159->2163 2168 534353c-5343545 2162->2168 2163->2159 2164 53434ee 2163->2164 2167 53434f3-53434f7 2164->2167 2169 5343514-5343537 GetUserDefaultLangID 2167->2169 2170 53434f9-53434fe 2167->2170 2169->2168 2171 5343500-534350f 2170->2171 2172 5343511-5343512 2170->2172 2171->2169 2172->2167
                                                                  APIs
                                                                  • GetLargePageMinimum.KERNEL32 ref: 0534295C
                                                                  • GetForegroundWindow.USER32 ref: 05342A7B
                                                                  • GetWindowTextLengthA.USER32 ref: 05342AE2
                                                                    • Part of subcall function 053502E0: GetTickCount.KERNEL32 ref: 053502E6
                                                                    • Part of subcall function 0535058C: GetTopWindow.USER32 ref: 053505AC
                                                                    • Part of subcall function 0535058C: GetWindowTextLengthA.USER32 ref: 053505DC
                                                                    • Part of subcall function 0535058C: GetLargePageMinimum.KERNEL32(00000000), ref: 05350609
                                                                  • GetTickCount.KERNEL32 ref: 05342D0A
                                                                  • GetTopWindow.USER32 ref: 05342D35
                                                                  • lstrlenW.KERNEL32 ref: 05342E29
                                                                  • GetLastActivePopup.USER32 ref: 05342ED4
                                                                  • GetOEMCP.KERNEL32(00000000), ref: 0534312C
                                                                    • Part of subcall function 05352084: GetOEMCP.KERNEL32 ref: 05352096
                                                                    • Part of subcall function 05352084: GetLastActivePopup.USER32 ref: 053520B8
                                                                    • Part of subcall function 05352084: GetModuleHandleW.KERNEL32 ref: 053520D2
                                                                    • Part of subcall function 05352084: GetDialogBaseUnits.USER32 ref: 05352137
                                                                    • Part of subcall function 05352084: GetWindowTextLengthW.USER32 ref: 05352150
                                                                  • GetCurrentThreadId.KERNEL32 ref: 05343176
                                                                    • Part of subcall function 053513D4: GetCurrentThreadId.KERNEL32 ref: 053513F1
                                                                    • Part of subcall function 053513D4: GetDesktopWindow.USER32 ref: 0535141F
                                                                    • Part of subcall function 053513D4: GetParent.USER32 ref: 05351483
                                                                    • Part of subcall function 053513D4: SetLastError.KERNEL32 ref: 053514E9
                                                                    • Part of subcall function 05350240: GetModuleHandleW.KERNEL32 ref: 053502B1
                                                                    • Part of subcall function 05350240: GetLastActivePopup.USER32(00000000), ref: 053502CC
                                                                  • GetUserDefaultLangID.KERNEL32 ref: 05343523
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$Last$ActiveLengthPopupText$CountCurrentHandleLargeMinimumModulePageThreadTick$BaseDefaultDesktopDialogErrorForegroundLangParentUnitsUserlstrlen
                                                                  • String ID: An invalid parameter was passed to a service or function.$AslpPathGetFormatInfo failed [%x]$ForceFlags$Please refer to your System Event Log for further information.$STATUS_WAIT_3$SdbpCheckMatchingRegistryEntry$The request failed due to a fatal device hardware error.$Your interactive logon privilege has been disabled.$windows blue${Device Offline}
                                                                  • API String ID: 2597146153-1639703026
                                                                  • Opcode ID: 241d6e46d6331fa6c39f93824b31bf132941c86c2cb215a280155b3385bd48b2
                                                                  • Instruction ID: d963d6abeaea66e9aa553db222ff1374ee71517b6fd140d22983e5d3996749ca
                                                                  • Opcode Fuzzy Hash: 241d6e46d6331fa6c39f93824b31bf132941c86c2cb215a280155b3385bd48b2
                                                                  • Instruction Fuzzy Hash: 2B620175A182488FCB51CF68D5952AA7FF5FB55304F90C8EEE889CB301CA709985CFA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2173 534c6a0-534c71d call 5351138 * 2 call 53523ac 2180 534c724-534c764 call 5351a30 GetModuleHandleW 2173->2180 2183 534c766-534c781 2180->2183 2184 534c802-534c80f GetPEB 2183->2184 2185 534c783-534c7ba call 534e4e0 2183->2185 2187 534c812-534c816 2184->2187 2193 534c7bf-534c7c8 2185->2193 2189 534c952-534c954 2187->2189 2190 534c81c-534c821 2187->2190 2191 534c956-534c962 2189->2191 2192 534c967-534c9aa GetDesktopWindow GetLastActivePopup 2189->2192 2194 534c826-534c82f 2190->2194 2195 534cd9e-534cda5 2191->2195 2196 534c9ad-534c9c1 2192->2196 2197 534c7de-534c7f2 GetOEMCP 2193->2197 2198 534c7ca-534c7d2 2193->2198 2199 534c845-534c869 GetCurrentThread call 534e7a4 2194->2199 2200 534c831-534c839 2194->2200 2201 534c9c7-534ca05 call 534c5e0 2196->2201 2202 534ca6f-534ca71 2196->2202 2204 534c7f8-534c7fd 2197->2204 2198->2193 2203 534c7d4-534c7d9 2198->2203 2211 534c86e-534c874 2199->2211 2200->2194 2205 534c83b 2200->2205 2217 534ca07-534ca0f 2201->2217 2202->2196 2208 534ca77 2202->2208 2203->2197 2204->2195 2205->2199 2210 534ca79-534ca81 2208->2210 2213 534ca83-534ca8b 2210->2213 2214 534ca9c-534cab7 call 534d27c 2210->2214 2215 534c876-534c87e 2211->2215 2216 534c89e-534c8c3 2211->2216 2213->2210 2218 534ca8d-534ca97 2213->2218 2230 534cabd-534cac5 2214->2230 2215->2211 2219 534c880-534c899 call 53523ac 2215->2219 2221 534c8c8-534c8d1 2216->2221 2222 534ca11-534ca19 2217->2222 2223 534ca3e-534ca58 call 53523ac 2217->2223 2218->2214 2219->2216 2226 534c8d3-534c8db 2221->2226 2227 534c8ef-534c920 call 534e4e0 2221->2227 2222->2217 2228 534ca1b-534ca39 call 53503d0 2222->2228 2234 534ca5d-534ca6d 2223->2234 2226->2221 2231 534c8dd-534c8ea call 534f360 2226->2231 2240 534c947-534c94d 2227->2240 2241 534c922-534c936 2227->2241 2228->2223 2230->2204 2235 534cacb-534caf0 call 53523ac 2230->2235 2231->2227 2234->2202 2234->2208 2242 534caf5-534cb45 call 534e4e0 call 534ef68 2235->2242 2240->2187 2241->2240 2243 534c938-534c945 2241->2243 2248 534cb4a-534cb56 2242->2248 2243->2192 2243->2240 2249 534cb5c-534cb70 2248->2249 2250 534cd98-534cd99 2248->2250 2251 534cb75-534cb7e 2249->2251 2250->2230 2252 534cb80-534cb88 2251->2252 2253 534cbaa 2251->2253 2252->2251 2254 534cb8a-534cba8 call 5350f00 call 534e7a4 2252->2254 2255 534cbaf-534cbda GetLargePageMinimum 2253->2255 2254->2255 2257 534cbe0 2255->2257 2258 534cd91-534cd93 2255->2258 2260 534cbe2-534cbeb 2257->2260 2258->2248 2262 534cc0c-534cc17 2260->2262 2263 534cbed-534cbf4 2260->2263 2264 534cc23-534cc42 2262->2264 2265 534cc19-534cc1e 2262->2265 2263->2260 2267 534cbf6-534cc0a call 534ef68 2263->2267 2268 534cc49-534cc97 call 534e4e0 call 534e7a4 2264->2268 2265->2264 2267->2265 2275 534cc99-534cd2e GetThreadUILanguage GetWindowTextLengthW call 53503d0 2268->2275 2278 534cd30-534cd35 call 5351138 2275->2278 2279 534cd3f-534cd8a call 534e7a4 2275->2279 2278->2279 2279->2258
                                                                  APIs
                                                                    • Part of subcall function 05351138: GetCurrentThreadId.KERNEL32 ref: 0535117A
                                                                    • Part of subcall function 053523AC: GetForegroundWindow.USER32 ref: 05352432
                                                                    • Part of subcall function 05351A30: GetModuleHandleW.KERNEL32 ref: 05351AE1
                                                                    • Part of subcall function 05351A30: GetDesktopWindow.USER32 ref: 05351BC2
                                                                  • GetModuleHandleW.KERNEL32 ref: 0534C73F
                                                                  • GetOEMCP.KERNEL32 ref: 0534C7F2
                                                                  • GetCurrentThread.KERNEL32 ref: 0534C84F
                                                                  • GetDesktopWindow.USER32 ref: 0534C978
                                                                  • GetLastActivePopup.USER32 ref: 0534C994
                                                                  • GetLargePageMinimum.KERNEL32 ref: 0534CBBC
                                                                  • GetThreadUILanguage.KERNEL32 ref: 0534CCB2
                                                                  • GetWindowTextLengthW.USER32 ref: 0534CCDA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$Thread$CurrentDesktopHandleModule$ActiveForegroundLanguageLargeLastLengthMinimumPagePopupText
                                                                  • String ID: )$Access to the cloud file is denied.$G$Indicates two revision levels are incompatible.$Monitor descriptor could not be obtained.$RtlArrayGet failed to get the next node$RtlDosPathNameToNtPathName_U_WithStatus failed for %S [%x]$l.dl$ntdl
                                                                  • API String ID: 2824035724-3218422991
                                                                  • Opcode ID: 2a3cef03c7aa6eb657a2916d59221409b66443d0a1d402008edee8ddcaf0f27e
                                                                  • Instruction ID: 24670cfc4e7861eadf491c859b2c416146056f32c9965cd1893b101e40308136
                                                                  • Opcode Fuzzy Hash: 2a3cef03c7aa6eb657a2916d59221409b66443d0a1d402008edee8ddcaf0f27e
                                                                  • Instruction Fuzzy Hash: 8702AEB59222048FC710DFA8D68A619BFF9FB64348F45886DF445CF254EBB4A804DF61

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2284 534af48-534af5b 2285 534af65-534afba GetThreadUILanguage call 53509fc 2284->2285 2288 534afbc-534afd1 GetDialogBaseUnits 2285->2288 2289 534afd3-534afdb 2288->2289 2290 534aff1-534b05c SetLastError call 534e0c0 2289->2290 2291 534afdd-534afe5 2289->2291 2295 534b05e-534b065 2290->2295 2291->2289 2292 534afe7 2291->2292 2292->2290 2296 534b067-534b06d 2295->2296 2297 534b083-534b151 call 534dc30 GetParent GetTickCount call 5351710 call 53518f4 2295->2297 2296->2295 2298 534b06f-534b07e call 534fc94 2296->2298 2307 534b157-534b15b 2297->2307 2308 534b3cf-534b3d1 2297->2308 2298->2297 2309 534b1d0-534b1d7 2307->2309 2310 534b15d 2307->2310 2311 534b4a4-534b4ab 2308->2311 2312 534b1f6-534b223 2309->2312 2313 534b1d9-534b1f5 GetWindowTextLengthA 2309->2313 2314 534b15f-534b167 2310->2314 2315 534b228-534b231 2312->2315 2313->2312 2316 534b178-534b183 2314->2316 2317 534b169-534b171 2314->2317 2318 534b242-534b251 2315->2318 2319 534b233-534b23b 2315->2319 2321 534b189-534b194 2316->2321 2317->2314 2320 534b173 call 534d648 2317->2320 2323 534b253-534b25b 2318->2323 2319->2315 2322 534b23d call 5350008 2319->2322 2320->2316 2325 534b196-534b1a1 2321->2325 2326 534b1af-534b1cb 2321->2326 2322->2318 2328 534b274-534b2b8 call 5350810 2323->2328 2329 534b25d-534b266 2323->2329 2325->2321 2330 534b1a3-534b1a9 2325->2330 2326->2308 2334 534b2bb-534b2be 2328->2334 2329->2323 2331 534b268-534b26e 2329->2331 2330->2326 2331->2328 2335 534b2c4-534b302 GetDialogBaseUnits * 3 call 534ae58 2334->2335 2336 534b46f 2334->2336 2344 534b304-534b31e 2335->2344 2345 534b2ba 2335->2345 2338 534b474-534b478 2336->2338 2339 534b490-534b49f 2338->2339 2340 534b47a-534b47f 2338->2340 2339->2308 2342 534b481-534b48b 2340->2342 2343 534b48d-534b48e 2340->2343 2342->2339 2343->2338 2346 534b324-534b32d 2344->2346 2347 534b46a-534b46d 2344->2347 2345->2334 2346->2347 2348 534b333-534b35b call 534ceb4 2346->2348 2347->2311 2351 534b3d6-534b3e1 2348->2351 2352 534b35d-534b37b 2348->2352 2353 534b3e3-534b3ee 2351->2353 2354 534b3fd-534b42b call 534d648 2351->2354 2352->2347 2360 534b381-534b3c9 call 53509fc 2352->2360 2353->2351 2355 534b3f0-534b3f8 call 5350344 2353->2355 2361 534b431-534b435 2354->2361 2355->2354 2360->2308 2363 534b456-534b465 call 53518f4 2361->2363 2364 534b437-534b43d 2361->2364 2363->2308 2366 534b453-534b454 2364->2366 2367 534b43f-534b451 2364->2367 2366->2361 2367->2363
                                                                  APIs
                                                                  • GetThreadUILanguage.KERNEL32 ref: 0534AF81
                                                                    • Part of subcall function 053509FC: GetDesktopWindow.USER32 ref: 05350A07
                                                                    • Part of subcall function 053509FC: GetThreadUILanguage.KERNEL32(?,0534B752), ref: 05350A48
                                                                  • GetDialogBaseUnits.USER32 ref: 0534AFCB
                                                                  • SetLastError.KERNEL32 ref: 0534B011
                                                                  • GetParent.USER32 ref: 0534B0DA
                                                                  • GetTickCount.KERNEL32 ref: 0534B0FD
                                                                  • GetWindowTextLengthA.USER32 ref: 0534B1EF
                                                                  • GetDialogBaseUnits.USER32 ref: 0534B2D0
                                                                  • GetDialogBaseUnits.USER32 ref: 0534B2D2
                                                                  • GetDialogBaseUnits.USER32 ref: 0534B2D4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: BaseDialogUnits$LanguageThreadWindow$CountDesktopErrorLastLengthParentTextTick
                                                                  • String ID: The provider context is of the wrong type.$The specified plex is missing.$failureId$
                                                                  • API String ID: 3857300698-4291309561
                                                                  • Opcode ID: ce3255744e0286714bdc7bb0fd75a1010873bfdfb538759cb33e1c8d70f21729
                                                                  • Instruction ID: 5198fa205375da11de40d48ede6dc9f475a3f7cb6d929fb3eae2b496576a90cf
                                                                  • Opcode Fuzzy Hash: ce3255744e0286714bdc7bb0fd75a1010873bfdfb538759cb33e1c8d70f21729
                                                                  • Instruction Fuzzy Hash: FBE179B0A242458FDB04DF69E49A569BFF9FB48348F94C92EE449CF210EB74A941CF41

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2394 534a8a0-534a8b0 2395 534a8b6-534a8bc 2394->2395 2396 534a8be-534a8c6 2395->2396 2397 534a8c8-534a8db 2395->2397 2396->2395 2396->2397 2398 534a8e5-534a92f call 5351228 GetUserDefaultLangID 2397->2398 2399 534a8dd-534a8df 2397->2399 2402 534a931-534a938 2398->2402 2399->2398 2403 534a94e-534a9be call 5351228 call 534edd8 2402->2403 2404 534a93a-534a940 2402->2404 2411 534a9c3-534aa02 call 534edd8 call 534ec6c 2403->2411 2404->2402 2405 534a942-534a949 call 534edd8 2404->2405 2405->2403 2416 534aa04 2411->2416 2417 534aa09-534aa0d 2416->2417 2418 534aa25-534aa34 2417->2418 2419 534aa0f-534aa14 2417->2419 2422 534aa36-534aa3d 2418->2422 2420 534aa16-534aa20 2419->2420 2421 534aa22-534aa23 2419->2421 2420->2418 2421->2417 2423 534aa3f-534aa45 2422->2423 2424 534aa5b-534aa9f call 534ec6c 2422->2424 2423->2422 2426 534aa47-534aa56 call 534ec6c 2423->2426 2430 534aaa4-534aad5 call 534d82c 2424->2430 2426->2424 2433 534aad7-534ab59 CreateToolhelp32Snapshot 2430->2433 2435 534ab71-534ab76 2433->2435 2436 534ab5b-534ab6c call 5341065 2433->2436 2438 534ab7b-534ab84 2435->2438 2444 534ae4e-534ae55 2436->2444 2439 534ab86-534ab8e 2438->2439 2440 534abc1 2438->2440 2439->2438 2442 534ab90-534abbf call 5350a70 call 534fdc0 2439->2442 2443 534abcb-534abfc call 5351228 2440->2443 2442->2443 2450 534ac01-534ac1f 2443->2450 2450->2436 2453 534ac25-534ac58 2450->2453 2454 534ac5a-534ac67 2453->2454 2454->2454 2455 534ac69-534ac6b 2454->2455 2456 534ac6d-534ac95 2455->2456 2457 534ac98-534aca1 2456->2457 2458 534aca3-534acab 2457->2458 2459 534acbc-534ad54 GetLargePageMinimum AnyPopup call 5352b74 call 534df38 2457->2459 2458->2457 2460 534acad-534acb7 2458->2460 2459->2456 2465 534ad5a-534ad68 2459->2465 2460->2459 2466 534ad6a-534adbb 2465->2466 2466->2466 2467 534adbd-534adda call 534cda8 2466->2467 2467->2450 2470 534ade0-534ae27 call 534108d 2467->2470 2470->2450 2473 534ae2d-534ae34 2470->2473 2473->2450 2474 534ae3a-534ae48 call 5341065 2473->2474 2474->2444
                                                                  APIs
                                                                  • GetUserDefaultLangID.KERNEL32 ref: 0534A90D
                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 0534AB3C
                                                                  • GetLargePageMinimum.KERNEL32 ref: 0534ACC6
                                                                  • AnyPopup.USER32 ref: 0534ACD6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateDefaultLangLargeMinimumPagePopupSnapshotToolhelp32User
                                                                  • String ID: AVRF: provider %ws did not initialize correctly $No receive buffer has been supplied in a synchronous request.$The object does not exist.$The session has been cancelled.${Bad Image Checksum}
                                                                  • API String ID: 646634548-3299865291
                                                                  • Opcode ID: ba09935f90348e9c1de17f2e6d2538bb293d79733ffc60889f68b9674f29c58b
                                                                  • Instruction ID: 68b4003227f1957ecc40bdf95a305c9924361a8b46e7e88fc72138dbcc4d2fad
                                                                  • Opcode Fuzzy Hash: ba09935f90348e9c1de17f2e6d2538bb293d79733ffc60889f68b9674f29c58b
                                                                  • Instruction Fuzzy Hash: 30E1DF75A282548FD710DF68DA4966ABFFAFB45308F84C4ADE489CB300DB38A954CF51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2555 53410e8-534113b call 53513d4 2558 534113d-5341145 2555->2558 2559 5341147-534114f 2558->2559 2560 534116f-53411d4 call 534eb18 2558->2560 2559->2558 2561 5341151-5341165 call 534eb18 2559->2561 2566 53411da-53411ef 2560->2566 2561->2560 2566->2566 2567 53411f1-534121b CreateToolhelp32Snapshot 2566->2567 2568 5341224-5341247 Process32FirstW 2567->2568 2569 534121d-534121f 2567->2569 2570 53412a9-53412c0 call 534cda8 2568->2570 2571 5341249-5341253 call 5341065 2568->2571 2572 534138b-5341392 2569->2572 2577 5341365-5341378 2570->2577 2578 53412c6-5341326 AnyPopup call 535058c GetLastError 2570->2578 2579 534125d-5341265 2571->2579 2577->2570 2589 534137e-5341381 call 5341065 2577->2589 2590 534132b-534132f 2578->2590 2580 5341267-534126f 2579->2580 2581 5341280-53412a4 call 5351790 2579->2581 2580->2579 2583 5341271-5341276 call 534e000 2580->2583 2581->2569 2583->2581 2596 5341386 2589->2596 2593 5341347-5341363 call 5341065 2590->2593 2594 5341331-5341336 2590->2594 2593->2572 2597 5341344-5341345 2594->2597 2598 5341338-5341342 2594->2598 2596->2596 2597->2590 2598->2593
                                                                  APIs
                                                                    • Part of subcall function 053513D4: GetCurrentThreadId.KERNEL32 ref: 053513F1
                                                                    • Part of subcall function 053513D4: GetDesktopWindow.USER32 ref: 0535141F
                                                                    • Part of subcall function 053513D4: GetParent.USER32 ref: 05351483
                                                                    • Part of subcall function 053513D4: SetLastError.KERNEL32 ref: 053514E9
                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 05341212
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateCurrentDesktopErrorLastParentSnapshotThreadToolhelp32Window
                                                                  • String ID: A primary pack is already present.$An ACPI Power Object failed to transition state$No buffer is bound to composition surface$No leaks detected.$Windows.Core
                                                                  • API String ID: 853061127-4035815744
                                                                  • Opcode ID: e7dc5d8d6897087f94b70ebfee26399c644b9b41cee90b2473b2dd4ae2928805
                                                                  • Instruction ID: 1915ce89f8e190f59713b74b39ecd544e08349fbd3d87fbeabe17f7312b2c65f
                                                                  • Opcode Fuzzy Hash: e7dc5d8d6897087f94b70ebfee26399c644b9b41cee90b2473b2dd4ae2928805
                                                                  • Instruction Fuzzy Hash: 3F51A1B59286419FC700DF65D649A2ABFF8FB44748F44855EE488CF604EB74E880CF92
                                                                  APIs
                                                                  • PathFileExistsW.KERNELBASE(?), ref: 005A7936
                                                                    • Part of subcall function 00628A29: AcquireSRWLockExclusive.KERNEL32(0067A12C,00000000,?,?,005AFA33,0067B250,0067B1DC,?,00000003,005F50B5,?,?), ref: 00628A34
                                                                    • Part of subcall function 00628A29: ReleaseSRWLockExclusive.KERNEL32(0067A12C,?,005AFA33,0067B250,0067B1DC,?,00000003,005F50B5,?,?), ref: 00628A6E
                                                                    • Part of subcall function 006289D8: AcquireSRWLockExclusive.KERNEL32(0067A12C,?,?,005AFA49,0067B250,00000003), ref: 006289E2
                                                                    • Part of subcall function 006289D8: ReleaseSRWLockExclusive.KERNEL32(0067A12C,?,005AFA49,0067B250,00000003), ref: 00628A15
                                                                    • Part of subcall function 006289D8: WakeAllConditionVariable.KERNEL32(0067A128,?,005AFA49,0067B250,00000003), ref: 00628A20
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ExclusiveLock$AcquireRelease$ConditionExistsFilePathVariableWake
                                                                  • String ID: @$X$msgid$msgstr
                                                                  • API String ID: 492889668-3581600636
                                                                  • Opcode ID: 8a5f148092cfd6ee68f0f57e2f6045131383bedfc7a8c7b76e07978f8851ed2d
                                                                  • Instruction ID: 9e588894b499e68674e152159c764df545f1dbf3650fb3d8d6c386a4d66bdf67
                                                                  • Opcode Fuzzy Hash: 8a5f148092cfd6ee68f0f57e2f6045131383bedfc7a8c7b76e07978f8851ed2d
                                                                  • Instruction Fuzzy Hash: 18C225B0D002199FDF24DFA8C995BEDBBF1BF49304F1485AAE409A7241EB745A85CF60
                                                                  APIs
                                                                  • GetForegroundWindow.USER32 ref: 0534B695
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ForegroundWindow
                                                                  • String ID: 8$Failed to allocate DB structure$WER/ReportFault:%u: ERROR Invalid params passed$X
                                                                  • API String ID: 2020703349-1544440979
                                                                  • Opcode ID: 6a2caa9fb0920db2cc6fda0c90e491285704bdc7e0a5bf9b3a4bbf3e36449e6f
                                                                  • Instruction ID: cd131a28cc640d8a40793134c4aa3f4f9ed698e845a58305b234d51cfad8e4b4
                                                                  • Opcode Fuzzy Hash: 6a2caa9fb0920db2cc6fda0c90e491285704bdc7e0a5bf9b3a4bbf3e36449e6f
                                                                  • Instruction Fuzzy Hash: 4881AFB5A142048FDB50CF39D89565AFFE9FB48344F41C65DE49A8F200DA78E840CF85
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32 ref: 0534357E
                                                                  • CheckRemoteDebuggerPresent.KERNELBASE ref: 053435E7
                                                                  Strings
                                                                  • AslEnvGetProcessWowInfo failed [%x], xrefs: 05343577
                                                                  • pd /TilingType 1 put, xrefs: 05343549
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CheckDebuggerHandleModulePresentRemote
                                                                  • String ID: AslEnvGetProcessWowInfo failed [%x]$pd /TilingType 1 put
                                                                  • API String ID: 276317622-1007002732
                                                                  • Opcode ID: 630c9102c46d64d9fd08c4aea0d5a78041257ed9843bb247e9ba33afc4c0529c
                                                                  • Instruction ID: c545a716a1e0bf0f86e3e4071da01568761407bc13067fbd183f9c8800d24af8
                                                                  • Opcode Fuzzy Hash: 630c9102c46d64d9fd08c4aea0d5a78041257ed9843bb247e9ba33afc4c0529c
                                                                  • Instruction Fuzzy Hash: 2101AD749152489FCB08DF28DA4A56ABFFDFB84344F84C9ADE592CB291DA34D4809F01
                                                                  APIs
                                                                    • Part of subcall function 0534C4B4: GetLastError.KERNEL32 ref: 0534C4D6
                                                                    • Part of subcall function 0534C4B4: GetLastActivePopup.USER32 ref: 0534C501
                                                                    • Part of subcall function 0534C4B4: GetLastActivePopup.USER32 ref: 0534C565
                                                                  • NtAlpcCreateSectionView.NTDLL(00000000,?,?,?,?,?,?,?,?,?,0534B8C7), ref: 05341052
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Last$ActivePopup$AlpcCreateErrorSectionView
                                                                  • String ID:
                                                                  • API String ID: 3416713291-0
                                                                  • Opcode ID: b3b125dfe50d23d2354220b3e411a7496b4b4b197732604ec0bac79f1ce959a2
                                                                  • Instruction ID: c538b83e19b076d1788aa867c4d57269dcbe14d218585416618fe549ca91c2e9
                                                                  • Opcode Fuzzy Hash: b3b125dfe50d23d2354220b3e411a7496b4b4b197732604ec0bac79f1ce959a2
                                                                  • Instruction Fuzzy Hash: DCF0B7715213409FDF08CB64F90A6E5BFA8F724314F016425E811CB310EA346AA49E41

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 5f0f00-5f0f59 call 59be30 3 5f0f60-5f0f69 0->3 3->3 4 5f0f6b-5f0f88 IsDlgButtonChecked 3->4 5 5f15ef-5f1614 SetDlgItemTextW GetDlgItem 4->5 6 5f0f8e-5f0f9b 4->6 7 5f161f-5f165a call 59bda0 * 2 GetDlgItem RedrawWindow 5->7 8 5f1616-5f1619 EnableWindow 5->8 9 5f153f-5f155f SetDlgItemTextW GetDlgItem 6->9 10 5f0fa1-5f0fbe 6->10 27 5f1660-5f1678 call 59be30 7->27 8->7 13 5f156a-5f1578 GetDlgItem 9->13 14 5f1561-5f1564 EnableWindow 9->14 12 5f0fc0-5f0fc9 10->12 12->12 18 5f0fcb-5f1055 call 59c1c0 * 3 call 59ca00 12->18 15 5f159e-5f15ac GetDlgItem 13->15 16 5f157a-5f1583 GetFocus 13->16 14->13 21 5f15ae-5f15b7 GetFocus 15->21 22 5f15d2-5f15ed GetDlgItem RedrawWindow 15->22 19 5f1585-5f158d SendMessageW 16->19 20 5f1593-5f1598 EnableWindow 16->20 49 5f1089-5f111b call 59b420 call 59c1c0 * 2 call 59ca00 call 59b420 18->49 50 5f1057-5f1069 18->50 19->20 20->15 25 5f15b9-5f15c1 SendMessageW 21->25 26 5f15c7-5f15cc EnableWindow 21->26 22->27 25->26 26->22 35 5f167a-5f168b 27->35 36 5f1696-5f169b 27->36 35->36 38 5f168d-5f1693 call 628ce7 35->38 39 5f169d-5f16a3 call 628ce7 36->39 40 5f16a6-5f16ab 36->40 38->36 39->40 44 5f16b0-5f16b9 40->44 44->44 48 5f16bb-5f16c2 44->48 51 5f16c8-5f16e2 48->51 52 5f1801-5f182e GetDlgItem RedrawWindow IsDlgButtonChecked 48->52 105 5f114f-5f11c7 call 59c1c0 * 2 call 59ca00 49->105 106 5f111d-5f112f 49->106 53 5f107f-5f1086 call 628977 50->53 54 5f106b-5f1079 50->54 58 5f16e5-5f16ee 51->58 55 5f19f8-5f1a17 GetDlgItem RedrawWindow 52->55 56 5f1834-5f1849 call 59be30 52->56 53->49 54->53 62 5f1a36 call 62ec5f 54->62 60 5f1a19-5f1a1f call 628ce7 55->60 61 5f1a22-5f1a35 55->61 75 5f184b-5f185c 56->75 76 5f1867-5f186c 56->76 58->58 59 5f16f0-5f1716 call 59c1c0 58->59 81 5f1718-5f1724 59->81 82 5f1726-5f172f 59->82 60->61 74 5f1a3b-5f1a40 call 62ec5f 62->74 75->76 84 5f185e-5f1864 call 628ce7 75->84 78 5f186e-5f1874 call 628ce7 76->78 79 5f1877-5f187c 76->79 78->79 87 5f1880-5f1889 79->87 88 5f1732-5f17b5 call 628947 call 5c3940 call 628947 call 5c35d0 81->88 82->88 84->76 87->87 93 5f188b-5f1892 87->93 124 5f17b7-5f17c7 88->124 125 5f17d0-5f17fe call 59b420 88->125 93->55 97 5f1898-5f18b2 93->97 100 5f18b5-5f18be 97->100 100->100 103 5f18c0-5f18e6 call 59c1c0 100->103 115 5f18e8-5f18f4 103->115 116 5f18f6-5f18ff 103->116 136 5f11fb-5f1205 105->136 137 5f11c9-5f11db 105->137 109 5f1145-5f114c call 628977 106->109 110 5f1131-5f113f 106->110 109->105 110->62 110->109 120 5f1902-5f198f call 628947 call 5c3940 call 628947 call 5c35d0 115->120 116->120 158 5f19aa-5f19b0 120->158 159 5f1991-5f19a1 120->159 124->125 135 5f17c9-5f17cb 124->135 125->52 135->125 142 5f123c-5f1254 136->142 143 5f1207-5f121c 136->143 140 5f11dd-5f11eb 137->140 141 5f11f1-5f11f8 call 628977 137->141 140->62 140->141 141->136 148 5f1256-5f1262 142->148 149 5f1264-5f126d 142->149 146 5f121e-5f122c 143->146 147 5f1232-5f1239 call 628977 143->147 146->62 146->147 147->142 150 5f1270-5f12f3 call 628947 call 5c3940 call 628947 call 5c35d0 148->150 149->150 173 5f130e-5f1345 call 59b420 150->173 174 5f12f5-5f1305 150->174 158->55 161 5f19b2-5f19c4 158->161 159->158 167 5f19a3-5f19a5 159->167 164 5f19d6-5f19e0 call 628977 161->164 165 5f19c6-5f19d4 161->165 164->55 165->74 165->164 167->158 180 5f134b-5f1385 call 5a9980 call 5b7240 call 5a8a00 173->180 181 5f1418-5f1452 call 5a9980 call 5b7240 call 5a8a00 173->181 174->173 179 5f1307-5f1309 174->179 179->173 194 5f138d-5f13c0 SetDlgItemTextW call 59b420 * 2 GetDlgItem 180->194 195 5f1387 180->195 196 5f145a-5f1490 SetDlgItemTextW call 59b420 * 2 GetDlgItem 181->196 197 5f1454 181->197 208 5f13cb-5f13d6 GetDlgItem 194->208 209 5f13c2-5f13c5 EnableWindow 194->209 195->194 206 5f14b6-5f14c4 GetDlgItem 196->206 207 5f1492-5f149b GetFocus 196->207 197->196 214 5f14ea-5f14f8 GetDlgItem 206->214 215 5f14c6-5f14cf GetFocus 206->215 212 5f149d-5f14a5 SendMessageW 207->212 213 5f14ab-5f14b0 EnableWindow 207->213 210 5f13d8-5f13db EnableWindow 208->210 211 5f13e1-5f13ec GetDlgItem 208->211 209->208 210->211 216 5f13ee-5f13f1 EnableWindow 211->216 217 5f13f7-5f1413 GetDlgItem RedrawWindow 211->217 212->213 213->206 220 5f151e-5f153a GetDlgItem RedrawWindow 214->220 221 5f14fa-5f1503 GetFocus 214->221 218 5f14df-5f14e4 EnableWindow 215->218 219 5f14d1-5f14d9 SendMessageW 215->219 216->217 217->27 218->214 219->218 220->27 222 5f1505-5f150d SendMessageW 221->222 223 5f1513-5f1518 EnableWindow 221->223 222->223 223->220
                                                                  APIs
                                                                    • Part of subcall function 0059BE30: GetDlgItem.USER32(?,?), ref: 0059BE44
                                                                    • Part of subcall function 0059BE30: GetWindowTextLengthW.USER32(00000000), ref: 0059BE4B
                                                                    • Part of subcall function 0059BE30: GetDlgItemTextW.USER32(?,?,00000000,00000001), ref: 0059BE8D
                                                                  • IsDlgButtonChecked.USER32(?,000003E9), ref: 005F0F7C
                                                                  • SetDlgItemTextW.USER32(?,000003EC,00000000), ref: 005F1395
                                                                  • GetDlgItem.USER32(?,00000001), ref: 005F13BC
                                                                  • EnableWindow.USER32(00000000,00000001), ref: 005F13C5
                                                                  • GetDlgItem.USER32(?,00000419), ref: 005F13D2
                                                                  • EnableWindow.USER32(00000000,00000001), ref: 005F13DB
                                                                  • GetDlgItem.USER32(?,00000405), ref: 005F13E8
                                                                  • EnableWindow.USER32(00000000,00000001), ref: 005F13F1
                                                                  • GetDlgItem.USER32(?,000003E8), ref: 005F1407
                                                                  • RedrawWindow.USER32(00000000,?,000003E8,00000000,00000000,00000401,?,00000405,?,00000419,?,00000001,?,000003EC,00000000), ref: 005F140A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Item$Window$EnableText$ButtonCheckedLengthRedraw
                                                                  • String ID: ${fileext}$${filepath}
                                                                  • API String ID: 4123494488-2440594156
                                                                  • Opcode ID: 44a4b5633c544b65282bbec249d8b9ddc99dbb705b58000e00f41086037440ca
                                                                  • Instruction ID: 1e5c205e6e9e39a1ff91c081a16739f1dc71f25020d027e3cd34307ce882da79
                                                                  • Opcode Fuzzy Hash: 44a4b5633c544b65282bbec249d8b9ddc99dbb705b58000e00f41086037440ca
                                                                  • Instruction Fuzzy Hash: AE725970D00209EFDF14DFA8DC89BADBBB5BF44300F248169E605AB291EBB55A45CF64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1299 59b9a0-59b9b3 1300 59b9b9-59b9c3 1299->1300 1301 59bd7b-59bd83 1299->1301 1302 59ba40-59ba50 GetWindowLongW 1300->1302 1303 59b9c5-59ba3e SetWindowLongW CreateWindowExW SetWindowPos SendMessageW * 2 1300->1303 1302->1301 1304 59ba56-59ba6f 1302->1304 1303->1302 1306 59bcfd-59bd02 1304->1306 1307 59ba75 1304->1307 1310 59bd64-59bd78 SetWindowLongW 1306->1310 1311 59bd04-59bd0e call 59a4e0 1306->1311 1308 59bc09-59bc13 call 59a4e0 1307->1308 1309 59ba7b-59ba7e 1307->1309 1308->1310 1320 59bc19-59bc4b GetClientRect MapWindowPoints 1308->1320 1309->1310 1312 59ba84-59ba87 1309->1312 1311->1310 1319 59bd10-59bd1b 1311->1319 1312->1310 1315 59ba8d-59ba97 call 59a4e0 1312->1315 1315->1310 1327 59ba9d-59bad1 DefDlgProcW GetClientRect 1315->1327 1319->1310 1322 59bd1d-59bd27 call 59a4e0 1319->1322 1323 59bc7b-59bcbb PtInRect 1320->1323 1324 59bc4d-59bc78 PtInRect SetWindowLongW 1320->1324 1322->1310 1333 59bd29-59bd3b GetProcAddress 1322->1333 1325 59bcbd-59bcc8 PtInRect 1323->1325 1326 59bce5-59bcfa SetWindowLongW 1323->1326 1325->1326 1329 59bcca-59bce2 SetWindowLongW 1325->1329 1330 59bb0d-59bc06 SetBkColor ExtTextOutW * 4 SetWindowLongW 1327->1330 1331 59bad3-59bb0a SetBkColor ExtTextOutW SetWindowLongW 1327->1331 1334 59bd5a-59bd5e 1333->1334 1335 59bd3d-59bd57 GetLastError SetWindowLongW 1333->1335 1334->1310
                                                                  APIs
                                                                  • SetWindowLongW.USER32(?,000000EB,?), ref: 0059B9CC
                                                                  • CreateWindowExW.USER32(00000000,tooltips_class32,00000000,80000003,80000000,80000000,80000000,80000000,?,00000000,?,00000000), ref: 0059B9FF
                                                                  • SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013), ref: 0059BA15
                                                                  • SendMessageW.USER32(?,00000418,00000000,00000258), ref: 0059BA30
                                                                  • SendMessageW.USER32(?,00000401,00000001,00000000), ref: 0059BA3E
                                                                  • GetWindowLongW.USER32(?,000000EB), ref: 0059BA46
                                                                  • DefDlgProcW.USER32(?,00000110,?,?), ref: 0059BAB1
                                                                  • GetClientRect.USER32(?,?), ref: 0059BAC4
                                                                  • SetBkColor.GDI32(?,00000000), ref: 0059BAD3
                                                                  • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0059BAEB
                                                                  • SetWindowLongW.USER32(?,00000000,00000001), ref: 0059BAFC
                                                                  • SetBkColor.GDI32(?,00000000), ref: 0059BB0D
                                                                  • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0059BB4C
                                                                  • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0059BB81
                                                                  • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0059BBB6
                                                                  • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0059BBEB
                                                                  • SetWindowLongW.USER32(?,00000000,00000001), ref: 0059BBF8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Text$Long$ColorMessageSend$ClientCreateProcRect
                                                                  • String ID: DwmExtendFrameIntoClientArea$tooltips_class32
                                                                  • API String ID: 2355803220-4124622142
                                                                  • Opcode ID: d9d021ba1f8ae6f1f8c9e9a4e92f778b12152517bdc09e77343257d682ce33d4
                                                                  • Instruction ID: 973d92933d075c48ba4c35b67534d12181b771be27b91dcda36eba8886659bba
                                                                  • Opcode Fuzzy Hash: d9d021ba1f8ae6f1f8c9e9a4e92f778b12152517bdc09e77343257d682ce33d4
                                                                  • Instruction Fuzzy Hash: 3FC16F72644315EBEB20CF64DC45F5ABBA8FB88751F10461AFA48E7290D770E910CBA1

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetClientRect.USER32(?,?), ref: 0059F593
                                                                  • GetWindowRect.USER32(?,?), ref: 0059F59E
                                                                  • OffsetRect.USER32(?,?,?), ref: 0059F5B0
                                                                  • GetSystemMetrics.USER32(00000002), ref: 0059F5BE
                                                                  • GetSystemMetrics.USER32(00000003), ref: 0059F5C5
                                                                  • CreateWindowExW.USER32 ref: 0059F601
                                                                  • CreateRectRgn.GDI32(00000000,00000000,00000001,00000001), ref: 0059F617
                                                                  • CreateRectRgnIndirect.GDI32(00000000), ref: 0059F624
                                                                  • SetRectRgn.GDI32(00000000,00000000,00000000,?,00000001), ref: 0059F641
                                                                  • CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 0059F64C
                                                                  • SetWindowRgn.USER32(?,00000000,00000000), ref: 0059F65F
                                                                  • ShowWindow.USER32(?,?), ref: 0059F682
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$Create$MetricsSystem$ClientCombineIndirectOffsetShow
                                                                  • String ID: ScrollBar
                                                                  • API String ID: 3369083536-3978720103
                                                                  • Opcode ID: cd0f3204fc4108c7967e6ffaea4c85a10d9bd9db33b39a08c73d2ce0cab54fef
                                                                  • Instruction ID: 3634c3bd29846d8fdac3c241f16246462a447646b1df00a71a2f312c7e5498c5
                                                                  • Opcode Fuzzy Hash: cd0f3204fc4108c7967e6ffaea4c85a10d9bd9db33b39a08c73d2ce0cab54fef
                                                                  • Instruction Fuzzy Hash: 76318F71240311EFEB509F20DC8AF663BADFB49702F101469FE05DA1D1D7B5A841CB64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2378 59b630-59b6af CreateDialogParamW ShowWindow BringWindowToTop SetForegroundWindow LoadAcceleratorsW 2379 59b72d-59b732 2378->2379 2380 59b6b1-59b6c0 2378->2380 2381 59b73e-59b74b DestroyWindow 2379->2381 2382 59b734-59b738 PostQuitMessage 2379->2382 2383 59b6c6-59b6d5 GetMessageW 2380->2383 2384 59b74d-59b754 2381->2384 2385 59b757-59b75f 2381->2385 2382->2381 2386 59b72a-59b72c 2383->2386 2387 59b6d7-59b6da 2383->2387 2386->2379 2387->2386 2388 59b6dc-59b6ec 2387->2388 2390 59b6ee-59b702 TranslateAcceleratorW 2388->2390 2391 59b724-59b728 2388->2391 2390->2391 2392 59b704-59b714 IsDialogMessageW 2390->2392 2391->2383 2391->2386 2392->2391 2393 59b716-59b722 TranslateMessage DispatchMessageW 2392->2393 2393->2391
                                                                  APIs
                                                                  • CreateDialogParamW.USER32(?,?,00000000,Function_0003B9A0), ref: 0059B652
                                                                  • ShowWindow.USER32(00000000,00000005,?,00000000,?,?,?,?,?,?,?), ref: 0059B65E
                                                                  • BringWindowToTop.USER32(?), ref: 0059B667
                                                                  • SetForegroundWindow.USER32(?), ref: 0059B670
                                                                  • LoadAcceleratorsW.USER32(?,?), ref: 0059B6A1
                                                                  • GetMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0059B6D1
                                                                  • TranslateAcceleratorW.USER32(?,?,?), ref: 0059B6FA
                                                                  • IsDialogMessageW.USER32(?,?), ref: 0059B70C
                                                                  • TranslateMessage.USER32(?), ref: 0059B71B
                                                                  • DispatchMessageW.USER32(?), ref: 0059B722
                                                                  • PostQuitMessage.USER32(?), ref: 0059B738
                                                                  • DestroyWindow.USER32(?), ref: 0059B741
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Message$Window$DialogTranslate$AcceleratorAcceleratorsBringCreateDestroyDispatchForegroundLoadParamPostQuitShow
                                                                  • String ID:
                                                                  • API String ID: 3538134301-0
                                                                  • Opcode ID: 18aae9a383e66804f46cdfa4df2319a85fc8f2013136e1444070102e32f0924a
                                                                  • Instruction ID: c34011b5070aea1c270b94d5cc4a82e993332a2b1698cf4dc3e942a7f3ba46eb
                                                                  • Opcode Fuzzy Hash: 18aae9a383e66804f46cdfa4df2319a85fc8f2013136e1444070102e32f0924a
                                                                  • Instruction Fuzzy Hash: C9310371504301AFEB20DFA9ED48B6BBBE9FB88705F04491DF19AC2161E770E845CB22

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2477 534c100-534c11f 2478 534c121-534c128 2477->2478 2479 534c144-534c14a 2478->2479 2480 534c12a-534c131 2478->2480 2482 534c16c-534c171 2479->2482 2483 534c14c-534c16a call 53523ac 2479->2483 2480->2478 2481 534c133-534c142 2480->2481 2481->2483 2484 534c176-534c1a9 call 534f360 GetSystemDefaultLangID 2482->2484 2483->2484 2489 534c1ab-534c1b2 2484->2489 2490 534c1b4-534c1ba 2489->2490 2491 534c1d0-534c1e9 call 5351a30 2489->2491 2490->2489 2492 534c1bc-534c1cb call 5350f00 2490->2492 2497 534c1ee-534c1f7 2491->2497 2492->2491 2498 534c1f9-534c201 2497->2498 2499 534c23b-534c24f 2497->2499 2498->2497 2501 534c203-534c212 call 53523ac 2498->2501 2500 534c254-534c25d 2499->2500 2502 534c25f-534c267 2500->2502 2503 534c278-534c28f 2500->2503 2505 534c217-534c235 call 534d4c4 GetUserDefaultLangID 2501->2505 2502->2500 2506 534c269-534c26e call 5351a30 2502->2506 2507 534c294-534c29a 2503->2507 2505->2499 2506->2503 2510 534c2b2-534c2bc 2507->2510 2511 534c29c-534c2a4 2507->2511 2515 534c2c1-534c2c5 2510->2515 2511->2507 2514 534c2a6-534c2ac 2511->2514 2514->2510 2516 534c2e6-534c2f3 2515->2516 2517 534c2c7-534c2cd 2515->2517 2520 534c344-534c345 2516->2520 2521 534c2f5-534c2fc 2516->2521 2518 534c2e3-534c2e4 2517->2518 2519 534c2cf-534c2e1 2517->2519 2518->2515 2519->2516 2524 534c480-534c482 2520->2524 2525 534c34b-534c359 2520->2525 2522 534c2fe 2521->2522 2523 534c308-534c33f call 53523ac 2521->2523 2522->2523 2526 534c484-534c4a9 call 53497a0 2523->2526 2524->2526 2528 534c360-534c3bf call 534d27c call 5350f00 call 534e4e0 GetUserDefaultLangID 2525->2528 2534 534c4ab-534c4b2 2526->2534 2539 534c3c1-534c3c6 2528->2539 2540 534c3c8 2528->2540 2539->2528 2541 534c3ca-534c3d1 2540->2541 2542 534c3d3-534c3d9 2541->2542 2543 534c3ef-534c47e call 53525ec GetParent call 534ef68 call 534d27c call 534e4e0 2541->2543 2542->2541 2544 534c3db-534c3ea call 5350f00 2542->2544 2543->2526 2544->2543
                                                                  APIs
                                                                  • GetSystemDefaultLangID.KERNEL32(?,?,?,?,?,00000B86,?,?,?,05341042,00000000), ref: 0534C194
                                                                  • GetUserDefaultLangID.KERNEL32 ref: 0534C235
                                                                    • Part of subcall function 0534D27C: GetDesktopWindow.USER32 ref: 0534D2D7
                                                                    • Part of subcall function 0534D27C: GetLastActivePopup.USER32 ref: 0534D337
                                                                    • Part of subcall function 0534D27C: GetSystemDefaultLangID.KERNEL32 ref: 0534D3A9
                                                                    • Part of subcall function 0534D27C: AnyPopup.USER32 ref: 0534D3BE
                                                                    • Part of subcall function 0534D27C: GetUserDefaultLangID.KERNEL32 ref: 0534D44A
                                                                    • Part of subcall function 05350F00: GetDesktopWindow.USER32 ref: 05350FA2
                                                                    • Part of subcall function 05350F00: GetDesktopWindow.USER32 ref: 05350FD9
                                                                    • Part of subcall function 05350F00: GetTopWindow.USER32 ref: 05351021
                                                                    • Part of subcall function 0534E4E0: GetCurrentThread.KERNEL32 ref: 0534E57C
                                                                    • Part of subcall function 0534E4E0: GetShellWindow.USER32 ref: 0534E638
                                                                    • Part of subcall function 0534E4E0: GetUserDefaultLangID.KERNEL32 ref: 0534E648
                                                                  • GetUserDefaultLangID.KERNEL32 ref: 0534C3B3
                                                                  • GetParent.USER32 ref: 0534C422
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLang$Window$User$Desktop$PopupSystem$ActiveCurrentLastParentShellThread
                                                                  • String ID: An invalid address was found on the control flow stack.$AslpFileLargeGetChecksumAttributes$Secure Boot policy has unexpectedly changed.$The volume repair could not be performed while it is online.$WER/CrashAPI:%u: ERROR Exception in WerpCurrentPeb
                                                                  • API String ID: 3278762495-1392373765
                                                                  • Opcode ID: 7535dc13c8cf8efbadef0ea0f31d46449e14dee653ea861f7ec0f28a7303056f
                                                                  • Instruction ID: 0ae487537fac2b90e6156899c31b144604a782483799e6d310e2fee8fe8280e9
                                                                  • Opcode Fuzzy Hash: 7535dc13c8cf8efbadef0ea0f31d46449e14dee653ea861f7ec0f28a7303056f
                                                                  • Instruction Fuzzy Hash: DE91D3B5A202048BCB11EFB5E44A61A7FE9FB44308F90DA2DF845CF254DB74A912CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2600 5350810-5350819 2601 535081a-5350821 2600->2601 2602 5350826-535082b 2601->2602 2603 5350823-5350824 2601->2603 2604 5350830-5350838 2602->2604 2603->2601 2605 535083d-53508a4 GetSystemDefaultLangID GetMessageTime GetCurrentThread 2604->2605 2606 535083a-535083b 2604->2606 2607 53508a9-53508b2 2605->2607 2606->2604 2608 53508b4-53508bc 2607->2608 2609 53508be-53508ce 2607->2609 2608->2607 2608->2609 2610 53508d3-53508dc 2609->2610 2611 53508de-53508e6 2610->2611 2612 53508fa-5350909 2610->2612 2611->2610 2614 53508e8-53508f4 GetLastError 2611->2614 2613 535090e-5350912 2612->2613 2615 5350914-535091a 2613->2615 2616 5350931-535094f 2613->2616 2614->2612 2617 535091c-535092c 2615->2617 2618 535092e-535092f 2615->2618 2619 5350954-535095d 2616->2619 2617->2616 2618->2613 2620 5350973-535099a GetForegroundWindow 2619->2620 2621 535095f-5350967 2619->2621 2621->2619 2622 5350969-535096e 2621->2622 2622->2620
                                                                  APIs
                                                                  • GetSystemDefaultLangID.KERNEL32(?,?,?,0534B79D), ref: 05350862
                                                                  • GetMessageTime.USER32 ref: 05350883
                                                                  • GetCurrentThread.KERNEL32 ref: 05350898
                                                                  • GetLastError.KERNEL32(?,?,?,0534B79D), ref: 053508F4
                                                                  • GetForegroundWindow.USER32(?,?,?,0534B79D), ref: 05350982
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentDefaultErrorForegroundLangLastMessageSystemThreadTimeWindow
                                                                  • String ID: NumberOfWaitingExclusive = %lx$Built-in HEIC Codec$TPM 2.0: Insufficient space for NV allocation.$The specified port already has a completion list.
                                                                  • API String ID: 3541390845-3688297793
                                                                  • Opcode ID: 455289e79df9059e069b8f7ac9ddece0150f16983a203849ae90312a535fa71f
                                                                  • Instruction ID: ab3eefff6a0a08e9c06f7c39299fa00c3b7942a0e88cf8f20849af38c357637a
                                                                  • Opcode Fuzzy Hash: 455289e79df9059e069b8f7ac9ddece0150f16983a203849ae90312a535fa71f
                                                                  • Instruction Fuzzy Hash: EE41E9749242018FD7188F38E5DB9253FADF768368F94E46EF846CF249EAB28440C760

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2623 5350d70-5350da4 GetOEMCP 2624 5350da9-5350daf 2623->2624 2625 5350db1-5350db9 2624->2625 2626 5350dbb-5350de4 GetWindowTextLengthA 2624->2626 2625->2624 2625->2626 2627 5350de9-5350df2 2626->2627 2628 5350df4-5350dfc 2627->2628 2629 5350dfe-5350e37 GetLastActivePopup 2627->2629 2628->2627 2628->2629 2630 5350e38-5350e3e 2629->2630 2631 5350e40-5350e48 2630->2631 2632 5350e59-5350e8c GetForegroundWindow 2630->2632 2631->2630 2633 5350e4a-5350e54 2631->2633 2634 5350e91-5350e97 2632->2634 2633->2632 2635 5350ead-5350efd GetSystemDefaultLangID 2634->2635 2636 5350e99-5350ea1 2634->2636 2636->2634 2637 5350ea3-5350ea8 2636->2637 2637->2635
                                                                  APIs
                                                                  Strings
                                                                  • The system does not support fault tolerant volumes., xrefs: 05350DDE
                                                                  • The system is now ready for hibernation., xrefs: 05350D7A
                                                                  • FeatureUsage, xrefs: 05350E82
                                                                  • Microsoft America Operations1&0$, xrefs: 05350E32
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$ActiveDefaultForegroundLangLastLengthPopupSystemText
                                                                  • String ID: FeatureUsage$Microsoft America Operations1&0$$The system does not support fault tolerant volumes.$The system is now ready for hibernation.
                                                                  • API String ID: 1400623325-3058726051
                                                                  • Opcode ID: 330b1596efebc7fee86d0a94a933b1a2b313b2efa046c8cdb0c4a0c2490cdfdd
                                                                  • Instruction ID: 5baedcf9ae70d83a0dcda803d6a8270ade504b699b3cbd9abb30c23d43bb46e1
                                                                  • Opcode Fuzzy Hash: 330b1596efebc7fee86d0a94a933b1a2b313b2efa046c8cdb0c4a0c2490cdfdd
                                                                  • Instruction Fuzzy Hash: 0941D279D247018FD3148F68E8866A57FE9F74A318FA4C06EE995CF301EB798444CB81

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2638 534bbac-534bbcb SetLastError 2639 534bbd0-534bbd6 2638->2639 2640 534bbf1-534bc29 call 534cfb8 2639->2640 2641 534bbd8-534bbe0 2639->2641 2645 534bc2b-534bc32 2640->2645 2641->2639 2642 534bbe2-534bbec 2641->2642 2642->2640 2646 534bc34-534bc3a 2645->2646 2647 534bc46-534bc76 GetOEMCP call 535264c 2645->2647 2646->2645 2648 534bc3c 2646->2648 2651 534bc78-534bca6 call 534cfb8 2647->2651 2652 534bcab-534bcec call 535131c 2647->2652 2648->2647 2651->2652 2657 534bcf1-534bcf5 2652->2657 2658 534bcf7-534bcfd 2657->2658 2659 534bd0f-534bd2e call 534b8bc 2657->2659 2661 534bd0c-534bd0d 2658->2661 2662 534bcff-534bd0a 2658->2662 2664 534bd30-534bd33 call 534bd40 2659->2664 2665 534bd38-534bd3e 2659->2665 2661->2657 2662->2659 2664->2665
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID: !Process$/TableEntry$An attempt was made to access an exiting process.$An attempt was made to decommit uncommitted virtual memory.$AslpFileMakeStringVersionAttributes$Microsoft$gsave translate
                                                                  • API String ID: 1452528299-771149502
                                                                  • Opcode ID: 200b2262b567b4a2831175552981fde0c91cbf6475fc0b5a00e5ecd44a145287
                                                                  • Instruction ID: 2e53820c713e564463a5ee9f2cfcaaa03df2bda65606571dbec15e0bc02978d6
                                                                  • Opcode Fuzzy Hash: 200b2262b567b4a2831175552981fde0c91cbf6475fc0b5a00e5ecd44a145287
                                                                  • Instruction Fuzzy Hash: 5E418FB49252048FCB009F38D5AA26ABFF9FB45318F84D89DE08ACF254EB759445CF81
                                                                  APIs
                                                                  • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,0534BB94), ref: 05345ED3
                                                                  • GetOEMCP.KERNEL32 ref: 05345F22
                                                                  • GetWindowTextLengthA.USER32 ref: 05345FC6
                                                                    • Part of subcall function 053513D4: GetCurrentThreadId.KERNEL32 ref: 053513F1
                                                                    • Part of subcall function 053513D4: GetDesktopWindow.USER32 ref: 0535141F
                                                                    • Part of subcall function 053513D4: GetParent.USER32 ref: 05351483
                                                                    • Part of subcall function 053513D4: SetLastError.KERNEL32 ref: 053514E9
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0534606C
                                                                  • VirtualFree.KERNELBASE ref: 0534609D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentThreadVirtualWindow$AllocDesktopErrorFreeLastLengthParentText
                                                                  • String ID: A account group cannot have a universal group as a member.$CheckAllProcessMachinePolicyEnabled$The string UUID is invalid.
                                                                  • API String ID: 732584986-1906444222
                                                                  • Opcode ID: c89e65072f715c1eb1e6053c98a0355a9f51851d1c9188d6c39cc9d67fecad05
                                                                  • Instruction ID: b62d1ac27975b53e1436d1bae862c2cb85660e29d3b54ad3478a9a2ff909e040
                                                                  • Opcode Fuzzy Hash: c89e65072f715c1eb1e6053c98a0355a9f51851d1c9188d6c39cc9d67fecad05
                                                                  • Instruction Fuzzy Hash: EF51AC719242428FD714CF28D48B62ABFE9FB48358F40C96EE54DCF256EB7198448F92
                                                                  APIs
                                                                  • GetForegroundWindow.USER32(?,0000000B,?,0534A731), ref: 0534F87E
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0534F8B9
                                                                  • AnyPopup.USER32 ref: 0534F95B
                                                                  • GetCurrentThread.KERNEL32 ref: 0534F991
                                                                  • GetLastError.KERNEL32(?,0000000B,?,0534A731), ref: 0534F997
                                                                  Strings
                                                                  • An error occurred while NDIS tried to map the file., xrefs: 0534F8BF, 0534F933
                                                                  • The specified task name is invalid., xrefs: 0534F961
                                                                  • Too many files are opened on a remote server., xrefs: 0534F884
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentThread$ErrorForegroundLastPopupWindow
                                                                  • String ID: An error occurred while NDIS tried to map the file.$The specified task name is invalid.$Too many files are opened on a remote server.
                                                                  • API String ID: 1115741200-1773836707
                                                                  • Opcode ID: 4fdb796c45affc359d1ed5ab37557b01109d080a7c158e3afb6aa58ff68ad7b7
                                                                  • Instruction ID: 732e4277f344c3036ceabc9de0d5ea787ff9fa7580bf698fdd21ade1552ede86
                                                                  • Opcode Fuzzy Hash: 4fdb796c45affc359d1ed5ab37557b01109d080a7c158e3afb6aa58ff68ad7b7
                                                                  • Instruction Fuzzy Hash: D531BC749352858FC708CF39E5A61287FAEF745308F98C19EE2468E35AEBB19401CF84
                                                                  APIs
                                                                  Strings
                                                                  • WER/CrashAPI:%u: ERROR Final gather block size exceeds limit, xrefs: 0534741F
                                                                  • AslpFileQuery16BitDescription, xrefs: 053472D0
                                                                  • FrontEndHeap, xrefs: 05347431
                                                                  • fDa4P9+d9sUhAxNtkA8rSqPR/YC9ci1IF5ZhBUb9pBFS5pnX7GJyuTRrRXK0JOsL1rP1a8enzEZmpPpqbTgOpLkt9tEO3RiAY0YJOXeYBzNTw9DT43DwYHu6jXJ1z8dWxhEJv0Ij6iO0ebdg87m6OhtROnYgAnJjsuzRnHkSVsa4c89NSnduqn/JL9vDotf5uTdc2ENjZ8tmytdJwTe6CU7GZZhhyOTFCfqCJYhcH9ccLUTJPKT1QLwoA9GEBlQTP5jt, xrefs: 05347499
                                                                  • RtlUnicodeStringCbCatStringN failed [%x], xrefs: 05347439
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DesktopLargeMinimumPageWindow
                                                                  • String ID: AslpFileQuery16BitDescription$FrontEndHeap$RtlUnicodeStringCbCatStringN failed [%x]$WER/CrashAPI:%u: ERROR Final gather block size exceeds limit$fDa4P9+d9sUhAxNtkA8rSqPR/YC9ci1IF5ZhBUb9pBFS5pnX7GJyuTRrRXK0JOsL1rP1a8enzEZmpPpqbTgOpLkt9tEO3RiAY0YJOXeYBzNTw9DT43DwYHu6jXJ1z8dWxhEJv0Ij6iO0ebdg87m6OhtROnYgAnJjsuzRnHkSVsa4c89NSnduqn/JL9vDotf5uTdc2ENjZ8tmytdJwTe6CU7GZZhhyOTFCfqCJYhcH9ccLUTJPKT1QLwoA9GEBlQTP5jt
                                                                  • API String ID: 2359144380-4176750766
                                                                  • Opcode ID: cb04212fef1dd815f72509ce2c86c1984d4a962faaa5b48306cc6f7596ffd2e7
                                                                  • Instruction ID: 93088d4f2afbf674098598baaeec11f335d5fa69c81fd47b8037efb32cd9c66c
                                                                  • Opcode Fuzzy Hash: cb04212fef1dd815f72509ce2c86c1984d4a962faaa5b48306cc6f7596ffd2e7
                                                                  • Instruction Fuzzy Hash: 76514875A083888ECB18CF79D8852E97FE5EB94305F54C9BDD8998B341CA388489CFD1
                                                                  APIs
                                                                  • GetForegroundWindow.USER32(?,?,?,?,05346374,?,?,?,?,?,?,?,?,?,?,?), ref: 0535345E
                                                                  • GetUserDefaultLangID.KERNEL32(?,?,?,?,05346374,?,?,?,?,?,?,?,?,?,?,?), ref: 05353464
                                                                  • GetDesktopWindow.USER32 ref: 05353491
                                                                  • GetTopWindow.USER32 ref: 05353527
                                                                  • AnyPopup.USER32 ref: 05353559
                                                                  Strings
                                                                  • AslpFileGetHeaderAttributesPE failed [%x], xrefs: 05353497
                                                                  • The specified storage reserve ID is invalid., xrefs: 0535346A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$DefaultDesktopForegroundLangPopupUser
                                                                  • String ID: AslpFileGetHeaderAttributesPE failed [%x]$The specified storage reserve ID is invalid.
                                                                  • API String ID: 2508019835-289983430
                                                                  • Opcode ID: 0d6943af8094291840c75f1eb7c07402f09c1e011fa92a23d1d171393dfd4613
                                                                  • Instruction ID: cd791c986c637188898d4099cb2fbac1aebb33518126e9524a7ae91eb06eb88e
                                                                  • Opcode Fuzzy Hash: 0d6943af8094291840c75f1eb7c07402f09c1e011fa92a23d1d171393dfd4613
                                                                  • Instruction Fuzzy Hash: 8D21F6B49141404FDB11DF34C899A7A7BE9F7083A4F54AC6DE957CB281EB748894CB01
                                                                  APIs
                                                                  • GetFileVersionInfoSizeW.KERNELBASE(?,?,?,00000002,00000000), ref: 005AD4B2
                                                                  • GetFileVersionInfoW.KERNELBASE(?,00000000,?,00000000,?,?,?,00000000), ref: 005AD541
                                                                  • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,00000000,?,?,?,00000000), ref: 005AD555
                                                                  • VerQueryValueW.VERSION(00000000,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 005AD5DC
                                                                  Strings
                                                                  • \StringFileInfo\%04x%04x\ProductVersion, xrefs: 005AD56A
                                                                  • \VarFileInfo\Translation, xrefs: 005AD54F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: FileInfoQueryValueVersion$Size
                                                                  • String ID: \StringFileInfo\%04x%04x\ProductVersion$\VarFileInfo\Translation
                                                                  • API String ID: 2099394744-1825429935
                                                                  • Opcode ID: 469d88d1df8c0752d70f9e5c9daa23c432d30d01e78e35faadf80f0f3ee14d75
                                                                  • Instruction ID: 6d1c00e8736ab6222b05785a7a3495e7b4fe80d54c19f70853004ab7598ad753
                                                                  • Opcode Fuzzy Hash: 469d88d1df8c0752d70f9e5c9daa23c432d30d01e78e35faadf80f0f3ee14d75
                                                                  • Instruction Fuzzy Hash: F8616BB1D00209AFDB14DFA8D985BAEBBF5FF48304F10452EE41AE3640E775A945CBA0
                                                                  APIs
                                                                    • Part of subcall function 05341000: NtAlpcCreateSectionView.NTDLL(00000000,?,?,?,?,?,?,?,?,?,0534B8C7), ref: 05341052
                                                                    • Part of subcall function 053513D4: GetCurrentThreadId.KERNEL32 ref: 053513F1
                                                                    • Part of subcall function 053513D4: GetDesktopWindow.USER32 ref: 0535141F
                                                                    • Part of subcall function 053513D4: GetParent.USER32 ref: 05351483
                                                                    • Part of subcall function 053513D4: SetLastError.KERNEL32 ref: 053514E9
                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 05341212
                                                                    • Part of subcall function 0534EB18: GetMessageTime.USER32 ref: 0534EB42
                                                                    • Part of subcall function 0534EB18: GetForegroundWindow.USER32 ref: 0534EB57
                                                                    • Part of subcall function 0534EB18: lstrlenW.KERNEL32 ref: 0534EC17
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateWindow$AlpcCurrentDesktopErrorForegroundLastMessageParentSectionSnapshotThreadTimeToolhelp32Viewlstrlen
                                                                  • String ID: A primary pack is already present.$An ACPI Power Object failed to transition state$No buffer is bound to composition surface$No leaks detected.$Windows.Core
                                                                  • API String ID: 1494823140-4035815744
                                                                  • Opcode ID: fe939649a84b304087af0277e0fa89d2c90b16f88a376f01c2756ee62ddec1f4
                                                                  • Instruction ID: e6e2ae3cff7d627facf39cecd6b2158ef6cf1b4816428230cde43fefd8f25650
                                                                  • Opcode Fuzzy Hash: fe939649a84b304087af0277e0fa89d2c90b16f88a376f01c2756ee62ddec1f4
                                                                  • Instruction Fuzzy Hash: 0E313B716246405AC720AB70ED09B3ABFE8FB402D9F548419F148DA108DB74B884CFA2
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Last$ActivePopup$Error
                                                                  • String ID: ;$;$H
                                                                  • API String ID: 1952306238-2656199830
                                                                  • Opcode ID: 41b9b62692f0b2bb62abcd366f47666ee2ba92a7489dfbc7c1926ea6ffee8d6f
                                                                  • Instruction ID: 107016fc405da65e79e3b279bd212f4f1cdf470e250175cb80b1151e4f92d481
                                                                  • Opcode Fuzzy Hash: 41b9b62692f0b2bb62abcd366f47666ee2ba92a7489dfbc7c1926ea6ffee8d6f
                                                                  • Instruction Fuzzy Hash: 8F319CB4A212199FCB00DFA9E48569EBFF9FB88318F41C66DE955DB240DB749801CF84
                                                                  APIs
                                                                  • GetClientRect.USER32(?,?), ref: 0059FA5D
                                                                  • SetWindowPos.USER32(?,00000001,?,?,00000000,00000000,00000211,?,?,?,?,?,0059F786), ref: 0059FA89
                                                                  • IsZoomed.USER32 ref: 0059FA91
                                                                  • EnableWindow.USER32(?,00000000), ref: 0059FAA1
                                                                  • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,0059F786), ref: 0059FAAC
                                                                  • EnableWindow.USER32(?,00000001), ref: 0059FABA
                                                                  • ShowWindow.USER32(?,?,?,?,?,?,?,?,0059F786), ref: 0059FACF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Window$EnableShow$ClientRectZoomed
                                                                  • String ID:
                                                                  • API String ID: 989374080-0
                                                                  • Opcode ID: 82a2a5a8616aaa03487c9c20df8c67d283f4e9ae4ac6ffbdef8d545c8da244b3
                                                                  • Instruction ID: b6fc8cf4c103dc6c6fd6131a9e1865576c65923b4c662937b7707a2af6eb5b82
                                                                  • Opcode Fuzzy Hash: 82a2a5a8616aaa03487c9c20df8c67d283f4e9ae4ac6ffbdef8d545c8da244b3
                                                                  • Instruction Fuzzy Hash: 0B016931140700EFEB20AF38CD49FAABBE6FF44702F805918F986925A0D775E8108B20
                                                                  APIs
                                                                  • #410.COMCTL32(?,00624530,000004D2,0067B0B0,?,00000000,?), ref: 0062362E
                                                                  • #412.COMCTL32(?,00624530,000004D2,?,00000000,?), ref: 00623641
                                                                  • EnumChildWindows.USER32(?,006236C0), ref: 0062364E
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0062365A
                                                                  • EnumThreadWindows.USER32(00000000), ref: 00623661
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000587,?,?,?,00000000,?), ref: 00623671
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: EnumThreadWindows$#410#412ChildCurrentRedrawWindow
                                                                  • String ID:
                                                                  • API String ID: 1422472111-0
                                                                  • Opcode ID: 89038f0053fc4c8486412915f82e28fd42b2a75aa4571bafcc92afeb0ebffc81
                                                                  • Instruction ID: 18751b9f31abfe441e1f2fda1662fa75259e48b90b5b7dec63d94e38146b8819
                                                                  • Opcode Fuzzy Hash: 89038f0053fc4c8486412915f82e28fd42b2a75aa4571bafcc92afeb0ebffc81
                                                                  • Instruction Fuzzy Hash: 5A118231245730BBD710EF61AC09F9B7BAEAF95B01F004408F581A6391C7689605CE7A
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,?), ref: 0059BDAB
                                                                  • KiUserCallbackDispatcher.NTDLL(00000000,?), ref: 0059BDCB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CallbackDispatcherItemUser
                                                                  • String ID:
                                                                  • API String ID: 4250310104-0
                                                                  • Opcode ID: ebd2be3fc3a64c3ec9c362b0bea4d924e4f0ff9b6743fc7203a06d19adae6ebb
                                                                  • Instruction ID: 7ebbee7514fcb1cb62b5531fa8920245bf37723f8775a0b184b56237171291f0
                                                                  • Opcode Fuzzy Hash: ebd2be3fc3a64c3ec9c362b0bea4d924e4f0ff9b6743fc7203a06d19adae6ebb
                                                                  • Instruction Fuzzy Hash: 52F0BB32244721ABEB629B35FC09BDE7F56FF91722F019815F89099194C7108CA7D760
                                                                  APIs
                                                                  Strings
                                                                  • The system does not support fault tolerant volumes., xrefs: 053524A4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ActiveBaseDialogForegroundLastPopupUnitsWindow
                                                                  • String ID: The system does not support fault tolerant volumes.
                                                                  • API String ID: 3505280388-4025416350
                                                                  • Opcode ID: 3126b21c305a7fc67dc67b9864147a240dd06836c604163ab42dcb05c1b26e64
                                                                  • Instruction ID: c81584ab56169aa7aaa737994916246ae74ae957337245262e07b11785c08533
                                                                  • Opcode Fuzzy Hash: 3126b21c305a7fc67dc67b9864147a240dd06836c604163ab42dcb05c1b26e64
                                                                  • Instruction Fuzzy Hash: CE511779E241918BD31ACF68E4926A67FAAF745318F69C06EFC45CF344DA3484458B80
                                                                  APIs
                                                                  Strings
                                                                  • Failed to allocate process history buffer, xrefs: 05346EC6
                                                                  • CLiP license hardware ID is out of tolerance., xrefs: 05346FCF
                                                                  • dBG5xOZ9SrUbniavLIPRLiUBop3jpwxLm0b09L8W9yJBZxL8klaODa2zWo78Xyd+XEVXQlKy2nWCFNHyHMODh69lI+2/2WnD5oSli6kx/aEi5sa9lspGSc2d/CdOozkWnCDHvMkFBW77dNXssfJuPEb0LKdNRvkqfUTL2d41uwxNQKxjtUVVDJ3UiwGgHYLgq4+ecro3l0xEhxTFrdahDQeTsAmQp72aEEx8qYKCdU854Kvtg5eAKjOxBrH5fFulettx, xrefs: 05347021
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ActiveLastPopup
                                                                  • String ID: CLiP license hardware ID is out of tolerance.$Failed to allocate process history buffer$dBG5xOZ9SrUbniavLIPRLiUBop3jpwxLm0b09L8W9yJBZxL8klaODa2zWo78Xyd+XEVXQlKy2nWCFNHyHMODh69lI+2/2WnD5oSli6kx/aEi5sa9lspGSc2d/CdOozkWnCDHvMkFBW77dNXssfJuPEb0LKdNRvkqfUTL2d41uwxNQKxjtUVVDJ3UiwGgHYLgq4+ecro3l0xEhxTFrdahDQeTsAmQp72aEEx8qYKCdU854Kvtg5eAKjOxBrH5fFulettx
                                                                  • API String ID: 3737024409-446137809
                                                                  • Opcode ID: c56bb7f0ce6c64431c4b86712df960f6f78e367a3c8477efe01d442ba527b3be
                                                                  • Instruction ID: 4a19a9e80f8db2a0408dc1d731bb9bb3fb2e54719ebaa47dcdbeaf2c74267b4a
                                                                  • Opcode Fuzzy Hash: c56bb7f0ce6c64431c4b86712df960f6f78e367a3c8477efe01d442ba527b3be
                                                                  • Instruction Fuzzy Hash: 20418F3150819C8ADF158E79A8863EABFF6AB52300F84C0FDD5CD97242C57949888FA1
                                                                  APIs
                                                                  Strings
                                                                  • CLR version string null or too long, xrefs: 0534EC10
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ForegroundMessageTimeWindowlstrlen
                                                                  • String ID: CLR version string null or too long
                                                                  • API String ID: 2918359910-2602880372
                                                                  • Opcode ID: b2696c36b4bfa4fe5bd2a177f6665e9ea3251fde760c6edb81c085ef9ab6267e
                                                                  • Instruction ID: 06b869717c60d9a42f47fda123a15ff1decded8a33a40780847f175351d08f51
                                                                  • Opcode Fuzzy Hash: b2696c36b4bfa4fe5bd2a177f6665e9ea3251fde760c6edb81c085ef9ab6267e
                                                                  • Instruction Fuzzy Hash: F031AE759242428FDB14CF28E8966257FEDF749384F44C12EE066CF640DB30A408DF56
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ShellWindow
                                                                  • String ID: An error occurred during an access to Region Space$Failed to construct full key path$The RPC protocol sequence was not found.
                                                                  • API String ID: 2831631499-4078023678
                                                                  • Opcode ID: 45b103be1d44f18994cb1d7692e73bf915826dccfb17a689f4533f0ddafc33b0
                                                                  • Instruction ID: f5dbb0f4f6351259f636b606adc999d1262081d76f8989d398dba68abbea2fdb
                                                                  • Opcode Fuzzy Hash: 45b103be1d44f18994cb1d7692e73bf915826dccfb17a689f4533f0ddafc33b0
                                                                  • Instruction Fuzzy Hash: 83319E759283058FC700DF78E95A2267FF9E784308F80C5ADE9948F309DB3998018F95
                                                                  APIs
                                                                  • GetForegroundWindow.USER32(?,00001DA0,?,053498B5), ref: 053530BC
                                                                  • GetSystemDefaultLangID.KERNEL32(?,00001DA0,?,053498B5), ref: 053530ED
                                                                  • GetThreadUILanguage.KERNEL32(?,00001DA0,?,053498B5), ref: 05353115
                                                                  Strings
                                                                  • An attempt was made to open an Anonymous level token., xrefs: 053530C2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultForegroundLangLanguageSystemThreadWindow
                                                                  • String ID: An attempt was made to open an Anonymous level token.
                                                                  • API String ID: 3065435761-254260388
                                                                  • Opcode ID: 0273efb74b6e1d0a2909d6b79701f247eb9f8ea0b102f29dd690ccfee80955bc
                                                                  • Instruction ID: 09e121d9155e7bcbcc416e7c452bd6c7f799f572534a903a35e97e9ec0398ccb
                                                                  • Opcode Fuzzy Hash: 0273efb74b6e1d0a2909d6b79701f247eb9f8ea0b102f29dd690ccfee80955bc
                                                                  • Instruction Fuzzy Hash: B3F0F0656182008BDB145F64D88AA2B7BA8F744394F60C83EF807CF280DAA588849291
                                                                  APIs
                                                                  • GetTickCount64.KERNEL32 ref: 005AF117
                                                                  • RegOpenKeyExW.KERNELBASE(005AD9A0,00662530,00000000,005AD990,00000000,00000000,00000000,?,0065313D,000000FF,?), ref: 005AF1BB
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 005AF20E
                                                                  • GetTickCount64.KERNEL32 ref: 005AF223
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Count64Tick$CloseOpen
                                                                  • String ID:
                                                                  • API String ID: 4020578057-0
                                                                  • Opcode ID: be5dae2f05208f0c87d552ce52396dd0f4f859c5c154aef2d745cf485740c7f2
                                                                  • Instruction ID: db0d7c9a88a78925d77d627d5c12b68d7fa723c3cdf79a680e225c03852aa6e2
                                                                  • Opcode Fuzzy Hash: be5dae2f05208f0c87d552ce52396dd0f4f859c5c154aef2d745cf485740c7f2
                                                                  • Instruction Fuzzy Hash: CD419C75A00B45DFDB24CFA8C884BAEBBF6FB45315F04092EE59293A90D771A844CB60
                                                                  APIs
                                                                    • Part of subcall function 005A8D80: GetWindowTextLengthW.USER32(?), ref: 005A8DA5
                                                                    • Part of subcall function 005A8D80: GetWindowTextW.USER32(?,00000000,00000001), ref: 005A8E0A
                                                                  • EnumChildWindows.USER32(?,Function_00048D80), ref: 005A8AAB
                                                                  • GetCurrentThreadId.KERNEL32 ref: 005A8AB7
                                                                  • EnumThreadWindows.USER32(00000000), ref: 005A8ABE
                                                                  • GetSystemMenu.USER32(?,00000000,?,?,?), ref: 005A8AC7
                                                                    • Part of subcall function 005A8AF0: GetMenuItemCount.USER32(?), ref: 005A8B1A
                                                                    • Part of subcall function 005A8AF0: GetMenuItemInfoW.USER32(?,00000000,00000400,?), ref: 005A8B9B
                                                                    • Part of subcall function 005A8AF0: GetMenuItemInfoW.USER32(?,00000000,00000400,00000030), ref: 005A8C0D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Item$EnumInfoTextThreadWindowWindows$ChildCountCurrentLengthSystem
                                                                  • String ID:
                                                                  • API String ID: 886740550-0
                                                                  • Opcode ID: aa0ea1512620b476732a97653e9aa58e6d7f9342d46ff554ed2b8e99682e6e48
                                                                  • Instruction ID: e7feec6aafb31ad0b4762c744eb49f91804472084eab352cb231f60f9adc9071
                                                                  • Opcode Fuzzy Hash: aa0ea1512620b476732a97653e9aa58e6d7f9342d46ff554ed2b8e99682e6e48
                                                                  • Instruction Fuzzy Hash: 4CE06532640251B78710A7A95C0DEBF3FAEABD7722F08411AF501D21D0DEA05D0183BA
                                                                  APIs
                                                                    • Part of subcall function 00625490: SystemParametersInfoW.USER32(00000042,0000000C,0000000C,00000000), ref: 006254CE
                                                                    • Part of subcall function 00625490: GetSysColor.USER32(00000008), ref: 006254EE
                                                                    • Part of subcall function 00625490: GetSysColor.USER32(00000005), ref: 00625507
                                                                  • GetTickCount64.KERNEL32 ref: 0062304C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Color$Count64InfoParametersSystemTick
                                                                  • String ID: darkmode$global
                                                                  • API String ID: 3447872873-3442901483
                                                                  • Opcode ID: 18dc7d36c8edea430675de29f521951fd5b11a3edd059df457ce3f60f52cae56
                                                                  • Instruction ID: c4af6175fbe77e95770f0908b2151f7756aa3b1ff8bf174aeb9b9c8a3b3f7c32
                                                                  • Opcode Fuzzy Hash: 18dc7d36c8edea430675de29f521951fd5b11a3edd059df457ce3f60f52cae56
                                                                  • Instruction Fuzzy Hash: 10310520300E32AADB289734B84A7E8B797BF40314F188249D45582390DF6DA991CBB6
                                                                  APIs
                                                                  • GetForegroundWindow.USER32(?,?,?,0534B77C), ref: 05351958
                                                                  • GetShellWindow.USER32 ref: 053519D4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$ForegroundShell
                                                                  • String ID: Network interface aborted the request.
                                                                  • API String ID: 3950612657-3432463622
                                                                  • Opcode ID: 75fa38dea8c530525524d60a6b2ede720d8577e288bc7d5e1a32c399a1aa6c12
                                                                  • Instruction ID: 8c13353bae25ffec62d0f64de9d0b7a40e0abf37cda990489cc1a7757f15f0a8
                                                                  • Opcode Fuzzy Hash: 75fa38dea8c530525524d60a6b2ede720d8577e288bc7d5e1a32c399a1aa6c12
                                                                  • Instruction Fuzzy Hash: BF310279A342454FD304CF39D546A627FEAF345358B84D5AFEA82CF204EA748041CBC4
                                                                  APIs
                                                                  • RegOpenKeyExW.KERNELBASE(80000001,0067BC98,00000000,00000000,00000000), ref: 005BE848
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 005BE881
                                                                  • GetTickCount64.KERNEL32 ref: 005BE88E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCount64OpenTick
                                                                  • String ID:
                                                                  • API String ID: 2982736543-0
                                                                  • Opcode ID: 5da7a86f551cbcd76cc46d149aff7a6903a4cb087c90b3ccd447cb1c208b8aa1
                                                                  • Instruction ID: 268c1c19a861159c0f3710aa54dbc6b5fdc128036c5a46b6674dde1dd6edbf25
                                                                  • Opcode Fuzzy Hash: 5da7a86f551cbcd76cc46d149aff7a6903a4cb087c90b3ccd447cb1c208b8aa1
                                                                  • Instruction Fuzzy Hash: 1311D274404B51EFD724CF28C985B57BBF1FB44715F40881EE88A82AA0E372F848CB61
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(?,?,0063C7F9,00000101,Rb,?,?,713211A9,0062EA52,?), ref: 0063C810
                                                                  • TerminateProcess.KERNEL32(00000000,?,0063C7F9,00000101,Rb,?,?,713211A9,0062EA52,?), ref: 0063C817
                                                                  • ExitProcess.KERNEL32 ref: 0063C829
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CurrentExitTerminate
                                                                  • String ID:
                                                                  • API String ID: 1703294689-0
                                                                  • Opcode ID: b1c89446ee84177988f01d6f100df253d72811ab7ba763604bb09d095321b74c
                                                                  • Instruction ID: da4f84cbf181d9c3b7bbcbc2ae75bba9740c1b8e7d45cab17ede2402012a3331
                                                                  • Opcode Fuzzy Hash: b1c89446ee84177988f01d6f100df253d72811ab7ba763604bb09d095321b74c
                                                                  • Instruction Fuzzy Hash: BAD09E31010209FFCF556F65EC0DD593F2BAF44356F445028B90555172DB319A52DBE5
                                                                  APIs
                                                                    • Part of subcall function 053465D8: GetTopWindow.USER32 ref: 053466A6
                                                                    • Part of subcall function 053465D8: GetOEMCP.KERNEL32(?,?,?,?,?,?,?,?,0534B8C7), ref: 053466BC
                                                                  • GetUserDefaultLangID.KERNEL32(?,?,?,0534BD26), ref: 0534BA2A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLangUserWindow
                                                                  • String ID:
                                                                  • API String ID: 2546096385-0
                                                                  • Opcode ID: 8938f14b779c6a9318c468024b32a1a89c9d19eafe8c4da45603419424a584c1
                                                                  • Instruction ID: 1ea55cd4cee0f9060b413a9aa48be7c7486515c4cb80401d874116d56cb3a253
                                                                  • Opcode Fuzzy Hash: 8938f14b779c6a9318c468024b32a1a89c9d19eafe8c4da45603419424a584c1
                                                                  • Instruction Fuzzy Hash: 5A71E7B4A18701CFCB05EF69D589919FBF5FF48310B5698A9E844DB315EB30E8848F62
                                                                  APIs
                                                                  • CoCreateInstance.OLE32(00659710,00000000,00000001,00659750,?), ref: 0059A782
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CreateInstance
                                                                  • String ID:
                                                                  • API String ID: 542301482-0
                                                                  • Opcode ID: e8ba21405aa0667bab2e41bfe38766b375eccc7c9b153c6e066078ce0d4d19fa
                                                                  • Instruction ID: 91d126e082e5bac87af1520b334e189f933b1c1fe8b8d2d898ca55d0071cebc7
                                                                  • Opcode Fuzzy Hash: e8ba21405aa0667bab2e41bfe38766b375eccc7c9b153c6e066078ce0d4d19fa
                                                                  • Instruction Fuzzy Hash: 43416970600705AFDB24CFA9C885BAABBB9FF49B15F10416DE501DB690C7B2E804CBA1
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000008,?,?,?,006418B4,00000001,00000364,?,00000006,000000FF,?,?,006301C7,006426F6), ref: 00642697
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 1965efa2f80841669adc109aefef888058e655a02c1b701490a8abc7fb3383c7
                                                                  • Instruction ID: 990cbb8bcdc099c5d483145649a7811c7eb31138fda92fd431c80ad9b5ff15d6
                                                                  • Opcode Fuzzy Hash: 1965efa2f80841669adc109aefef888058e655a02c1b701490a8abc7fb3383c7
                                                                  • Instruction Fuzzy Hash: 24F0E93160123767DB31AB65DC15B9A7B4BAF42760F779125FC04E6290CE60DD0086E4
                                                                  APIs
                                                                  • GetForegroundWindow.USER32(?,00000000,?,0534745D), ref: 053507BB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ForegroundWindow
                                                                  • String ID:
                                                                  • API String ID: 2020703349-0
                                                                  • Opcode ID: 12a51ba5efb95afa1265efcc848a6e4cbd5b239a22d4bc7babbf402eaa86a85d
                                                                  • Instruction ID: 3dba20340e496697d67e45080ab7c21029e11cefcc6d4cc66a2599d9b799db5f
                                                                  • Opcode Fuzzy Hash: 12a51ba5efb95afa1265efcc848a6e4cbd5b239a22d4bc7babbf402eaa86a85d
                                                                  • Instruction Fuzzy Hash: 45F0B46E5060068B9B245E7DC84C897F74AE7017723849113EC65CFB08F96248C3CB59
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,?,?,?,00628961,?,?,00599DB0,00000024,?,?,0065359F,000000FF), ref: 006426E5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 94fe49ec5a61e7ec0b3fab8dc61779391bc20b6e71fb023f4fd6def276d56de9
                                                                  • Instruction ID: fa8b5e517d17bbff31a62face88e324898f14044e0cf32e430b254fac3bb69f2
                                                                  • Opcode Fuzzy Hash: 94fe49ec5a61e7ec0b3fab8dc61779391bc20b6e71fb023f4fd6def276d56de9
                                                                  • Instruction Fuzzy Hash: 48E0ED3120122B6BEF3126659C20B9B3A4B9F413E0FB30160FC48E62D0CE60CC8099E8
                                                                  APIs
                                                                  • GetSystemDefaultLangID.KERNEL32 ref: 0534991C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLangSystem
                                                                  • String ID:
                                                                  • API String ID: 706401283-0
                                                                  • Opcode ID: 7eee95ff842472bcdfcc3ebc6d4cc9cb6434afc754c32fa04a2aa553f4c33131
                                                                  • Instruction ID: 3cc66a3e3d279b8caaac7589d3c0c9985b08ac71799608de265c346d3f57d692
                                                                  • Opcode Fuzzy Hash: 7eee95ff842472bcdfcc3ebc6d4cc9cb6434afc754c32fa04a2aa553f4c33131
                                                                  • Instruction Fuzzy Hash: 3BF03A64A242018ED715BBBC994F12D3FE9FB56208F40CA69E056CA250DF38A0068FA2
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FreeHeap
                                                                  • String ID:
                                                                  • API String ID: 3298025750-0
                                                                  • Opcode ID: 4e619b321c7eefc8b2be657072bff738abacd097d0dd9695a28674257ee806bb
                                                                  • Instruction ID: 88221e55c455e41c4f6994e0d5e8741eda90718dd3264390c864e68edd87cbb6
                                                                  • Opcode Fuzzy Hash: 4e619b321c7eefc8b2be657072bff738abacd097d0dd9695a28674257ee806bb
                                                                  • Instruction Fuzzy Hash: 0FE0E6745047059FC708EF19C18581AFBF5BFC4240F51C599DC444B315D630D8959BD1
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(?,?,?,?,?,0534BF0B), ref: 0534B882
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 313513595948e2a599a16bb8f832654b1b13fa39767bf828bf66e8370fee390a
                                                                  • Instruction ID: aff41fc2d7f95dcb02a02ad107821fd3d4d1c2ab8e7fd82fcf1cb57951cb3882
                                                                  • Opcode Fuzzy Hash: 313513595948e2a599a16bb8f832654b1b13fa39767bf828bf66e8370fee390a
                                                                  • Instruction Fuzzy Hash: 0FE0B6785143019FC304EF18D18590AFBF5BB84214F51C558DC844B355D670E8898BC1
                                                                  APIs
                                                                    • Part of subcall function 005D9860: QueryPerformanceCounter.KERNEL32(?,00000000,?,00000000,?,?,005EE845,00000000), ref: 005D98A1
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005EE8FF
                                                                    • Part of subcall function 005F5070: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000040,00000000,00000000), ref: 005F5148
                                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,.bak,00000004), ref: 005EFA46
                                                                  • GetLastError.KERNEL32 ref: 005EFA79
                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000000,00000000), ref: 005EFAE8
                                                                  • GetFileTime.KERNEL32(00000000,00000000,00000000,00000000), ref: 005EFB08
                                                                  • GetFileAttributesW.KERNEL32(?), ref: 005EFB2A
                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 005EFB4B
                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 005EFB78
                                                                  • CreateFileW.KERNEL32(?,40000000,00000007,00000000,00000003,00000000,00000000), ref: 005EFBAF
                                                                  • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000), ref: 005EFBCE
                                                                  • CloseHandle.KERNEL32(00000000,00000000), ref: 005EFBDB
                                                                  • Sleep.KERNEL32(00000032), ref: 005EFBEA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: File$Attributes$CreateTime$ByteCharCloseCopyCounterErrorHandleLastMultiPerformanceQuerySleepUnothrow_t@std@@@Wide__ehfuncinfo$??2@
                                                                  • String ID: ${fileext}$${fileext}$${filename}$${filename}$${filepath}$${filepath}$,nf$.bak$.grepwinreplaced$0nf$4nf$8nf$<nf$@$@nf$Dnf$Hnf$P#f$Software\grepWinNP3\nullbytes$X*f$\grepWinNP3_backup\$file load and parse: $j$nullbytes$p1f$settings$kf
                                                                  • API String ID: 3915558587-3558875250
                                                                  • Opcode ID: 13b5068ea5b39b4733192299fbbedc3be2b3df129f65a2d06e25e5b0241a5cbd
                                                                  • Instruction ID: 69390026893bd18b13a062baf3f290590254995da571e97301ff8ca2f10cec57
                                                                  • Opcode Fuzzy Hash: 13b5068ea5b39b4733192299fbbedc3be2b3df129f65a2d06e25e5b0241a5cbd
                                                                  • Instruction Fuzzy Hash: 71438970900259DFDF28DF64C889BEEBBB5BF44304F1441A9E449A7292DB34AE85CF91
                                                                  APIs
                                                                  • GetCommandLineW.KERNEL32 ref: 005B9994
                                                                  • CommandLineToArgvW.SHELL32(?,?,00000000,-00000002), ref: 005B9A07
                                                                  • PathFileExistsW.SHLWAPI(?,00000000,?), ref: 005B9B4B
                                                                  • PathFileExistsW.SHLWAPI(?), ref: 005B9CA1
                                                                  • PathFileExistsW.SHLWAPI(?,00000000,?), ref: 005B9D61
                                                                  • PathIsURLW.SHLWAPI(?,?), ref: 005B9EF3
                                                                  • PathIsRelativeW.SHLWAPI(?), ref: 005B9F0E
                                                                  • GetFullPathNameW.KERNEL32(?,00000000,00000000,00000000), ref: 005B9F2F
                                                                  • GetFullPathNameW.KERNEL32(?,?,00000000,00000000), ref: 005B9F8B
                                                                  • PathCanonicalizeW.SHLWAPI(?,?), ref: 005BA03A
                                                                  • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 005BA053
                                                                  • GetLongPathNameW.KERNEL32(?,?,00000001), ref: 005BA0A8
                                                                  • GetShortPathNameW.KERNEL32(?,00000000,00000000), ref: 005BA0B8
                                                                  • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 005BA11D
                                                                  • GetLongPathNameW.KERNEL32(?,00000000,?), ref: 005BA173
                                                                  • GetShortPathNameW.KERNEL32(00000000,00000000,00000000), ref: 005BA1FE
                                                                  • GetShortPathNameW.KERNEL32(00000000,?,?), ref: 005BA254
                                                                  • GetLongPathNameW.KERNEL32(?,00000000,?), ref: 005BA26D
                                                                  • PathIsURLW.SHLWAPI(?,?), ref: 005BA4D4
                                                                  • PathIsRelativeW.SHLWAPI(?), ref: 005BA4EF
                                                                  • GetFullPathNameW.KERNEL32(?,00000000,00000000,00000000), ref: 005BA510
                                                                  • GetFullPathNameW.KERNEL32(?,?,00000000,00000000), ref: 005BA56F
                                                                  • PathCanonicalizeW.SHLWAPI(?,?), ref: 005BA5F7
                                                                  • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 005BA610
                                                                  • GetLongPathNameW.KERNEL32(?,?,00000001), ref: 005BA668
                                                                  • GetShortPathNameW.KERNEL32(?,00000000,00000000), ref: 005BA678
                                                                  • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 005BA6E0
                                                                  • GetLongPathNameW.KERNEL32(?,00000000,?), ref: 005BA739
                                                                  • GetShortPathNameW.KERNEL32(00000000,00000000,00000000), ref: 005BA7C4
                                                                  • GetShortPathNameW.KERNEL32(00000000,?,?), ref: 005BA81D
                                                                  • GetLongPathNameW.KERNEL32(?,00000000,?), ref: 005BA836
                                                                  • LocalFree.KERNEL32(?), ref: 005BAA1F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Path$Name$Long$Short$Full$ExistsFile$CanonicalizeCommandLineRelative$ArgvFreeLocal
                                                                  • String ID: "$T*f
                                                                  • API String ID: 2970764310-2600113902
                                                                  • Opcode ID: bc871a878fda8de0830c12e51066d1550800ae7ab6c88341102edeeb1b8b96a5
                                                                  • Instruction ID: e2b0a924fd4acfbe332e7b113bb69a26b16ff6e17ddfb34540f0a91f095cd06a
                                                                  • Opcode Fuzzy Hash: bc871a878fda8de0830c12e51066d1550800ae7ab6c88341102edeeb1b8b96a5
                                                                  • Instruction Fuzzy Hash: 38D218B0D012199FDF24DFA8D885BEEBBF5BF08300F1445A9E509A7291E7706A85CF61
                                                                  APIs
                                                                  • QueryPerformanceCounter.KERNEL32(?,SearchThread,0000000C), ref: 005EC22B
                                                                    • Part of subcall function 00627690: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,005EC26D), ref: 0062769A
                                                                  • GetTickCount64.KERNEL32 ref: 005EC330
                                                                    • Part of subcall function 005F5070: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000040,00000000,00000000), ref: 005F5148
                                                                    • Part of subcall function 00627705: WakeConditionVariable.KERNEL32(005DC02E,?,005DC032,0067B1A0), ref: 0062770F
                                                                  • SendMessageW.USER32(?,00008002,00000000,00000000), ref: 005EC8D6
                                                                  • PathIsDirectoryW.SHLWAPI(?), ref: 005ECAF3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharConditionCount64CounterDirectoryInfoMessageMultiNativePathPerformanceQuerySendSystemTickVariableWakeWide
                                                                  • String ID: $MaxNumOfWorker$SearchThread$Software\grepWinNP3\MaxNumOfWorker$\/ $\x00$global
                                                                  • API String ID: 3804574865-1410697583
                                                                  • Opcode ID: 523bc27f4a68acd8286b3e9871dd50835cf1c2ecc06f26650812b0c9728e6529
                                                                  • Instruction ID: 01e40e2036995d5614ef98355183e356c8ce5d4365d55bbfe8bd65dfcf197595
                                                                  • Opcode Fuzzy Hash: 523bc27f4a68acd8286b3e9871dd50835cf1c2ecc06f26650812b0c9728e6529
                                                                  • Instruction Fuzzy Hash: 18F25970D002999FDF28CFA9C984BEDBFB1BF05304F144599E499A7291D731AA86CF60
                                                                  APIs
                                                                  • MoveWindow.USER32(?,00000000,00000000,?,?,00000001), ref: 005A71BF
                                                                  • CloseWindow.USER32(?), ref: 005A71E0
                                                                  • DestroyWindow.USER32(?), ref: 005A71E9
                                                                  • SendMessageW.USER32(?,0000044B,00000000,?), ref: 005A726C
                                                                  • LoadCursorW.USER32(00000000,00007F89), ref: 005A72A9
                                                                  • SetCursor.USER32(00000000), ref: 005A72B0
                                                                  • ShellExecuteW.SHELL32(00000020,open,?,00000000,00000000,0000000A), ref: 005A72D3
                                                                  • EndDialog.USER32(?,?), ref: 005A736D
                                                                  • GetClientRect.USER32(?,?), ref: 005A739E
                                                                  • CreateWindowExW.USER32(00000000,RICHEDIT50W,00661ABC,50A0880C,00000000,00000000,?,?,?,00000000,?,00000000), ref: 005A73D1
                                                                  • FindResourceW.KERNEL32(?,?,?), ref: 005A73EE
                                                                  • LoadResource.KERNEL32(?,00000000), ref: 005A73FE
                                                                  • LockResource.KERNEL32(00000000), ref: 005A7409
                                                                  • SizeofResource.KERNEL32(?,00000000), ref: 005A7415
                                                                  • SendMessageW.USER32(?,00000461,?,00000000), ref: 005A7440
                                                                  • SetFocus.USER32(?), ref: 005A7445
                                                                  • SendMessageW.USER32(?,000000B1,000000FF,00000000), ref: 005A7457
                                                                  • SendMessageW.USER32(?,000000CF,00000001,00000000), ref: 005A7465
                                                                  • SendMessageW.USER32(?,00000445,00000000,04000004), ref: 005A7476
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$ResourceWindow$CursorLoad$ClientCloseCreateDestroyDialogExecuteFindFocusLockMoveRectShellSizeof
                                                                  • String ID: RICHEDIT50W$open
                                                                  • API String ID: 4190574625-2205014345
                                                                  • Opcode ID: 15c0c23ce0f32a1185c297715177f5e057777eb6ada18798786cfc604b0999be
                                                                  • Instruction ID: 01b872b6fa943d4e6d0f6bf6974fbfc8b559f2d05e2f8e40ad8921c32d1fb5f5
                                                                  • Opcode Fuzzy Hash: 15c0c23ce0f32a1185c297715177f5e057777eb6ada18798786cfc604b0999be
                                                                  • Instruction Fuzzy Hash: A6A19E71A00209EFDB24DFA8DC49BAEBFB5FF09701F104629F905E6690D774A850CBA0
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,000003F6), ref: 005E67BE
                                                                  • GetKeyState.USER32(00000011), ref: 005E67D1
                                                                  • GetKeyState.USER32(00000010), ref: 005E67E0
                                                                  • GetKeyState.USER32(00000012), ref: 005E67EF
                                                                  • GetFocus.USER32 ref: 005E681C
                                                                  • SendMessageW.USER32(00000000,0000100C,000000FF,00000002), ref: 005E6834
                                                                  • SendMessageW.USER32(00000000,0000100C,00000000,00000002), ref: 005E6876
                                                                  • GetFocus.USER32 ref: 005E6898
                                                                  • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 005E68D5
                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 005E68E1
                                                                  • SendMessageW.USER32(?,0000102B,00000000,?), ref: 005E6909
                                                                  • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 005E6924
                                                                  • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 005E6934
                                                                  • GetFocus.USER32 ref: 005E6958
                                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 005E69B1
                                                                  • SendMessageW.USER32(00000000,00001200,00000000,00000000), ref: 005E69C0
                                                                  • SendMessageW.USER32(?,0000120B,00000000,-00000068), ref: 005E6A17
                                                                  • SendMessageW.USER32(?,0000100C,000000FF,00000002), ref: 005E6A54
                                                                  • SendMessageW.USER32(?,00001073,00000000,-00000074), ref: 005E6A8E
                                                                  • SetFocus.USER32(00000000), ref: 005E6B5E
                                                                  • IsDlgButtonChecked.USER32(?,00000423), ref: 005E6BB0
                                                                  • SendMessageW.USER32(?,0000100C,000000FF,00000002), ref: 005E6BC3
                                                                  • SendMessageW.USER32(?,0000100C,00000000,00000002), ref: 005E6C23
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Focus$State$ButtonCheckedItem
                                                                  • String ID:
                                                                  • API String ID: 2917284611-0
                                                                  • Opcode ID: fb0f680e27694f56884bea284d0bcc746a1436af61186aaa753a8009d35e7c7b
                                                                  • Instruction ID: 4e3fa9692a8f99e913e2398f483002d3a0b259e80ee9654bd7cc43e280ee2326
                                                                  • Opcode Fuzzy Hash: fb0f680e27694f56884bea284d0bcc746a1436af61186aaa753a8009d35e7c7b
                                                                  • Instruction Fuzzy Hash: ADD1D071E40358ABDB25DB64DC89BADBFB4FB25790F200269F994AB2C1C7B05D41CB60
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000014,?,?,?,?,?,?,?,?,?), ref: 005B16D5
                                                                  • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,08000000,00000000,?,?,?,?,?,?,?,?,?), ref: 005B16EC
                                                                  • GetFileSizeEx.KERNEL32(?,?,00000001,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005B184A
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 005B1855
                                                                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005B18B9
                                                                  • ReadFile.KERNEL32(?,00000000,?,?,00000000), ref: 005B1920
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005B1AFD
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005B1B86
                                                                  • ReadFile.KERNEL32(?,00000000,?,?,00000000), ref: 005B1C82
                                                                  • CloseHandle.KERNEL32(?), ref: 005B1C91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CloseFileHandle$Read$CreateGlobalMemorySizeSleepStatus
                                                                  • String ID: \\?\$\\?\UNC
                                                                  • API String ID: 638801665-2523517826
                                                                  • Opcode ID: 1a4735203e1a6bb9bcf689ab09c0069b2b6eea3b9139e0ba125430029e420601
                                                                  • Instruction ID: 07de0c049ac5d3e9a9cd83b7ac1da3b5f926d00eee38dbffc23c2557e64320e9
                                                                  • Opcode Fuzzy Hash: 1a4735203e1a6bb9bcf689ab09c0069b2b6eea3b9139e0ba125430029e420601
                                                                  • Instruction Fuzzy Hash: 7DA21171A00A499FDF64CF28C895BEA7FA6FF45300F544229F8158B391D731E942CBA9
                                                                  APIs
                                                                    • Part of subcall function 0534E3DC: GetLargePageMinimum.KERNEL32 ref: 0534E3EB
                                                                    • Part of subcall function 0534E3DC: GetParent.USER32 ref: 0534E44A
                                                                    • Part of subcall function 0534E3DC: GetParent.USER32 ref: 0534E4A1
                                                                  • GetParent.USER32 ref: 053468A1
                                                                  • SetLastError.KERNEL32(0000000B), ref: 05346AFF
                                                                  • GetParent.USER32 ref: 05346BF5
                                                                  • GetThreadUILanguage.KERNEL32 ref: 05346DC9
                                                                  • GetWindowTextLengthW.USER32(0000000B), ref: 05346E65
                                                                    • Part of subcall function 0534B88C: RtlFreeHeap.NTDLL ref: 0534B8B0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Parent$ErrorFreeHeapLanguageLargeLastLengthMinimumPageTextThreadWindow
                                                                  • String ID: Floating-point stack check.$Getting the shim engine exports failed with status 0x%08lx$The Global system lock could not be acquired$The requested name already exists as a unique identifier.$WER/CrashAPI:%u: ERROR Unable to create the m_hAliveEvent event$Y$\$`
                                                                  • API String ID: 1213828948-3937182347
                                                                  • Opcode ID: 9def536b5878a45d0f539e86789bbceb581aff45cc2a27301bd34408b5b0b40b
                                                                  • Instruction ID: b53b6a70f93431b66f3df4de9c29ffc1af714f78b8f91030f45b0033462137fe
                                                                  • Opcode Fuzzy Hash: 9def536b5878a45d0f539e86789bbceb581aff45cc2a27301bd34408b5b0b40b
                                                                  • Instruction Fuzzy Hash: 70F1E0B591425A8FDB10CF68D9862AABFF5FB65308F44C0ADD898DB341DAB499818F40
                                                                  APIs
                                                                  • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000000), ref: 005A2C69
                                                                  • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 005A2C8A
                                                                  • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 005A2C9D
                                                                  • CryptDestroyHash.ADVAPI32(?), ref: 005A2CAA
                                                                  • CryptReleaseContext.ADVAPI32(?,00000000), ref: 005A2CB5
                                                                  • CryptGetHashParam.ADVAPI32(?,00000004,?,?,00000000), ref: 005A2D05
                                                                  • CryptGetHashParam.ADVAPI32(?,00000002,00000000,?,00000000), ref: 005A2D71
                                                                  • CryptDestroyHash.ADVAPI32(?), ref: 005A2D7E
                                                                  • CryptReleaseContext.ADVAPI32(?,00000000), ref: 005A2D89
                                                                  • CryptDestroyHash.ADVAPI32(?), ref: 005A2E64
                                                                  • CryptReleaseContext.ADVAPI32(?,00000000), ref: 005A2E6F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Crypt$Hash$Context$DestroyRelease$Param$AcquireCreateData
                                                                  • String ID: H"f
                                                                  • API String ID: 2102843587-2192279335
                                                                  • Opcode ID: a4a8e4d897ef6210a1053009add65ffd32eb867e1f4dadb5ae62dbe580853e92
                                                                  • Instruction ID: 6735eb74d4f6aa300109bd690ce2bb61f688c2481693fc81cebf31333ee8916d
                                                                  • Opcode Fuzzy Hash: a4a8e4d897ef6210a1053009add65ffd32eb867e1f4dadb5ae62dbe580853e92
                                                                  • Instruction Fuzzy Hash: 01C19A71A00209AFDB14CF28CD46BAEBBB5FF49304F148269E919AB290D774A914CF90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: A repetition operator cannot be applied to a zero-width assertion.$AIL$Alternation operators are not allowed inside a DEFINE block.$CCEPT$Character class declaration starting with [ terminated prematurely - either no ] was found or the set had no content.$Invalid alternation operators within (?...) block.$Invalid or empty zero width assertion.$KIP$More than one alternation operator | was encountered inside a conditional expression.$OMMIT$RUNE$Unterminated \Q...\E sequence.
                                                                  • API String ID: 0-3570781604
                                                                  • Opcode ID: afd0f88232ed207e2104dd8bed9b521861f4fb2a4bf9762aaea9253e5a000e6f
                                                                  • Instruction ID: aff41268c1cb5724ec3a98d4dbd321b9d9b005f02151206b627b5201b1fe5f42
                                                                  • Opcode Fuzzy Hash: afd0f88232ed207e2104dd8bed9b521861f4fb2a4bf9762aaea9253e5a000e6f
                                                                  • Instruction Fuzzy Hash: D003C0B1A042559FDB18CF68C584BAEBFF2EF49300F1480ADE9499B382DB75D945CB50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: A repetition operator cannot be applied to a zero-width assertion.$AIL$Alternation operators are not allowed inside a DEFINE block.$CCEPT$Character class declaration starting with [ terminated prematurely - either no ] was found or the set had no content.$Invalid alternation operators within (?...) block.$Invalid or empty zero width assertion.$More than one alternation operator | was encountered inside a conditional expression.$OMMIT$RUNE$Unterminated \Q...\E sequence.
                                                                  • API String ID: 0-1123991675
                                                                  • Opcode ID: aebe542c5282b0ef16bac6d06b873507a443cca3e02ffc496db4df074b8afb63
                                                                  • Instruction ID: 2be9fdab858c8883df87f4b730dccd74a7eacd98b511f42f6824e4b3b8e9a9f4
                                                                  • Opcode Fuzzy Hash: aebe542c5282b0ef16bac6d06b873507a443cca3e02ffc496db4df074b8afb63
                                                                  • Instruction Fuzzy Hash: 2E235C719002489FCB14CFA8C585BAEBFF5BF45310F18859EE85AAB292D734ED45CB90
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 053462B1
                                                                  • GetLargePageMinimum.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0534B8E0), ref: 05346327
                                                                  • GetCurrentThread.KERNEL32 ref: 0534637E
                                                                  • GetSystemDefaultLangID.KERNEL32 ref: 053465A0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountCurrentDefaultLangLargeMinimumPageSystemThreadTick
                                                                  • String ID: 4$MaxLoaderThreads$OverlayPackages$The binding handle is invalid.$[
                                                                  • API String ID: 774141065-961749580
                                                                  • Opcode ID: 3d4967f0884e8317e1f2f04e4f0159afdea1c03e7650549ac570f4dc5a2cbb92
                                                                  • Instruction ID: 644bd31cbbb42a3dfc52b0af140b4f3691d5a09ae31c5a5d08a223712e0da9fe
                                                                  • Opcode Fuzzy Hash: 3d4967f0884e8317e1f2f04e4f0159afdea1c03e7650549ac570f4dc5a2cbb92
                                                                  • Instruction Fuzzy Hash: F07190B5A242588FC700DF66D84A25ABFE9FB84358F44CB9EE189CF244EB749444DF81
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000001,?,00000000,00000000,00000000,00000002,006668B8), ref: 005B0BAF
                                                                  • OpenClipboard.USER32(?), ref: 005B0BB6
                                                                  • EmptyClipboard.USER32 ref: 005B0BC0
                                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,00000000,00000000,00000000,00000002,006668B8), ref: 005B0BE9
                                                                  • GlobalLock.KERNEL32(00000000), ref: 005B0BF6
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 005B0C10
                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 005B0C19
                                                                  • CloseClipboard.USER32 ref: 005B0C23
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Clipboard$Global$AllocCloseDataEmptyLockOpenSleepUnlock
                                                                  • String ID:
                                                                  • API String ID: 3026512333-0
                                                                  • Opcode ID: afc9bfba2d6b970f5398b6ead9917782a7f3396662e940a429534665c055038a
                                                                  • Instruction ID: a5249c1b54a189495ffbc567e436d8a40c752b79656d5d09c5170ae6fde734ce
                                                                  • Opcode Fuzzy Hash: afc9bfba2d6b970f5398b6ead9917782a7f3396662e940a429534665c055038a
                                                                  • Instruction Fuzzy Hash: 38112B326003119BDB109F54EC897AFBBA9FF80752F002928EC0693280EB25ED09C6B1
                                                                  APIs
                                                                  Strings
                                                                  • 9XuFEqoKDcJEqWQIVJcVB7bgCnscClUO3Ek6DnrBRdd5/nGRvqwCDRNzntQHTrtpqzCAcpFuxTx5rVXUr4R9tb9QNcPxKZnkwCnojpukucKL3dOmPJ4LHIY3iDpV+k6X48+2mXXj978Ae9aPeYPM7YZYpUZDYXa82aZ7+NtxE09vfkntPmCV454Ed4jSnQK1nlLvNC266cXpGrPKXJq7//NWtY1i/YorAywptqoZx9jypXcovY3wr0/wpM3TS+iXsDKZ, xrefs: 05348435
                                                                  • Specified VidPN present path importance ordinal is invalid., xrefs: 05348365
                                                                  • Critical section debug info address, xrefs: 05348239
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ActiveLastMessagePopupShellTimeWindowlstrlen
                                                                  • String ID: 9XuFEqoKDcJEqWQIVJcVB7bgCnscClUO3Ek6DnrBRdd5/nGRvqwCDRNzntQHTrtpqzCAcpFuxTx5rVXUr4R9tb9QNcPxKZnkwCnojpukucKL3dOmPJ4LHIY3iDpV+k6X48+2mXXj978Ae9aPeYPM7YZYpUZDYXa82aZ7+NtxE09vfkntPmCV454Ed4jSnQK1nlLvNC266cXpGrPKXJq7//NWtY1i/YorAywptqoZx9jypXcovY3wr0/wpM3TS+iXsDKZ$Critical section debug info address$Specified VidPN present path importance ordinal is invalid.
                                                                  • API String ID: 2678776764-98429151
                                                                  • Opcode ID: 446e20c5be73647820455a7ddd3ce64dcc0f801ad987a6e8dc96342ba9f43f54
                                                                  • Instruction ID: 881b210ce954caed04d685a012b0978381b1099d660d5f2ae37215916dfcec27
                                                                  • Opcode Fuzzy Hash: 446e20c5be73647820455a7ddd3ce64dcc0f801ad987a6e8dc96342ba9f43f54
                                                                  • Instruction Fuzzy Hash: 595102709242448FC710DFB9A8862DA7FE9FB45304F94C5BEE988CB241DB785586CFA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: d$d
                                                                  • API String ID: 0-1303137945
                                                                  • Opcode ID: 1efba251552fdea66bd40b4acbb61fcd993080fe13ac09347de62c1cb3ee0d26
                                                                  • Instruction ID: cda3161bf0e48cc4617b515f9ff0a3c463a90b1a9beb0b49e27703572c58e401
                                                                  • Opcode Fuzzy Hash: 1efba251552fdea66bd40b4acbb61fcd993080fe13ac09347de62c1cb3ee0d26
                                                                  • Instruction Fuzzy Hash: FB023A71E012199BDF14CFA9D8806EEFBF2FF48314F248269E959A7380D731A941DB91
                                                                  APIs
                                                                  • PathIsDirectoryW.SHLWAPI(?), ref: 0059EE0A
                                                                  • FindFirstFileExW.KERNEL32(00000007,00000001,?,00000000,00000000,00000002,00000001,?,?,?,?,?), ref: 0059EE9C
                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0059EEBF
                                                                  • GetLastError.KERNEL32 ref: 0059EED4
                                                                  • FindClose.KERNEL32(?,?,?,00000007), ref: 0059EF61
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Find$FileFirst$CloseDirectoryErrorLastPath
                                                                  • String ID: *.*
                                                                  • API String ID: 1803994648-438819550
                                                                  • Opcode ID: e0b2a0bbef023ffcdc46d9eab0e1c5c5e5a80d6abe0f1de6a2d6a121d7f92a87
                                                                  • Instruction ID: 9c225ed92c060814bf578a98196789f50b240e2c26f03f0bd53a36ce8745aecc
                                                                  • Opcode Fuzzy Hash: e0b2a0bbef023ffcdc46d9eab0e1c5c5e5a80d6abe0f1de6a2d6a121d7f92a87
                                                                  • Instruction Fuzzy Hash: 22C16D71A00214DFCF14DFA8D886BAEBBF5FF48310F204969E455EB291D731AA44CB60
                                                                  APIs
                                                                    • Part of subcall function 00641716: GetLastError.KERNEL32(00000000,?,00647DD7), ref: 0064171A
                                                                    • Part of subcall function 00641716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 006417BC
                                                                  • GetUserDefaultLCID.KERNEL32 ref: 0064C6FF
                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 0064C73D
                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 0064C750
                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0064C798
                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0064C7B3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                  • String ID: ,e
                                                                  • API String ID: 415426439-4005468281
                                                                  • Opcode ID: ae3289982028a8cab7e0b96de5dc9d513230bdf42ced429067f4e252ddbe17c8
                                                                  • Instruction ID: 03756b78a259e423a30da26843334c53c0df27e013ac1d8174f826f3ae25d94a
                                                                  • Opcode Fuzzy Hash: ae3289982028a8cab7e0b96de5dc9d513230bdf42ced429067f4e252ddbe17c8
                                                                  • Instruction Fuzzy Hash: 5E51B071A01605ABDFA0DFA4CC85AFE77BABF08710F154469E900E7390EB71DA44CB65
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: __floor_pentium4
                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                  • API String ID: 4168288129-2761157908
                                                                  • Opcode ID: c8d87eb67ee6b94a7f4bfa6692625191b1c4c224cd126c1cb704dd79d9570aeb
                                                                  • Instruction ID: cbe7a71da6e1a7dd0aafeab3b9953862eff31fbec87217bb7ecd3c964a296397
                                                                  • Opcode Fuzzy Hash: c8d87eb67ee6b94a7f4bfa6692625191b1c4c224cd126c1cb704dd79d9570aeb
                                                                  • Instruction Fuzzy Hash: 33D24771E082288FDB65CE28DC447EAB7B6FB45305F1441EAD80DE7240EB79AE858F41
                                                                  APIs
                                                                  Strings
                                                                  • Failed to get TAG_REG_VALUE_DATA_DWORD, xrefs: 05347D3E
                                                                  • Microsoft Time-Stamp PCA 20100, xrefs: 05347D59, 05347DEF, 05347ED2
                                                                  • /Gkn+M89bw5nJnjp4ayKmM1pCcZ0hwa1jU19grR+zqs0bMUJoO3oNRGpK+m00iCWBJ4Hqb4Ga1g8blg4X8dAZ2Kdx7G9ZK3SxVNAM9b2hXDZK5Ztt+flpTng7uy28mrmlNJ+ZeoQ9eUdF7XA6anHxiC5JuuV5FiGOfTolTRgueS5uUKjlMsclrvuJUaswdKguWHUCgN0CsNo1RoDtSfskr+hhW1KSQmgL9Y676t+MO0yFF6yLr9/t8U2h9Xg355LDVQs, xrefs: 05347F6F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ParentShellWindow
                                                                  • String ID: /Gkn+M89bw5nJnjp4ayKmM1pCcZ0hwa1jU19grR+zqs0bMUJoO3oNRGpK+m00iCWBJ4Hqb4Ga1g8blg4X8dAZ2Kdx7G9ZK3SxVNAM9b2hXDZK5Ztt+flpTng7uy28mrmlNJ+ZeoQ9eUdF7XA6anHxiC5JuuV5FiGOfTolTRgueS5uUKjlMsclrvuJUaswdKguWHUCgN0CsNo1RoDtSfskr+hhW1KSQmgL9Y676t+MO0yFF6yLr9/t8U2h9Xg355LDVQs$Failed to get TAG_REG_VALUE_DATA_DWORD$Microsoft Time-Stamp PCA 20100
                                                                  • API String ID: 2724987481-3605572846
                                                                  • Opcode ID: 710f1cd15720f8dfc30c8be709831c6103ca81947cb21407de340006a5c68f74
                                                                  • Instruction ID: 5818d782c1d7ddca79bbdcec92df4f18995e31a7e20d876c812d3e8467716ae8
                                                                  • Opcode Fuzzy Hash: 710f1cd15720f8dfc30c8be709831c6103ca81947cb21407de340006a5c68f74
                                                                  • Instruction Fuzzy Hash: D851F0719183888ECB25CF78D855BEA7FF4EB6A304F8484EDD4889B301CA749A45CF81
                                                                  APIs
                                                                  Strings
                                                                  • A required privilege is not held by the client., xrefs: 053478DD, 053479FA
                                                                  • An RPC protocol error occurred., xrefs: 053478CB
                                                                  • B6JBNJ6PRKKc2kvMjaLrLt3YZ32hT0WHOmQDBLvfQ8ma7v9L41vMKkBZMCJ2BiBBQGe68/Xky/+eddG9orwn5M0tVsxo1Ro1LpjpIN1KXMHnZ7bavYUXClyTzhwI5p4VcEukuoFe0hBKdKuohRhuGm/F/IlH4ZmeMc/8T4gBw2VoHAIpv7H1E82p6Tv4P97xC9eNtj23KcEkr1A54g5A1CFT0nD/HHbhN+XoBnOOxYCQOc7zKw18QAFv384h6T9UjIyN, xrefs: 05347AB0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$DesktopForeground
                                                                  • String ID: A required privilege is not held by the client.$An RPC protocol error occurred.$B6JBNJ6PRKKc2kvMjaLrLt3YZ32hT0WHOmQDBLvfQ8ma7v9L41vMKkBZMCJ2BiBBQGe68/Xky/+eddG9orwn5M0tVsxo1Ro1LpjpIN1KXMHnZ7bavYUXClyTzhwI5p4VcEukuoFe0hBKdKuohRhuGm/F/IlH4ZmeMc/8T4gBw2VoHAIpv7H1E82p6Tv4P97xC9eNtj23KcEkr1A54g5A1CFT0nD/HHbhN+XoBnOOxYCQOc7zKw18QAFv384h6T9UjIyN
                                                                  • API String ID: 3460230961-3038535665
                                                                  • Opcode ID: 3c8890d4c2c277eab8991251ab988081d710ee219862e4a98edabcca6e9ded27
                                                                  • Instruction ID: 0831d2f4f7f6910dac786a475f117d7b85440f3a2c654e2152cedec02d7c9898
                                                                  • Opcode Fuzzy Hash: 3c8890d4c2c277eab8991251ab988081d710ee219862e4a98edabcca6e9ded27
                                                                  • Instruction Fuzzy Hash: CB515871A142988FDB15CF2AE8823EA7FE5EB45304F54C6BDE49C8B301CA385586CF90
                                                                  APIs
                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0064C4B4
                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 0064C4DD
                                                                  • GetACP.KERNEL32 ref: 0064C4F2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID: ACP$OCP
                                                                  • API String ID: 2299586839-711371036
                                                                  • Opcode ID: a3a64eff3c0c1470c8ac2681891b34a416f2d2973066e63d2af01649e9180159
                                                                  • Instruction ID: aa60d10aad9ea5db42336c1fc31f4f3202ef65e213d0170ca9a6cbf406927e3f
                                                                  • Opcode Fuzzy Hash: a3a64eff3c0c1470c8ac2681891b34a416f2d2973066e63d2af01649e9180159
                                                                  • Instruction Fuzzy Hash: C8218C22702211AADBB49F24CB24AF772E7AB54B70B168424E90ADB314E732DE41C360
                                                                  APIs
                                                                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 006493AB
                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00649426
                                                                  • FindClose.KERNEL32(00000000), ref: 00649448
                                                                  • FindClose.KERNEL32(00000000), ref: 0064946B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Find$CloseFile$FirstNext
                                                                  • String ID:
                                                                  • API String ID: 1164774033-0
                                                                  • Opcode ID: d447213bdc87f86a4bb1de3c5015c2bc962c547a6bc37d6aa99d1dce5b7a981f
                                                                  • Instruction ID: 737799f39a40fe7096cb4eb4bacfedf10a5a23caa9ee8b4ad1204e2003e3ea8c
                                                                  • Opcode Fuzzy Hash: d447213bdc87f86a4bb1de3c5015c2bc962c547a6bc37d6aa99d1dce5b7a981f
                                                                  • Instruction Fuzzy Hash: C441C471940629AFDF21EF68CC8D9FBB7BAEB85315F0081D9E40593284E6309E85CB74
                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 006294DD
                                                                  • IsDebuggerPresent.KERNEL32 ref: 006295A9
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 006295C2
                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 006295CC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                  • String ID:
                                                                  • API String ID: 254469556-0
                                                                  • Opcode ID: a2384a13596f2505b8eab36c6219f73f57cf868f5b821b7f3fcee89583d2cb7c
                                                                  • Instruction ID: c455694ff10a94857d8811a57d82834a9ef177af71cb78509f306d890d81f497
                                                                  • Opcode Fuzzy Hash: a2384a13596f2505b8eab36c6219f73f57cf868f5b821b7f3fcee89583d2cb7c
                                                                  • Instruction Fuzzy Hash: 0231E475D05228DADF61DFA4E9497CDBBB8AF08300F1041AAE40CAB250EB719B85CF55
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(-000000CA), ref: 005D1AB7
                                                                  • LoadStringW.USER32(?,-000002E2,-000002E2,00000100), ref: 005D1BDB
                                                                  Strings
                                                                  • Unable to open message catalog: , xrefs: 005D1D7B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Load$LibraryString
                                                                  • String ID: Unable to open message catalog:
                                                                  • API String ID: 1664019954-3361316291
                                                                  • Opcode ID: 4d7b6d654c4c158fcb78e9720846532a58a49ab10e2e425a154b6c687f34af21
                                                                  • Instruction ID: c1303bda72c528aa48767656342c699f1009e9c7f3ec6ce0a952b2b0b3cc0926
                                                                  • Opcode Fuzzy Hash: 4d7b6d654c4c158fcb78e9720846532a58a49ab10e2e425a154b6c687f34af21
                                                                  • Instruction Fuzzy Hash: 7912BD70904659AFCB20DFACC8846AEBFF1BF88300F14856FE849AB352D7719945CB95
                                                                  APIs
                                                                  • GetLastError.KERNEL32(713211A9,?), ref: 0062A916
                                                                  • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000), ref: 0062A939
                                                                  • LocalFree.KERNEL32(?,?,?,00662150,00000002,?,?), ref: 0062AA06
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFormatFreeLastLocalMessage
                                                                  • String ID:
                                                                  • API String ID: 1365068426-0
                                                                  • Opcode ID: 5464822d865689fe6651d83f294ba2d0d93631926612f8211d6eddde523df40c
                                                                  • Instruction ID: 84238ec3d303e86e33cf51789ebfb2213f27e5d951087785fe099d0e6f7db7c8
                                                                  • Opcode Fuzzy Hash: 5464822d865689fe6651d83f294ba2d0d93631926612f8211d6eddde523df40c
                                                                  • Instruction Fuzzy Hash: E4613471900615AFCB04DFA8E844BFDBBBAEF46310F148218E815772C2DBB15945CFA0
                                                                  APIs
                                                                    • Part of subcall function 00641716: GetLastError.KERNEL32(00000000,?,00647DD7), ref: 0064171A
                                                                    • Part of subcall function 00641716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 006417BC
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0064C0F3
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0064C13D
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0064C203
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale$ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 661929714-0
                                                                  • Opcode ID: a49bf9507212df0e7b5ffeba6005baf15adde5899cf6a54101857afe2973bf91
                                                                  • Instruction ID: 9df23e2b7da0f93828fbf4ee3831ed05151f14efa3d624ee556ad5ad38d39d87
                                                                  • Opcode Fuzzy Hash: a49bf9507212df0e7b5ffeba6005baf15adde5899cf6a54101857afe2973bf91
                                                                  • Instruction Fuzzy Hash: 6C61C1719412079FDBA89F68CC82BAB73AAEF04320F104179ED05C6785F7B4EA81CB54
                                                                  APIs
                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0062EB4B
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0062EB55
                                                                  • UnhandledExceptionFilter.KERNEL32(-00000227,?,?,?,?,?,00000000), ref: 0062EB62
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                  • String ID:
                                                                  • API String ID: 3906539128-0
                                                                  • Opcode ID: f2896d5aa143adc98c562207f7e781942323d64be9b1f338ed8bfe31830e4add
                                                                  • Instruction ID: fa13c12de79e10ea7349e41b386b4a91037439b5c8d62bbe28c7715a4d79ab3d
                                                                  • Opcode Fuzzy Hash: f2896d5aa143adc98c562207f7e781942323d64be9b1f338ed8bfe31830e4add
                                                                  • Instruction Fuzzy Hash: 7A31D67591122CABCB61DF24D9887DCB7B9BF08311F5041EAE40CA7251E7709B818F58
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LAST_SUBMATCH_RESULTLAST_PAREN_MATCHPOSTMATCH$MATCH$Qf
                                                                  • API String ID: 0-222299530
                                                                  • Opcode ID: 7f52867446b1791bbc4a257203133d0ef56384d1fc76175098bca66c42bca3b2
                                                                  • Instruction ID: 0476b9e1a48dcd8d42b87561dfae77397a4839740bf4b42cf06ad3f5f008c8d9
                                                                  • Opcode Fuzzy Hash: 7f52867446b1791bbc4a257203133d0ef56384d1fc76175098bca66c42bca3b2
                                                                  • Instruction Fuzzy Hash: 95E1C6766052418FCB20CF64D4806E9B7E3FB92320F5C856AD456CB341D735F98ACBA2
                                                                  APIs
                                                                  • GetDialogBaseUnits.USER32 ref: 053460E2
                                                                    • Part of subcall function 05353328: GetLargePageMinimum.KERNEL32 ref: 053533E1
                                                                    • Part of subcall function 05353328: GetWindowTextLengthW.USER32 ref: 05353448
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: BaseDialogLargeLengthMinimumPageTextUnitsWindow
                                                                  • String ID: STATUS_ABIOS_NOT_PRESENT
                                                                  • API String ID: 2297771435-2188909095
                                                                  • Opcode ID: 57b3570cbe24ed9ae6c756e1b0b0cd8963780ce5c163f1f7228d407ab49b200f
                                                                  • Instruction ID: 345fbbf190bfcfae04f17b0c959f6f9ab853b5182368cb91e7b70e3040c19444
                                                                  • Opcode Fuzzy Hash: 57b3570cbe24ed9ae6c756e1b0b0cd8963780ce5c163f1f7228d407ab49b200f
                                                                  • Instruction Fuzzy Hash: A211E7719342008BCB21EF7DE48A1267FFDF704358F84C52DE0458F281DB3895548B96
                                                                  APIs
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00640EAC,?,20001004,00000000,00000002,?,?,0064049E), ref: 00646461
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID: 09Z
                                                                  • API String ID: 2299586839-1578109394
                                                                  • Opcode ID: 5b0bc2a6960dd38556952785a9458edfc5bb84bb57b56d91141fc4f68b3b47f6
                                                                  • Instruction ID: f3381268e7bbc564a51bd977df5e5d4f019d6f76f5f84c5ff5672079e8358567
                                                                  • Opcode Fuzzy Hash: 5b0bc2a6960dd38556952785a9458edfc5bb84bb57b56d91141fc4f68b3b47f6
                                                                  • Instruction Fuzzy Hash: 2DE04F71501628FBCF126F60EC04AEE7F57EF45761F008024FD0565261CB368921AAAA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: .2e$0
                                                                  • API String ID: 0-2078051987
                                                                  • Opcode ID: 5adfe182679914925679b2140f1e8a17d396581802500721cf126efa20eff8ad
                                                                  • Instruction ID: b423d60c3a9dd0d91a5107793499745ee1cbeb21603d82c64a033d0be34438fb
                                                                  • Opcode Fuzzy Hash: 5adfe182679914925679b2140f1e8a17d396581802500721cf126efa20eff8ad
                                                                  • Instruction Fuzzy Hash: 94D1BD30A006268FCB28CF68C584ABAB7B3FF49710F14561DE556AB791D730AF42CB94
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0m-c$m-c
                                                                  • API String ID: 0-4108365907
                                                                  • Opcode ID: a68eb8f1f16cfefcfc392c9038feccccc98166c390a74b55e794c0b8fe89bc5a
                                                                  • Instruction ID: aeb56e8b20a8572f7d3231d61a3fee8af3fc16d409f489fc13ca27e9cf8f205d
                                                                  • Opcode Fuzzy Hash: a68eb8f1f16cfefcfc392c9038feccccc98166c390a74b55e794c0b8fe89bc5a
                                                                  • Instruction Fuzzy Hash: 38C1AD30A0066ACECB28CE68C5847BABBB3EF45310F14461DE49697791D771EE46CBD1
                                                                  APIs
                                                                  • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0064799E,00000000,00000000,00000000), ref: 0064785D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: InformationTimeZone
                                                                  • String ID:
                                                                  • API String ID: 565725191-0
                                                                  • Opcode ID: 8d6dc7e0f8e5e08869afc0ea953517de359c2a3f1cb1fa15abde23e26f6f6cfd
                                                                  • Instruction ID: 94db88d41f77465ec6cabe7451140d521ef9a6c4062321e0a7cca2de4b97ef02
                                                                  • Opcode Fuzzy Hash: 8d6dc7e0f8e5e08869afc0ea953517de359c2a3f1cb1fa15abde23e26f6f6cfd
                                                                  • Instruction Fuzzy Hash: 29D13A72E04125ABDB14AFB4DC02ABE7BBBEF44710F50405AF905EB291EB709E40CB95
                                                                  APIs
                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,0059DFD0,?,00000008,?,?,00641FCF,0059DFD0,?,00000008,?,?,00651BBF,00000000), ref: 00642201
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionRaise
                                                                  • String ID:
                                                                  • API String ID: 3997070919-0
                                                                  • Opcode ID: 1148a735fd0abdb394cfb79ad726ef961d8f05ecb3469d56920d60d547e32970
                                                                  • Instruction ID: f1e55faeac5f40b44b7771c9b9e2949207b2645f0155209a2c48259238f6cc53
                                                                  • Opcode Fuzzy Hash: 1148a735fd0abdb394cfb79ad726ef961d8f05ecb3469d56920d60d547e32970
                                                                  • Instruction Fuzzy Hash: 26B16B3111060A9FD719CF28C49ABA57BE2FF45364F658658F999CF2A1C335EA82CB40
                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 006292B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: FeaturePresentProcessor
                                                                  • String ID:
                                                                  • API String ID: 2325560087-0
                                                                  • Opcode ID: 1f509048e47462b8bf9e5ed21f2f4fc490bb93d55c80f502955e0358c40743b9
                                                                  • Instruction ID: 2c53a736b23d3f0d5929a3b4eca03693fa93a0d758d796cdfa6078310339f46b
                                                                  • Opcode Fuzzy Hash: 1f509048e47462b8bf9e5ed21f2f4fc490bb93d55c80f502955e0358c40743b9
                                                                  • Instruction Fuzzy Hash: 865174B1911A15CFEB18CF54E9857AEBBF6FB88310F24902AD405EB390D3749984CF60
                                                                  APIs
                                                                    • Part of subcall function 00641716: GetLastError.KERNEL32(00000000,?,00647DD7), ref: 0064171A
                                                                    • Part of subcall function 00641716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 006417BC
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0064C346
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 3736152602-0
                                                                  • Opcode ID: 77f6c1ae03c2b015ee17e718fee48ba73c1cf258271b59ae7a2c959db91cdadf
                                                                  • Instruction ID: ec5dbcb66c6175f73d4ce6c2639df4773f3bd66d299b5cdcf697260c3c4a7c70
                                                                  • Opcode Fuzzy Hash: 77f6c1ae03c2b015ee17e718fee48ba73c1cf258271b59ae7a2c959db91cdadf
                                                                  • Instruction Fuzzy Hash: 8B21F832502106ABDF599F14DC41ABB73AAEF81320F10407DFD01C6341EB76ED408754
                                                                  APIs
                                                                    • Part of subcall function 00641716: GetLastError.KERNEL32(00000000,?,00647DD7), ref: 0064171A
                                                                    • Part of subcall function 00641716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 006417BC
                                                                  • EnumSystemLocalesW.KERNEL32(0064C09F,00000001), ref: 0064BFEB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                  • String ID:
                                                                  • API String ID: 2417226690-0
                                                                  • Opcode ID: 5ba7b02467c0985a163d4dee034c9b98decf73da5094dc62faaa23fcd44db088
                                                                  • Instruction ID: 46709007ce44667661c3916c1c688d434b908d6372ce215d646b0b834c8d5f27
                                                                  • Opcode Fuzzy Hash: 5ba7b02467c0985a163d4dee034c9b98decf73da5094dc62faaa23fcd44db088
                                                                  • Instruction Fuzzy Hash: 6111E53A2047019FDB18AF39C8916BABB93FF80768B15443CE94687B40D372B942CB40
                                                                  APIs
                                                                    • Part of subcall function 00641716: GetLastError.KERNEL32(00000000,?,00647DD7), ref: 0064171A
                                                                    • Part of subcall function 00641716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 006417BC
                                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0064C2BB,00000000,00000000,?), ref: 0064C54D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 3736152602-0
                                                                  • Opcode ID: ab24723881f80e0c4508bc8d1714f1e9ca097af0c09e87ad39f6aaf7fdf593d4
                                                                  • Instruction ID: 04f53a0be246371dfcd96d49120934e02e67e2ea80f9acd4c2e03ea6f688bbdf
                                                                  • Opcode Fuzzy Hash: ab24723881f80e0c4508bc8d1714f1e9ca097af0c09e87ad39f6aaf7fdf593d4
                                                                  • Instruction Fuzzy Hash: E901D672611112ABDB6C9B248C46AFE375ADB40764F154468EC06A3380EA74FE51C6A0
                                                                  APIs
                                                                    • Part of subcall function 00641716: GetLastError.KERNEL32(00000000,?,00647DD7), ref: 0064171A
                                                                    • Part of subcall function 00641716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 006417BC
                                                                  • EnumSystemLocalesW.KERNEL32(0064C2F2,00000001), ref: 0064C05E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                  • String ID:
                                                                  • API String ID: 2417226690-0
                                                                  • Opcode ID: a3959d95fb2c89faecf802dbb69760274d10392147d0c3eb9799591c4151356b
                                                                  • Instruction ID: 3ac89cd95127fcb7427bb59670276bb8cc97424e5ecce5f2fb78a441b8401c74
                                                                  • Opcode Fuzzy Hash: a3959d95fb2c89faecf802dbb69760274d10392147d0c3eb9799591c4151356b
                                                                  • Instruction Fuzzy Hash: 4CF0F6363013049FDB249F799C81ABA7B92FF81B78F05442CFA454B790D6B29C41D650
                                                                  APIs
                                                                    • Part of subcall function 0063DD9D: EnterCriticalSection.KERNEL32(?,?,0063ECD5,00000000,00673218,0000000C,0063EC9D,?,?,00642689,?,?,006418B4,00000001,00000364,?), ref: 0063DDAC
                                                                  • EnumSystemLocalesW.KERNEL32(Function_000E5E9A,00000001,006734B8,0000000C,006462D2,?), ref: 00645EDF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                  • String ID:
                                                                  • API String ID: 1272433827-0
                                                                  • Opcode ID: 4b5d4746b01dff7a099dbba9595d10ecc9b4f10c2f99f6d2cbf3b0efb4789d5c
                                                                  • Instruction ID: 198b845cbfd03a624826106837dfc955305cd24d7f051b831b77e4543165dc26
                                                                  • Opcode Fuzzy Hash: 4b5d4746b01dff7a099dbba9595d10ecc9b4f10c2f99f6d2cbf3b0efb4789d5c
                                                                  • Instruction Fuzzy Hash: E2F04972A10710EFD704DFA8E846B9D77F2EB44721F10812AF415DB2A1CB7A4944CF95
                                                                  APIs
                                                                    • Part of subcall function 00641716: GetLastError.KERNEL32(00000000,?,00647DD7), ref: 0064171A
                                                                    • Part of subcall function 00641716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 006417BC
                                                                  • EnumSystemLocalesW.KERNEL32(0064BE87,00000001), ref: 0064BF65
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                  • String ID:
                                                                  • API String ID: 2417226690-0
                                                                  • Opcode ID: 0e471716dc782b0445b265bc6b3a85a8f528e513a1302c49b09a19c6d8a1f20a
                                                                  • Instruction ID: e630128872f2f008b513c0df2b562fe029b9d0fbe776289d8da54114e453f421
                                                                  • Opcode Fuzzy Hash: 0e471716dc782b0445b265bc6b3a85a8f528e513a1302c49b09a19c6d8a1f20a
                                                                  • Instruction Fuzzy Hash: 28F0E53A30020597CB14AF39DC55AAA7FA6EFC1754B064098FA098B690CB71D842CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c3262d2e818f5ec7b3eebc2c903f11d4aa5c0fb6e701161eff682ad2fce20ceb
                                                                  • Instruction ID: b23ea8b0ebb9fe2811d66ec3101863f660984b0d13820038d572d37dc5e0ba91
                                                                  • Opcode Fuzzy Hash: c3262d2e818f5ec7b3eebc2c903f11d4aa5c0fb6e701161eff682ad2fce20ceb
                                                                  • Instruction Fuzzy Hash: 66719A716053158FC714CF28C89062AFBE1FB88360F048A2EF999DB3A1D735E905CB95
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e0e1bea2186ccdaf5911758430073ecf0a306bc1d82e0eec42000191d8490b8c
                                                                  • Instruction ID: 6a521c38447deee020d1e257b259f085efb2d170aab44a6c6ac808c688004d90
                                                                  • Opcode Fuzzy Hash: e0e1bea2186ccdaf5911758430073ecf0a306bc1d82e0eec42000191d8490b8c
                                                                  • Instruction Fuzzy Hash: 51516D72D0021AAFDF14CF98C841AEEBBB6FF88300F198459E915AB341D774AA51CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d0f0a73c41b8169e5e60d41f4594f70cfefb0c30b59f3b6c78eb1d6e1a4a1e5a
                                                                  • Instruction ID: c696dc20cc3892a343726e343034fc799f5d376a92bb914b62c40187db8287de
                                                                  • Opcode Fuzzy Hash: d0f0a73c41b8169e5e60d41f4594f70cfefb0c30b59f3b6c78eb1d6e1a4a1e5a
                                                                  • Instruction Fuzzy Hash: 23517B716182158F8708DF28C8A196EFBE5FB88344F40892EF999DB391D771EA05CB91
                                                                  APIs
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\Directory\shell\grepWinNP3,00000000,00000001,Search with grepWinNP3,00000030,?,?,?,?,?,?,?), ref: 005BAD84
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\Directory\shell\grepWinNP3,Icon,00000001,?,?,?,?,?,?,?,?,?), ref: 005BADAF
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\Directory\shell\grepWinNP3\Command,00000000,00000001,?,?,?,?,?,?,?,?,?,?), ref: 005BADD7
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\Directory\Background\shell\grepWinNP3,00000000,00000001,Search with grepWinNP3,00000030,?,?,?,?,?,?,?,?,?), ref: 005BADEE
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\Directory\Background\shell\grepWinNP3,Icon,00000001,?,?,?,?,?,?,?,?,?,?,?), ref: 005BAE19
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\Folder\shell\grepWinNP3,00000000,00000001,Search with grepWinNP3,00000030,?,?,?,?,?,?,?,?,?,?), ref: 005BAE30
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\Folder\shell\grepWinNP3,Icon,00000001,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005BAE5B
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\Folder\shell\grepWinNP3\Command,00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005BAE83
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\Drive\shell\grepWinNP3,00000000,00000001,Search with grepWinNP3,00000030), ref: 005BAE9A
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\Drive\shell\grepWinNP3,Icon,00000001,?), ref: 005BAEC5
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\Drive\shell\grepWinNP3\Command,00000000,00000001,?), ref: 005BAEED
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\*\shell\grepWinNP3,00000000,00000001,Search with grepWinNP3,00000030), ref: 005BAF04
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\*\shell\grepWinNP3,Icon,00000001,?), ref: 005BAF2F
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\*\shell\grepWinNP3\Command,00000000,00000001,?), ref: 005BAF57
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\*\shell\grepWinNP3,MultiSelectModel,00000001,Player,00000010), ref: 005BAF71
                                                                  • SHSetValueW.SHLWAPI(80000001,Software\Classes\Directory\Background\shell\grepWinNP3\Command,00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005BB03D
                                                                  • SHDeleteKeyW.SHLWAPI(80000001,Software\Classes\Directory\shell\grepWinNP3,?,?), ref: 005BB06F
                                                                  • SHDeleteKeyW.SHLWAPI(80000001,Software\Classes\Directory\Background\shell\grepWinNP3), ref: 005BB07B
                                                                  • SHDeleteKeyW.SHLWAPI(80000001,Software\Classes\Folder\shell\grepWinNP3), ref: 005BB087
                                                                  • SHDeleteKeyW.SHLWAPI(80000001,Software\Classes\Drive\shell\grepWinNP3), ref: 005BB093
                                                                  • SHDeleteKeyW.SHLWAPI(80000001,Software\Classes\*\shell\grepWinNP3), ref: 005BB09F
                                                                    • Part of subcall function 005AD360: GetModuleFileNameW.KERNEL32(00000000,00000000,00000000), ref: 005AD3E1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Value$Delete$FileModuleName
                                                                  • String ID: %s /searchpath:"%%1"$%s /searchpath:"%%V"$%s,-%d$Icon$MultiSelectModel$Player$Search with grepWinNP3$Search with grepWinNP3$Software\Classes\*\shell\grepWinNP3$Software\Classes\*\shell\grepWinNP3\Command$Software\Classes\Directory\Background\shell\grepWinNP3$Software\Classes\Directory\Background\shell\grepWinNP3\Command$Software\Classes\Directory\shell\grepWinNP3$Software\Classes\Directory\shell\grepWinNP3\Command$Software\Classes\Drive\shell\grepWinNP3$Software\Classes\Drive\shell\grepWinNP3\Command$Software\Classes\Folder\shell\grepWinNP3$Software\Classes\Folder\shell\grepWinNP3\Command
                                                                  • API String ID: 3737704472-174100858
                                                                  • Opcode ID: 8b465b70b70f69544911fe18f79c2a1a3a14c87298c7b0f8985379e272148bb9
                                                                  • Instruction ID: 714feae8c672187466a3b4c7ba44efd6989d486c0be19061868e6dda8ae36d73
                                                                  • Opcode Fuzzy Hash: 8b465b70b70f69544911fe18f79c2a1a3a14c87298c7b0f8985379e272148bb9
                                                                  • Instruction Fuzzy Hash: 8DB18A70A4021AAFEF14DB94DD96FEDBBB5EB04B08F100459F509B7281DBB17A44CBA1
                                                                  APIs
                                                                  • GetPropW.USER32(?), ref: 005A6CE8
                                                                  • SetCursor.USER32 ref: 005A6D28
                                                                  • SetWindowLongW.USER32(?,000000FC,?), ref: 005A6D42
                                                                  • SendMessageW.USER32(?,00000030,?,00000000), ref: 005A6D50
                                                                  • DeleteObject.GDI32 ref: 005A6D75
                                                                  • RemovePropW.USER32(?,-00000001), ref: 005A6D8E
                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 005A6DA0
                                                                  • ShellExecuteExW.SHELL32 ref: 005A6E13
                                                                  • InvalidateRect.USER32(?,00000000,00000000), ref: 005A6E25
                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 005A6E5A
                                                                  • SendMessageW.USER32(?,00000030,?,00000000), ref: 005A6E7F
                                                                  • InvalidateRect.USER32(?,00000000,00000000), ref: 005A6E8A
                                                                  • GetParent.USER32(?), ref: 005A6EAD
                                                                  • GetWindowRect.USER32(?,?), ref: 005A6EC3
                                                                  • ScreenToClient.USER32(00000000,00000000), ref: 005A6EE5
                                                                  • ScreenToClient.USER32(00000000,00000000), ref: 005A6EED
                                                                  • GetDC.USER32(00000000), ref: 005A6EF0
                                                                  • DrawFocusRect.USER32(00000000,00000000), ref: 005A6EFE
                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 005A6F06
                                                                  • GetClientRect.USER32(?,?), ref: 005A6F23
                                                                  • ReleaseCapture.USER32 ref: 005A6F4A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$Client$CallInvalidateMessageProcPropReleaseScreenSend$CaptureCursorDeleteDrawExecuteFocusLongObjectParentRemoveShell
                                                                  • String ID: <$open
                                                                  • API String ID: 2539734022-1930408713
                                                                  • Opcode ID: e118bf431d241049cb4d1007648c81c6b48061fd8f21d1a325375ab7ffb87e82
                                                                  • Instruction ID: d3978cc33a616fe5db66fa891059b499615e2cfcd2b10e43f2c60046ae3323f3
                                                                  • Opcode Fuzzy Hash: e118bf431d241049cb4d1007648c81c6b48061fd8f21d1a325375ab7ffb87e82
                                                                  • Instruction Fuzzy Hash: 1A81BD36200205DFD721CF64EC88B6FBBE9FB89712F04155AFA4AC22A0D7759854DB72
                                                                  APIs
                                                                  • GetParent.USER32 ref: 0059B7EA
                                                                  • GetWindowPlacement.USER32(00000000,?), ref: 0059B7F8
                                                                  • GetDesktopWindow.USER32 ref: 0059B810
                                                                  • GetWindowRect.USER32(00000000,?), ref: 0059B824
                                                                  • GetWindowRect.USER32(?,?), ref: 0059B82C
                                                                  • CopyRect.USER32(?,?), ref: 0059B838
                                                                  • OffsetRect.USER32(?,?,?), ref: 0059B857
                                                                  • OffsetRect.USER32(?,?,?), ref: 0059B86C
                                                                  • OffsetRect.USER32(?,?,?), ref: 0059B881
                                                                  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000041), ref: 0059B8A8
                                                                  • LoadImageW.USER32(?,?,00000001,00000000,00000000,00008040), ref: 0059B8C1
                                                                  • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0059B8DA
                                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0059B8E7
                                                                  • SetLastError.KERNEL32(000004DF), ref: 0059B8F4
                                                                  • LoadLibraryW.KERNEL32(dwmapi.dll), ref: 0059B901
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$Offset$LoadMessageSend$CopyDesktopErrorImageLastLibraryParentPlacement
                                                                  • String ID: ,$dwmapi.dll
                                                                  • API String ID: 2759369074-1731591866
                                                                  • Opcode ID: d66196f3b67ee90a3f14a28ecaf85640ca2d2d0ba000033927969c2d3c0deac8
                                                                  • Instruction ID: 00f16c1ea11645edbd2c8cafbf4da60db634be43f9b9964a63d1f7a7e3040d0e
                                                                  • Opcode Fuzzy Hash: d66196f3b67ee90a3f14a28ecaf85640ca2d2d0ba000033927969c2d3c0deac8
                                                                  • Instruction Fuzzy Hash: 0E411572504309AFEB10DF28DC89F6B7BEDEB88711F04461AFA45E7290D774E9048BA1
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(http://tools.stefankueng.com,?,?,?,?), ref: 005A6AC2
                                                                  • lstrcpyW.KERNEL32(0066269C,http://tools.stefankueng.com,?,?,?,?,?), ref: 005A6B13
                                                                  • GetParent.USER32(?), ref: 005A6B1E
                                                                  • GetWindowLongW.USER32(00000000,000000FC), ref: 005A6B39
                                                                  • SetPropW.USER32(00000000,00000000,00000000), ref: 005A6B4C
                                                                  • SetWindowLongW.USER32(00000000,000000FC,005A6C10), ref: 005A6B5A
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005A6B5F
                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005A6B6A
                                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 005A6B73
                                                                  • GetObjectW.GDI32(00000000,0000005C,?), ref: 005A6B9B
                                                                  • CreateFontIndirectW.GDI32(?), ref: 005A6BAB
                                                                  • LoadCursorW.USER32(00000000,00007F89), ref: 005A6BBD
                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 005A6BD2
                                                                  • GetWindowLongW.USER32(?,000000FC), ref: 005A6BE0
                                                                  • SetPropW.USER32(?,00000000,?), ref: 005A6BEF
                                                                  • SetWindowLongW.USER32(?,000000FC,Function_00046CD0), ref: 005A6BFD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: LongWindow$CursorLoadProp$CreateFontIndirectMessageObjectParentSendlstrcpylstrlen
                                                                  • String ID: http://tools.stefankueng.com
                                                                  • API String ID: 3347581731-806382027
                                                                  • Opcode ID: 9897b235eaf23cb7986889c6fedc031dd892dc0994106e0da1d3815f29a24dc1
                                                                  • Instruction ID: ee7432233e7bdf292e9f630dcc7b0383a2042a837f65911912134b2621caf332
                                                                  • Opcode Fuzzy Hash: 9897b235eaf23cb7986889c6fedc031dd892dc0994106e0da1d3815f29a24dc1
                                                                  • Instruction Fuzzy Hash: 4331DD30104315FFD710AB24AC49F6F3BAAEB45721F101618FA65D22E0DB79A9418B75
                                                                  APIs
                                                                  • QueryPerformanceCounter.KERNEL32(?,FillResultList,0000000E), ref: 005E5B77
                                                                  • LoadCursorW.USER32(00000000,00007F8A), ref: 005E5B8B
                                                                  • SetCursor.USER32(00000000), ref: 005E5B92
                                                                  • GetCursorPos.USER32(?), ref: 005E5B9C
                                                                  • SetCursorPos.USER32(?,?), ref: 005E5BA8
                                                                  • IsDlgButtonChecked.USER32(?,00000423), ref: 005E5BB6
                                                                  • GetDlgItem.USER32(?,000003F6), ref: 005E5BC6
                                                                  • SendMessageW.USER32(00000000,0000000B,00000000,00000000), ref: 005E5BD5
                                                                  • SendMessageW.USER32(00000000,0000102F,?,00000003), ref: 005E5C1D
                                                                  • SendMessageW.USER32(00000000,0000000B,00000001,00000000), ref: 005E5C2D
                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 005E5C36
                                                                  • SetCursor.USER32(00000000), ref: 005E5C3D
                                                                  • GetCursorPos.USER32(?), ref: 005E5C47
                                                                  • SetCursorPos.USER32(?,?), ref: 005E5C53
                                                                  • RedrawWindow.USER32(00000000,00000000,00000000,00000485), ref: 005E5C63
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Cursor$MessageSend$Load$ButtonCheckedCounterItemPerformanceQueryRedrawWindow
                                                                  • String ID: FillResultList
                                                                  • API String ID: 3380769934-393267765
                                                                  • Opcode ID: 0b1b97551906906dab458b009cb551b7d9f93de1e47e5eb25a73b2e52ab341a7
                                                                  • Instruction ID: 516aa47f26f49fbbe23c021c1dd5d864cf94a8dfc623f3ceefe4f6d8aa2c7adb
                                                                  • Opcode Fuzzy Hash: 0b1b97551906906dab458b009cb551b7d9f93de1e47e5eb25a73b2e52ab341a7
                                                                  • Instruction Fuzzy Hash: C3313C71A4070AEFDB14DFA4DD4AFADBBBAFB08702F105515F215E61D0DB7469108B60
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,000003F6), ref: 005F1A83
                                                                  • SendMessageW.USER32(00000000,0000101F,00000000,00000000), ref: 005F1A9E
                                                                  • SendMessageW.USER32(00000000,00001004,00000000,00000000), ref: 005F1AAD
                                                                  • SendMessageW.USER32(?,00001200,00000000,00000000), ref: 005F1AEB
                                                                  • SendMessageW.USER32(?,00001002,00000001,00000000), ref: 005F1AFF
                                                                  • ImageList_GetImageCount.COMCTL32(00000000,?,75C05540,00000000), ref: 005F1B09
                                                                  • MulDiv.KERNEL32(00000003,00000000,?), ref: 005F1B38
                                                                  • ImageList_GetImageInfo.COMCTL32(?,00000000,?,?,75C05540,00000000), ref: 005F1B1B
                                                                    • Part of subcall function 0059B530: GetModuleHandleW.KERNEL32(user32.dll,?,?,?,00000000,00000000,0059C04D,?,00000060), ref: 0059B549
                                                                    • Part of subcall function 0059B530: GetProcAddress.KERNEL32(00000000,GetDpiForWindow), ref: 0059B563
                                                                    • Part of subcall function 0059B530: GetProcAddress.KERNEL32(?,GetDpiForSystem), ref: 0059B570
                                                                    • Part of subcall function 0059B530: GetProcAddress.KERNEL32(?,GetSystemMetricsForDpi), ref: 0059B57E
                                                                    • Part of subcall function 0059B530: GetProcAddress.KERNEL32(?,SystemParametersInfoForDpi), ref: 0059B58C
                                                                  • SendMessageW.USER32(?,0000120B,00000000,?), ref: 005F1BA8
                                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 005F1BB7
                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 005F1C00
                                                                  • MulDiv.KERNEL32(0000000E,00000000,?), ref: 005F1C1D
                                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 005F1C36
                                                                  • IsDlgButtonChecked.USER32(?,00000423), ref: 005F1C9C
                                                                  • SendMessageW.USER32(?,0000100E,00000000,?), ref: 005F1CC7
                                                                  • SendMessageW.USER32(?,0000100E,00000000,?), ref: 005F1CE7
                                                                  • SendMessageW.USER32(?,0000101E,00000000,00000000), ref: 005F1D4D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$AddressImageProc$List_$ButtonCheckedCountHandleInfoItemModule
                                                                  • String ID:
                                                                  • API String ID: 1481306643-0
                                                                  • Opcode ID: 0b9d12fd17bea0cb92bb57bfef6ea4bdf18aa1fa3b4fc6a581a0d79c29d9ce7b
                                                                  • Instruction ID: 1d36fec3bcd7032ffb776a1692391b9b3a4eb0c749bd7236c71b6ffb1a06e77e
                                                                  • Opcode Fuzzy Hash: 0b9d12fd17bea0cb92bb57bfef6ea4bdf18aa1fa3b4fc6a581a0d79c29d9ce7b
                                                                  • Instruction Fuzzy Hash: B1A13472A4034DEFEB21DF68CC85BEA7BA9FB44700F144529FA059B290D7B5E840CB94
                                                                  APIs
                                                                  • SetDlgItemTextW.USER32(?,000003E8,00664D74), ref: 005C0CDF
                                                                  • SetDlgItemTextW.USER32(?,000003FF,?), ref: 005C0CF3
                                                                  • GetDlgItem.USER32(?,000003E8), ref: 005C0D01
                                                                  • SetFocus.USER32(00000000), ref: 005C0D04
                                                                  • ShowWindow.USER32(?,-00000001,?), ref: 005C0D3F
                                                                    • Part of subcall function 0059F6A0: GetDlgItem.USER32(?,?), ref: 0059F6B2
                                                                    • Part of subcall function 0059F6A0: GetWindowRect.USER32(00000000,?), ref: 0059F6D1
                                                                    • Part of subcall function 0059F6A0: OffsetRect.USER32(?,?,?), ref: 0059F6EA
                                                                    • Part of subcall function 0059F6A0: MapWindowPoints.USER32(?,?,?,00000002), ref: 0059F6FE
                                                                  • GetDlgItem.USER32(?,00000406), ref: 005C0DC7
                                                                  • SendMessageW.USER32(00000000), ref: 005C0DD0
                                                                  • GetDlgItem.USER32(?,00000406), ref: 005C0DE6
                                                                  • SendMessageW.USER32(00000000), ref: 005C0DE9
                                                                  • GetDlgItem.USER32(?,00000408), ref: 005C0DFF
                                                                  • SendMessageW.USER32(00000000), ref: 005C0E02
                                                                  • KillTimer.USER32(?,00000064), ref: 005C0E3B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Item$MessageSendWindow$RectText$FocusKillOffsetPointsShowTimer
                                                                  • String ID: d$tMf
                                                                  • API String ID: 1684828882-926821200
                                                                  • Opcode ID: fc49304c47e3303331d3a68050f09769ecab0ebf795bbbec871b529118f2f659
                                                                  • Instruction ID: 3db06a481c2d51c24f3069486db257da019b6c1773d9b321c5a13d7849578f6a
                                                                  • Opcode Fuzzy Hash: fc49304c47e3303331d3a68050f09769ecab0ebf795bbbec871b529118f2f659
                                                                  • Instruction Fuzzy Hash: 4E91BC31640619AFDF15AFA4DC46FAE7BA6FF44710F008569FD05AB2D2CB349A01CBA4
                                                                  APIs
                                                                  • PathIsURLW.SHLWAPI ref: 005ACC20
                                                                  • PathIsRelativeW.SHLWAPI ref: 005ACC43
                                                                  • GetFullPathNameW.KERNEL32(?,00000000,00000000,00000000), ref: 005ACC61
                                                                  • GetFullPathNameW.KERNEL32(?,?,00000000,00000000), ref: 005ACCB4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Path$FullName$Relative
                                                                  • String ID:
                                                                  • API String ID: 153212401-0
                                                                  • Opcode ID: 58a564013504604ab14cb4b3cae771a9bd156238595f635db00c9b853307097f
                                                                  • Instruction ID: 8e240d4bf6dd8c7047485c38513b414564823e2f5522f0cfa276873ae86ad37d
                                                                  • Opcode Fuzzy Hash: 58a564013504604ab14cb4b3cae771a9bd156238595f635db00c9b853307097f
                                                                  • Instruction Fuzzy Hash: AAF1C6B0E012199FDB54DFA8D985BAEBBF9FF08300F10446AE919E7341E775A904CB64
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000003,00000100), ref: 0062A784
                                                                  • CreateFileA.KERNEL32(?,C0000000,00000001,00000000,00000003,00000100), ref: 0062A798
                                                                  • SetFilePointer.KERNEL32(00000000,?,?,00000000), ref: 0062A7C7
                                                                  • GetLastError.KERNEL32 ref: 0062A7D2
                                                                  • SetEndOfFile.KERNEL32(?), ref: 0062A7E3
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0062A7F6
                                                                  • GetProcAddress.KERNEL32(00000000,GetFileSizeEx), ref: 0062A802
                                                                  • GetFileSize.KERNEL32(?,?), ref: 0062A82A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: File$Create$AddressErrorHandleLastModulePointerProcSize
                                                                  • String ID: GetFileSizeEx$failed opening file$failed querying file size$failed setting file size$kernel32.dll
                                                                  • API String ID: 1272188909-882181951
                                                                  • Opcode ID: 5feafb18d60f68714c7ddac8d74984bf61d5c49041c5727cf4dd9b5dfd73a3bc
                                                                  • Instruction ID: 94df9f91810891ed97e4a41fb27f3d4e8ba619505b1fb800d1e6c9a2eea5caf3
                                                                  • Opcode Fuzzy Hash: 5feafb18d60f68714c7ddac8d74984bf61d5c49041c5727cf4dd9b5dfd73a3bc
                                                                  • Instruction Fuzzy Hash: 2941BF31600A19AFDB18CFA4DD48BAE73AAAB44711F10462DF816D32D0DBB4DC05CE62
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(user32.dll,?,?,?,00000000,00000000,0059C04D,?,00000060), ref: 0059B549
                                                                  • GetProcAddress.KERNEL32(00000000,GetDpiForWindow), ref: 0059B563
                                                                  • GetProcAddress.KERNEL32(?,GetDpiForSystem), ref: 0059B570
                                                                  • GetProcAddress.KERNEL32(?,GetSystemMetricsForDpi), ref: 0059B57E
                                                                  • GetProcAddress.KERNEL32(?,SystemParametersInfoForDpi), ref: 0059B58C
                                                                  • GetDC.USER32(00000000), ref: 0059B5AE
                                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 0059B5BD
                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 0059B5C9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$CapsDeviceHandleModuleRelease
                                                                  • String ID: GetDpiForSystem$GetDpiForWindow$GetSystemMetricsForDpi$SystemParametersInfoForDpi$user32.dll
                                                                  • API String ID: 3695273371-21495702
                                                                  • Opcode ID: 3ef783eb71474a039195731fa2b876ca3ead03df9a07cd11e1c9e72f8bb19ce2
                                                                  • Instruction ID: dac337b6d2838e0c26814d05f8caf888a0f1cde605297cfa01892d61a8fdd498
                                                                  • Opcode Fuzzy Hash: 3ef783eb71474a039195731fa2b876ca3ead03df9a07cd11e1c9e72f8bb19ce2
                                                                  • Instruction Fuzzy Hash: F32179B0A05702ABEB10CF65ED44A4ABFE5FF88711F05492AF804D7640EB70E914CBB2
                                                                  APIs
                                                                  • GetDC.USER32(00000000), ref: 0061C41E
                                                                  • EnumFontsW.GDI32(00000000,Segoe UI,0061C2C0,00000000), ref: 0061C431
                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 0061C43A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: EnumFontsRelease
                                                                  • String ID: Malgun Gothic$Microsoft JhengHei UI$Microsoft YaHei UI$Segoe UI$Yu Gothic UI$[ja-jp]$[ko-kr]$[zh-cn]$[zh-tw]
                                                                  • API String ID: 2694381407-3191444076
                                                                  • Opcode ID: d7784e320dbcccf312ba30d35fc22f13649d05a05a7f0b2b9f922defc25cd523
                                                                  • Instruction ID: 1a256cf7019b63a899212dd6093ed8a11ecd96e9ab9e6d6b224c332de4a63dd6
                                                                  • Opcode Fuzzy Hash: d7784e320dbcccf312ba30d35fc22f13649d05a05a7f0b2b9f922defc25cd523
                                                                  • Instruction Fuzzy Hash: E451A171E442159BCF10DF58C841BFE7BB6EB45764F184216ED25A7380D734AE818BE1
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,?), ref: 0059BF8A
                                                                    • Part of subcall function 0059BE30: GetDlgItem.USER32(?,?), ref: 0059BE44
                                                                    • Part of subcall function 0059BE30: GetWindowTextLengthW.USER32(00000000), ref: 0059BE4B
                                                                    • Part of subcall function 0059BE30: GetDlgItemTextW.USER32(?,?,00000000,00000001), ref: 0059BE8D
                                                                  • GetWindowDC.USER32(?,?,?), ref: 0059BFA9
                                                                  • GetWindowRect.USER32(?,?), ref: 0059BFBB
                                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0059BFCC
                                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0059BFFE
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0059C006
                                                                  • OffsetRect.USER32(?,?,?), ref: 0059C01F
                                                                  • DrawTextW.USER32(00000000,?,000000FF,?,00000450), ref: 0059C032
                                                                  • MulDiv.KERNEL32(00000003,00000000,?), ref: 0059C050
                                                                  • GetSystemMetrics.USER32(0000002D), ref: 0059C061
                                                                  • GetSystemMetrics.USER32(00000047), ref: 0059C069
                                                                  • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0059C098
                                                                  • SelectObject.GDI32(00000000,?), ref: 0059C0A8
                                                                  • ReleaseDC.USER32(?,00000000), ref: 0059C0B2
                                                                    • Part of subcall function 0059B530: GetModuleHandleW.KERNEL32(user32.dll,?,?,?,00000000,00000000,0059C04D,?,00000060), ref: 0059B549
                                                                    • Part of subcall function 0059B530: GetProcAddress.KERNEL32(00000000,GetDpiForWindow), ref: 0059B563
                                                                    • Part of subcall function 0059B530: GetProcAddress.KERNEL32(?,GetDpiForSystem), ref: 0059B570
                                                                    • Part of subcall function 0059B530: GetProcAddress.KERNEL32(?,GetSystemMetricsForDpi), ref: 0059B57E
                                                                    • Part of subcall function 0059B530: GetProcAddress.KERNEL32(?,SystemParametersInfoForDpi), ref: 0059B58C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Window$AddressProc$ItemText$MetricsObjectRectSelectSystem$DrawHandleLengthMessageModuleMoveOffsetPointsReleaseSend
                                                                  • String ID:
                                                                  • API String ID: 586974731-0
                                                                  • Opcode ID: f3de0a40ceacad850cf2f71f6dffb5ecd7d794a5d61c095bc0403dd7b2977318
                                                                  • Instruction ID: f92dfd5a9ca03008e6e3902bc4e86408bb2ed349e9a0f91d61b0e71e1b590a09
                                                                  • Opcode Fuzzy Hash: f3de0a40ceacad850cf2f71f6dffb5ecd7d794a5d61c095bc0403dd7b2977318
                                                                  • Instruction Fuzzy Hash: 28411B75A01209EFDF04DFA4EC49BAEBBB9FF48711F105129FA15A3290D774A911CB60
                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(00000101,?,?,00000000,00654E60,000000FF,?,005DE148,?), ref: 005DE7BC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: FreeLibrary
                                                                  • String ID: $!f$$!f$$!f$$!f$$!f$0%f$0%f$0%f$0%f$0%f
                                                                  • API String ID: 3664257935-758590268
                                                                  • Opcode ID: d338ec08b63e3a1b0715cb467f13ea47c8327bce31755367c1a69d1c7a5f0433
                                                                  • Instruction ID: 675209496c0e765c2547dcb748c463d2b497d24dde7c498380af4a07a4a211b7
                                                                  • Opcode Fuzzy Hash: d338ec08b63e3a1b0715cb467f13ea47c8327bce31755367c1a69d1c7a5f0433
                                                                  • Instruction Fuzzy Hash: 40F1CD30121B068BEF68EB30D5A9AFABBE5BF54708F40481DE09F46662DF357945EB10
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005A5853
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005A5875
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005A5895
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005A58BF
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005A592D
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 005A5979
                                                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 005A5993
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005A5A28
                                                                  • std::_Facet_Register.LIBCPMT ref: 005A5A35
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                                                  • String ID: O<Z$bad locale name
                                                                  • API String ID: 3375549084-2225322940
                                                                  • Opcode ID: be5e155c46a34636cecf31db627607691a94f876df23bb0d14e18f880cb65628
                                                                  • Instruction ID: 7654c73313a4a88a53de434e836902a435d23690e63b1de34c9c73065fd8bc5a
                                                                  • Opcode Fuzzy Hash: be5e155c46a34636cecf31db627607691a94f876df23bb0d14e18f880cb65628
                                                                  • Instruction Fuzzy Hash: 346182B5D00655DFDB50DFA4E845B9EBFB5BF05310F184018E805A7341EB34E949CBA6
                                                                  APIs
                                                                    • Part of subcall function 0064F600: CreateFileW.KERNEL32(?,00000000,?,0064F9F0,?,?,00000000,?,0064F9F0,?,0000000C), ref: 0064F61D
                                                                  • GetLastError.KERNEL32 ref: 0064FA5B
                                                                  • __dosmaperr.LIBCMT ref: 0064FA62
                                                                  • GetFileType.KERNEL32(00000000), ref: 0064FA6E
                                                                  • GetLastError.KERNEL32 ref: 0064FA78
                                                                  • __dosmaperr.LIBCMT ref: 0064FA81
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0064FAA1
                                                                  • CloseHandle.KERNEL32(00648D01), ref: 0064FBEE
                                                                  • GetLastError.KERNEL32 ref: 0064FC20
                                                                  • __dosmaperr.LIBCMT ref: 0064FC27
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                  • String ID: H
                                                                  • API String ID: 4237864984-2852464175
                                                                  • Opcode ID: 40ac23d3e3943f930f07833a0a233014ce9b0a16733f190fdfd167a19b7cfc19
                                                                  • Instruction ID: 5f11c0b1dc405a8327b922f3266e9cd7852965af81801c65a56465c1ddc43603
                                                                  • Opcode Fuzzy Hash: 40ac23d3e3943f930f07833a0a233014ce9b0a16733f190fdfd167a19b7cfc19
                                                                  • Instruction Fuzzy Hash: 81A13632A141199FDF19DFA8DC91BAE7BA2EB46310F24016DF8019F391CB348D56C792
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005A6332
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 005A637E
                                                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 005A64C4
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005A6559
                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 005A657E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Locinfo::_Lockit$Concurrency::cancel_current_taskLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                  • String ID: ,$.$bad locale name$false$true
                                                                  • API String ID: 3204333896-3659324578
                                                                  • Opcode ID: 7534ae15c8fa42df1fa3957a99a3777835753be7f054bf97b3333a8ac064f938
                                                                  • Instruction ID: e4053a69830092a012d8a0f73dc7730a201e2d54b1d67f7a7107c4ea3bc4b0d1
                                                                  • Opcode Fuzzy Hash: 7534ae15c8fa42df1fa3957a99a3777835753be7f054bf97b3333a8ac064f938
                                                                  • Instruction Fuzzy Hash: EB8150B1D00259DBEF50DFE5D845BDEBBB8BF05304F148069E904AB281E775DA08CBA6
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005ABC33
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005ABC55
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005ABC75
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005ABC9F
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005ABD0D
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 005ABD59
                                                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 005ABD73
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005ABE08
                                                                  • std::_Facet_Register.LIBCPMT ref: 005ABE15
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                                                  • String ID: bad locale name
                                                                  • API String ID: 3375549084-1405518554
                                                                  • Opcode ID: 3c5e3964c0dd4e957debb0053e2e478760bd704e1a02d4824b5b5676023aa98f
                                                                  • Instruction ID: 19d8991e04ced7730c0db70ba4bc09e6749ea9eeb8265def9fb31d8e5f3bb5db
                                                                  • Opcode Fuzzy Hash: 3c5e3964c0dd4e957debb0053e2e478760bd704e1a02d4824b5b5676023aa98f
                                                                  • Instruction Fuzzy Hash: 3F617EB4D002599BEB50DFA4D855BAEBFB5BF05314F184018E808A7342EB34AD49CBE6
                                                                  APIs
                                                                  • GetCurrentThreadId.KERNEL32 ref: 05350064
                                                                  • GetLastError.KERNEL32(?,00000000,?,0534AE8A), ref: 0535007E
                                                                  • GetLastActivePopup.USER32 ref: 053500F6
                                                                  • GetModuleHandleW.KERNEL32(00000000,?,0534AE8A), ref: 05350134
                                                                  • GetLargePageMinimum.KERNEL32(?,?,0534AE8A), ref: 05350177
                                                                  • GetSystemDefaultLangID.KERNEL32(?,?,0534AE8A), ref: 053501E5
                                                                  Strings
                                                                  • The driver package cannot find a required driver configuration., xrefs: 0535003E
                                                                  • The specified named pipe is in the connected state., xrefs: 05350140, 053501F0
                                                                  • Checking file system on %wZ, xrefs: 0535012D
                                                                  • {Insufficient Resources on Remote Computer}, xrefs: 053500BF, 05350183
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Last$ActiveCurrentDefaultErrorHandleLangLargeMinimumModulePagePopupSystemThread
                                                                  • String ID: Checking file system on %wZ$The driver package cannot find a required driver configuration.$The specified named pipe is in the connected state.${Insufficient Resources on Remote Computer}
                                                                  • API String ID: 584268533-1900623555
                                                                  • Opcode ID: 30c536cb307a8f172bf26cdd4103823ed093c9affeaf9868326de5581930ddb5
                                                                  • Instruction ID: 1657e94f380948d63aea1d468de45dd0a6d3accbf351d7bdd3b46408d9cc0181
                                                                  • Opcode Fuzzy Hash: 30c536cb307a8f172bf26cdd4103823ed093c9affeaf9868326de5581930ddb5
                                                                  • Instruction Fuzzy Hash: 4C51F1B99202018FCB09CF6AE98B5567FEDE788308F80C56EE9458F344EF7984198F50
                                                                  APIs
                                                                  • SetLastError.KERNEL32(?,?,?,?,?,?,05349A36), ref: 05352E00
                                                                  • GetLargePageMinimum.KERNEL32(?,?,?,?,?,?,?,05349A36), ref: 05352E20
                                                                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,05349A36), ref: 05352E7B
                                                                  • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,05349A36), ref: 05352EB9
                                                                  • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,05349A36), ref: 05352EE0
                                                                  Strings
                                                                  • The specified resiliency type is not valid., xrefs: 05352DD1
                                                                  • APPOINTMENTS, xrefs: 05352E81
                                                                  • {Invalid Current Directory}, xrefs: 05352DA5
                                                                  • The filter weight is not valid., xrefs: 05352E74
                                                                  • OnMachineUILanguageClear, xrefs: 05352EE2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$ForegroundLargeMinimumPageWindowlstrlen
                                                                  • String ID: APPOINTMENTS$OnMachineUILanguageClear$The filter weight is not valid.$The specified resiliency type is not valid.${Invalid Current Directory}
                                                                  • API String ID: 2730288062-1783351758
                                                                  • Opcode ID: 669790b17405bce41684d7d72c496f5ada9ff12760aef2378c1152eca159e833
                                                                  • Instruction ID: 46974a6ada2b12fb402a150159fe1823f9cb12677c408674d5d4096fa8212898
                                                                  • Opcode Fuzzy Hash: 669790b17405bce41684d7d72c496f5ada9ff12760aef2378c1152eca159e833
                                                                  • Instruction Fuzzy Hash: 4541E3B5A252008BD314CF29E9824667FEEEB84308F94D06EF849CF31CEE348415DBA1
                                                                  APIs
                                                                  • PathFileExistsW.SHLWAPI(00676DE4,?,00000002), ref: 0059C37E
                                                                  • CoCreateInstance.OLE32(006597A0,00000000,00000001,00661AEC,?), ref: 0059C3DF
                                                                  • SHCreateItemFromParsingName.SHELL32(00676DE4,00000000,00661AFC,00000000), ref: 0059C473
                                                                  • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,-00000002), ref: 0059C696
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Create$ExistsFileFreeFromInstanceItemNameParsingPathTask
                                                                  • String ID: mg$mg$mg$mg$mg
                                                                  • API String ID: 4132989732-2136722120
                                                                  • Opcode ID: 05f115cdb996edc4e2abdef6185da841f020234267964243fc93ea2a7f3bf3da
                                                                  • Instruction ID: 96d4c6cba8a5ebb848bb7f6d9b59b7c87f3222835e64720c7d0bd9227e74aacb
                                                                  • Opcode Fuzzy Hash: 05f115cdb996edc4e2abdef6185da841f020234267964243fc93ea2a7f3bf3da
                                                                  • Instruction Fuzzy Hash: 2BE14871A00215AFCB14DFA8C898FAEBFB5FF48704F108559F91AAB290D731E905CB60
                                                                  APIs
                                                                  • SystemParametersInfoW.USER32(00000042,0000000C,0000000C,00000000), ref: 006254CE
                                                                  • GetSysColor.USER32(00000008), ref: 006254EE
                                                                  • GetSysColor.USER32(00000005), ref: 00625507
                                                                  • GetTickCount64.KERNEL32 ref: 00625562
                                                                    • Part of subcall function 005BE810: RegOpenKeyExW.KERNELBASE(80000001,0067BC98,00000000,00000000,00000000), ref: 005BE848
                                                                    • Part of subcall function 005BE810: RegCloseKey.ADVAPI32(00000000), ref: 005BE881
                                                                    • Part of subcall function 005BE810: GetTickCount64.KERNEL32 ref: 005BE88E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ColorCount64Tick$CloseInfoOpenParametersSystem
                                                                  • String ID: darkmode$global$invalid stol argument$stol argument out of range$uiribbon.dll
                                                                  • API String ID: 763119031-2917169372
                                                                  • Opcode ID: fa3e658f072baab936ddd41bc0eba6416324d1738a3ad04ac135992c9aef35b0
                                                                  • Instruction ID: 5190554d5226efe0b839f039cd74a8c4c3363d463a5453fe85aad5a65a4fddc0
                                                                  • Opcode Fuzzy Hash: fa3e658f072baab936ddd41bc0eba6416324d1738a3ad04ac135992c9aef35b0
                                                                  • Instruction Fuzzy Hash: 74C1E171E00E65AFDF24DBA4E8467ECBBB6BF04300F044169E416AB381D774A944CFA2
                                                                  APIs
                                                                  • GetDialogBaseUnits.USER32 ref: 0535318E
                                                                  • GetLastError.KERNEL32(00000001,?,?,0534CF01,?,?,?,0534B33B), ref: 0535321D
                                                                  • AnyPopup.USER32 ref: 053532BB
                                                                  • GetForegroundWindow.USER32(?,0534CF01,?,?,?,0534B33B), ref: 053532F8
                                                                  Strings
                                                                  • CFGOptions, xrefs: 0535319E
                                                                  • Built-in PNG Codec, xrefs: 05353228
                                                                  • An invalid characteristics table was used., xrefs: 05353129
                                                                  • AslRegistryOpenKey failed [%x], xrefs: 05353143
                                                                  • Compressing this object would not save space., xrefs: 05353280
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: BaseDialogErrorForegroundLastPopupUnitsWindow
                                                                  • String ID: An invalid characteristics table was used.$AslRegistryOpenKey failed [%x]$Built-in PNG Codec$CFGOptions$Compressing this object would not save space.
                                                                  • API String ID: 2560853714-4095279174
                                                                  • Opcode ID: 019a504e0539eeaef248f70a8e490df8322b847b064f24dab10759615e13d379
                                                                  • Instruction ID: 95f0a2ed7063baf531867f3eb998f31502b87adc8f62e2bf167e4f6d76d2d382
                                                                  • Opcode Fuzzy Hash: 019a504e0539eeaef248f70a8e490df8322b847b064f24dab10759615e13d379
                                                                  • Instruction Fuzzy Hash: 6C51F1B59303518FD314CF39E88A665BFAAF745365FC8DA2EE841CF285EB7480458B81
                                                                  APIs
                                                                  • GetOEMCP.KERNEL32(?,?,82040462,?,0534886D), ref: 0534D8BC
                                                                  • GetLastActivePopup.USER32 ref: 0534D8F2
                                                                  • GetForegroundWindow.USER32(00000000,?,?,82040462,?,0534886D), ref: 0534D979
                                                                  • GetForegroundWindow.USER32(?,?,82040462,?,0534886D), ref: 0534D9B1
                                                                  • GetDesktopWindow.USER32 ref: 0534D9BD
                                                                  • GetSystemDefaultLangID.KERNEL32(?,?,82040462,?,0534886D), ref: 0534D9D7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$Foreground$ActiveDefaultDesktopLangLastPopupSystem
                                                                  • String ID: AslRegistryOpenSubKey passed bad Path [%x]$ExecuteOptions$Waiter TCB
                                                                  • API String ID: 219059782-3912792277
                                                                  • Opcode ID: 183a804efcf22a60ece8d6825d77dcb2589f60118e05587a059e08edc8eb684b
                                                                  • Instruction ID: df3d80fc444e4da835a05329330e2961c953b59b92bcc71038eb5580eee5aca5
                                                                  • Opcode Fuzzy Hash: 183a804efcf22a60ece8d6825d77dcb2589f60118e05587a059e08edc8eb684b
                                                                  • Instruction Fuzzy Hash: AC4195789242818FD702CF79E5962253FEAF709308FA4C86EE446CF395EB75A0058F41
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: __aulldiv
                                                                  • String ID: :$f$f$f$p$p$p
                                                                  • API String ID: 3732870572-1434680307
                                                                  • Opcode ID: 97986b8538d5f89c871bdc3f9bcc664c2bcc637c3cfe150ad1ee66712ad1f84c
                                                                  • Instruction ID: ef5786e0b02db1b335d282a15998d570eeae1219fd26881e0f7f66ad7356ebc7
                                                                  • Opcode Fuzzy Hash: 97986b8538d5f89c871bdc3f9bcc664c2bcc637c3cfe150ad1ee66712ad1f84c
                                                                  • Instruction Fuzzy Hash: 4D02A079E00A28DADF208FA4E4556EEB777FF40B18F6081BAD8147B280D3309E858F15
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,00000001,0062AC22,failed create mapping), ref: 0062A194
                                                                  • CloseHandle.KERNEL32(00000000,?,00000001,0062AC22,failed create mapping), ref: 0062A1A4
                                                                  • CloseHandle.KERNEL32(?,?,00000001,0062AC22,failed create mapping), ref: 0062A1B3
                                                                  • SetLastError.KERNEL32(00000000,?,00000001,0062AC22,failed create mapping), ref: 0062A1BA
                                                                  Strings
                                                                  • failed closing mapped file, xrefs: 0062A3A7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CloseErrorHandleLast
                                                                  • String ID: failed closing mapped file
                                                                  • API String ID: 918212764-752119354
                                                                  • Opcode ID: 3f3068f1d4a48dda2ad61b33639fb599dadc8a6c1ca34a73708273cf9c65037d
                                                                  • Instruction ID: 5f390c4548b57d24a712299c923c5c1a38c19f7052e37698072497bb23870797
                                                                  • Opcode Fuzzy Hash: 3f3068f1d4a48dda2ad61b33639fb599dadc8a6c1ca34a73708273cf9c65037d
                                                                  • Instruction Fuzzy Hash: 7D51CE71A00B189BDB14DFA4ED487AEBBB6AF44320F14470DE4629B7D1CBB59940CF51
                                                                  APIs
                                                                  • ShellExecuteW.SHELL32(?,open,?,00000000,00000000,00000005), ref: 005B364F
                                                                  • EndDialog.USER32(?,?), ref: 005B369B
                                                                  • GetDlgItem.USER32(?,00000415), ref: 005B36FA
                                                                  • SetDlgItemTextW.USER32(?,00000413,?), ref: 005B37AC
                                                                  • SetDlgItemTextW.USER32(?,00000414,2024-01-10), ref: 005B37BB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Item$Text$DialogExecuteShell
                                                                  • String ID: 2024-01-10$grepWinNP3 (x86) version %ld.%ld.%ld.%ld$open
                                                                  • API String ID: 616644314-1604778358
                                                                  • Opcode ID: 47ea07c8655b00d8823660d59612146714fb5bca061210b608861ad5c5d91653
                                                                  • Instruction ID: 820dffb32f3187f9d321ee4c6650bc06ba55ba4c041fb0c8ce943d38e319083a
                                                                  • Opcode Fuzzy Hash: 47ea07c8655b00d8823660d59612146714fb5bca061210b608861ad5c5d91653
                                                                  • Instruction Fuzzy Hash: 6351C170A00619ABCB14DF64DC5AFEE7B66FF04710F004269F909AB2D2DB75AE50CB94
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentDesktopHandleModuleThreadWindow
                                                                  • String ID: /languagelevel where {pop languagelevel} {1} ifelse$AslRegistryBuildUserPath$MachinePreferredUILanguages$SdbpGetProcessHostGuestArchitectures$Stack trace available at %p
                                                                  • API String ID: 2956977152-1075518002
                                                                  • Opcode ID: 78d0aa108afcaf39972b7b65c4b3cced1976a050dcc197e1dd392b5538e0a2f6
                                                                  • Instruction ID: df7b03e611b6dbcd8043dd0490b753405fe1884380ecd2e3160a18a3f9416c85
                                                                  • Opcode Fuzzy Hash: 78d0aa108afcaf39972b7b65c4b3cced1976a050dcc197e1dd392b5538e0a2f6
                                                                  • Instruction Fuzzy Hash: 6C51E079A242408FD715CF69E5A26627FEAF789318F94D1EEE9868F345EB344400CBC1
                                                                  APIs
                                                                  • GetDesktopWindow.USER32 ref: 0534D2D7
                                                                  • GetLastActivePopup.USER32 ref: 0534D337
                                                                  • GetSystemDefaultLangID.KERNEL32 ref: 0534D3A9
                                                                  • AnyPopup.USER32 ref: 0534D3BE
                                                                  • GetUserDefaultLangID.KERNEL32 ref: 0534D44A
                                                                  • GetUserDefaultLangID.KERNEL32 ref: 0534D46E
                                                                  • GetSystemDefaultLangID.KERNEL32 ref: 0534D48E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLang$PopupSystemUser$ActiveDesktopLastWindow
                                                                  • String ID: The device is pending further configuration.
                                                                  • API String ID: 3968625898-3241136172
                                                                  • Opcode ID: 2fe72437b7429efc1ebcf8546daa7fead92596e54614641ed535c199fa4ce8f0
                                                                  • Instruction ID: 29a46000537cc7fe742d6a17ee15725c24ea8c83f199ab664da7d8e2a83bee4f
                                                                  • Opcode Fuzzy Hash: 2fe72437b7429efc1ebcf8546daa7fead92596e54614641ed535c199fa4ce8f0
                                                                  • Instruction Fuzzy Hash: 3F5166B59252008FDB06CF69E58B5567FEDF748348F84C9AEF08A8F241DF74A4608B91
                                                                  APIs
                                                                  • GetLargePageMinimum.KERNEL32(?,00000001,?,05348BA1), ref: 0534DE3E
                                                                  • GetWindowTextLengthW.USER32 ref: 0534DEA4
                                                                  • GetDesktopWindow.USER32 ref: 0534DEAB
                                                                  • GetModuleHandleW.KERNEL32(?,00000001,?,05348BA1), ref: 0534DEF5
                                                                  • GetLastError.KERNEL32(?,?,00000001,?,05348BA1), ref: 0534DF0B
                                                                  Strings
                                                                  • An IKE policy cannot contain an Extended Mode policy., xrefs: 0534DE34
                                                                  • No device query callback specified, xrefs: 0534DEC1
                                                                  • Windows.Mobile, xrefs: 0534DDE3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$DesktopErrorHandleLargeLastLengthMinimumModulePageText
                                                                  • String ID: An IKE policy cannot contain an Extended Mode policy.$No device query callback specified$Windows.Mobile
                                                                  • API String ID: 1650162651-460382086
                                                                  • Opcode ID: 282f36f6ab139d39cd061f37782c1d0f50c70f72e15f4f3807b5b56940d6f4bd
                                                                  • Instruction ID: c97f3ce14a18e12af478d8c7c8acf2f21ef64652a08d391e1d06a39e150a27ee
                                                                  • Opcode Fuzzy Hash: 282f36f6ab139d39cd061f37782c1d0f50c70f72e15f4f3807b5b56940d6f4bd
                                                                  • Instruction Fuzzy Hash: DE4137B49202058BCB519F65A59AA257FEDF758308B90C62EE451CF708EB389059CF40
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,08000000,00000000,00000000,?,?,00000000), ref: 005F4702
                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000), ref: 005F4717
                                                                  • CreateFileMappingW.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000,?,?,00000000), ref: 005F472B
                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 005F4738
                                                                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,?,?,00000000), ref: 005F474C
                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 005F4760
                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 005F4763
                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 005F4767
                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 005F476A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$File$Create$MappingSizeView
                                                                  • String ID:
                                                                  • API String ID: 506559639-0
                                                                  • Opcode ID: 0b3ed30dfc5412538e0dbf3b54f129d5275d06eb2eadaf26d7d73e92d7ca3a63
                                                                  • Instruction ID: f4df4821732ca61019b58806e90bafa4e6f379b898a2a81a36ce0830c64910fe
                                                                  • Opcode Fuzzy Hash: 0b3ed30dfc5412538e0dbf3b54f129d5275d06eb2eadaf26d7d73e92d7ca3a63
                                                                  • Instruction Fuzzy Hash: 43417C70A0071AEFD720DF64CC89B6ABBB8FB05720F204119F615AB6D0D774A910CFA4
                                                                  APIs
                                                                  • GetDC.USER32 ref: 005B34CD
                                                                  • BeginPaint.USER32(?,?), ref: 005B34E5
                                                                    • Part of subcall function 0059B530: GetModuleHandleW.KERNEL32(user32.dll,?,?,?,00000000,00000000,0059C04D,?,00000060), ref: 0059B549
                                                                    • Part of subcall function 0059B530: GetProcAddress.KERNEL32(00000000,GetDpiForWindow), ref: 0059B563
                                                                    • Part of subcall function 0059B530: GetProcAddress.KERNEL32(?,GetDpiForSystem), ref: 0059B570
                                                                    • Part of subcall function 0059B530: GetProcAddress.KERNEL32(?,GetSystemMetricsForDpi), ref: 0059B57E
                                                                    • Part of subcall function 0059B530: GetProcAddress.KERNEL32(?,SystemParametersInfoForDpi), ref: 0059B58C
                                                                  • MulDiv.KERNEL32(00000040,00000000), ref: 005B3503
                                                                    • Part of subcall function 0059B530: GetDC.USER32(00000000), ref: 0059B5AE
                                                                    • Part of subcall function 0059B530: GetDeviceCaps.GDI32(00000000,00000058), ref: 0059B5BD
                                                                    • Part of subcall function 0059B530: ReleaseDC.USER32(00000000,00000000), ref: 0059B5C9
                                                                  • MulDiv.KERNEL32(0000000C,00000000), ref: 005B3519
                                                                  • MulDiv.KERNEL32(0000000C,00000000), ref: 005B352F
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 005B3535
                                                                  • DrawIconEx.USER32(00000060,00000000,00000000,00000000,00000000,00000000,00000000,00000003), ref: 005B354F
                                                                  • ReleaseDC.USER32(?,00000060), ref: 005B3557
                                                                  • EndPaint.USER32(?,?,?,00000060,?,00000060,?,00000060,?,00000060,?,?), ref: 005B3563
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$PaintRelease$BeginBrushCapsColorDeviceDrawHandleIconModule
                                                                  • String ID:
                                                                  • API String ID: 2460367397-0
                                                                  • Opcode ID: 83396d8a75f9acc59364b6b9fc97d60f7019b524be2ed4039d345a0f9a3e31ba
                                                                  • Instruction ID: cb2d7d28dcbce9c483207a7ff04ea8a37c78413d2f5f4a6b392d4d852c7b520b
                                                                  • Opcode Fuzzy Hash: 83396d8a75f9acc59364b6b9fc97d60f7019b524be2ed4039d345a0f9a3e31ba
                                                                  • Instruction Fuzzy Hash: 3911937164031DBFFB10A7B4AC0EF6F7BDEEB44B51F041125BA09D22D1EA64AD0086B5
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwind
                                                                  • String ID: csm$csm$csm
                                                                  • API String ID: 944608866-393685449
                                                                  • Opcode ID: 4a35cc4a5ea49ea3e62a9b742658f9b4ac56378fcae8f56de49fcb81901c0b42
                                                                  • Instruction ID: e37a69cb49d2a8cd8952c342d894281baec4cf8847c2ab47eb26955ec4c7c3f0
                                                                  • Opcode Fuzzy Hash: 4a35cc4a5ea49ea3e62a9b742658f9b4ac56378fcae8f56de49fcb81901c0b42
                                                                  • Instruction Fuzzy Hash: 06B19971900A29EFCF18DFA4E8819EEB7BAFF04311F14456AE8146B216D371EA51CF91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID: 0-3907804496
                                                                  • Opcode ID: b9902383498c146190f1a47479901108ce3fc5a1f84d757560d40f40de17b3c6
                                                                  • Instruction ID: 8977c03bf1cc9e123503243fe2ed2b98d842f3f504512c9d985e24f278345b5a
                                                                  • Opcode Fuzzy Hash: b9902383498c146190f1a47479901108ce3fc5a1f84d757560d40f40de17b3c6
                                                                  • Instruction Fuzzy Hash: 8AB1F170E00649AFEB11DFE8C884BADBBB7BF49304F144158E5469B393C7709A42CBA5
                                                                  APIs
                                                                  • QueryPerformanceCounter.KERNEL32(?,?,75C05540,00000000), ref: 005D98DC
                                                                  • QueryPerformanceFrequency.KERNEL32(00000000,?,75C05540,00000000), ref: 005D98E6
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005D990D
                                                                  • GetTickCount64.KERNEL32 ref: 005D9941
                                                                  • GetTickCount64.KERNEL32 ref: 005D99B1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Count64PerformanceQueryTick$CounterFrequencyUnothrow_t@std@@@__ehfuncinfo$??2@
                                                                  • String ID: %s : %lld ms$Software\grepWinNP3\DebugOutput
                                                                  • API String ID: 2281104147-2271610753
                                                                  • Opcode ID: f0b77e6dbe1914beb1af7eddf7860b672da7cb626254c58864bed43782d8a7e9
                                                                  • Instruction ID: 5425bd3fb3d86d3b7d284d072bdd37126fcc1739e153fccde683f912fe4507a9
                                                                  • Opcode Fuzzy Hash: f0b77e6dbe1914beb1af7eddf7860b672da7cb626254c58864bed43782d8a7e9
                                                                  • Instruction Fuzzy Hash: 23518DB19002499FDF24DFA8D895BEEBBB5FB44304F14861AE815AB381D7349944CFA1
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005A255B
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 005A25AA
                                                                  • __Getctype.LIBCPMT ref: 005A25C0
                                                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 005A260A
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005A26A2
                                                                  • __Getwctype.LIBCPMT ref: 005A26D8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Locinfo::_Lockit$GetctypeGetwctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                  • String ID: bad locale name
                                                                  • API String ID: 2702795554-1405518554
                                                                  • Opcode ID: 4bd083eae2c639e5abd7f249c5f4fa4e2867c4e2b71e6ca50d5e03aaf8b1a4eb
                                                                  • Instruction ID: 29e666a6f38715737f9e1ce9539252c90117e907180119faafea8823e9945c48
                                                                  • Opcode Fuzzy Hash: 4bd083eae2c639e5abd7f249c5f4fa4e2867c4e2b71e6ca50d5e03aaf8b1a4eb
                                                                  • Instruction Fuzzy Hash: AF516DB1D003589BEB50DFA8D845B9EBBB9BF15300F14816DE908AB341EB34D908CB96
                                                                  APIs
                                                                  Strings
                                                                  • The same member index was specified more than once., xrefs: 0534FEC8
                                                                  • Operating System, xrefs: 0534FDF5
                                                                  • Win32 x86 emulation subsystem Floating-point stack check., xrefs: 0534FF6E
                                                                  • {Invalid Parameter}, xrefs: 0534FE42
                                                                  • LdrpResSearchResourceInsideDirectory Enter, xrefs: 0534FE89, 0534FF11, 0534FF46
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$LengthShellText
                                                                  • String ID: Operating System$LdrpResSearchResourceInsideDirectory Enter$The same member index was specified more than once.$Win32 x86 emulation subsystem Floating-point stack check.${Invalid Parameter}
                                                                  • API String ID: 4278117263-4043220159
                                                                  • Opcode ID: edb486b12956fafd51e5d10debc3abe5b6ca68adc4aa5ba40b53c3a643c42d8c
                                                                  • Instruction ID: 0017501413b065a41e57eaa37d91bb8937e46e9bdc6a0fda22ed5d55aac3dfd2
                                                                  • Opcode Fuzzy Hash: edb486b12956fafd51e5d10debc3abe5b6ca68adc4aa5ba40b53c3a643c42d8c
                                                                  • Instruction Fuzzy Hash: 8F5148B49242418FD314CF28E5922617FE9F71634DF88D1AEE8868F346EA706441CF90
                                                                  APIs
                                                                  • _ValidateLocalCookies.LIBCMT ref: 0062D517
                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0062D51F
                                                                  • _ValidateLocalCookies.LIBCMT ref: 0062D5A8
                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 0062D5D3
                                                                  • _ValidateLocalCookies.LIBCMT ref: 0062D628
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                  • String ID: 09Z$csm
                                                                  • API String ID: 1170836740-2073185448
                                                                  • Opcode ID: ef5b31ef96ef525d9927fe4b6456acede662fb4c1e253f0ebf041d04091062f4
                                                                  • Instruction ID: a272e876508eb1ec48d30ca24844b02ea92f1f1402d68064cbf901e85347146c
                                                                  • Opcode Fuzzy Hash: ef5b31ef96ef525d9927fe4b6456acede662fb4c1e253f0ebf041d04091062f4
                                                                  • Instruction Fuzzy Hash: 4E41D634A006289BCF10DF68D844A9E7BB7AF45328F148169F818AB392D771EA45CF95
                                                                  APIs
                                                                  • GetUserDefaultLangID.KERNEL32 ref: 05347770
                                                                  Strings
                                                                  • LdrpCodeAuthzInitialize failed with status 0x%08lx, xrefs: 05347833
                                                                  • AslFileMappingGetFileKindDetail, xrefs: 0534781F
                                                                  • DaylightName, xrefs: 053477CC, 05347811
                                                                  • Allocating a data table entry for the executable failed, xrefs: 0534782B
                                                                  • The resource is owned exclusively by thread %p, xrefs: 053476DE
                                                                  • b+5sghCuTgLs2LpDuMG00CRzvBlcU2oDDNrm1FMrSmiHV7s0W+ogurH0ZtnOeQbMnH8kzF3bGH/4hLo6kn0JFv1X208aNZNbVOEEZwKP3NU/F/7D6+FhwHEs5ifoYPnJ3oqTX0KTlJY0pQDDKpnnZZNQUfKaedhfgw5bYlgxyqaNMPsYvat9XC1evsJIEqsdO/UepnIK1oGjnCjpx5xRMCWV9AbHkIwRKw2zUeoZB/zLa6772qyL/GlcgHtVITf7bl7p, xrefs: 05347867
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLangUser
                                                                  • String ID: Allocating a data table entry for the executable failed$AslFileMappingGetFileKindDetail$DaylightName$LdrpCodeAuthzInitialize failed with status 0x%08lx$The resource is owned exclusively by thread %p$b+5sghCuTgLs2LpDuMG00CRzvBlcU2oDDNrm1FMrSmiHV7s0W+ogurH0ZtnOeQbMnH8kzF3bGH/4hLo6kn0JFv1X208aNZNbVOEEZwKP3NU/F/7D6+FhwHEs5ifoYPnJ3oqTX0KTlJY0pQDDKpnnZZNQUfKaedhfgw5bYlgxyqaNMPsYvat9XC1evsJIEqsdO/UepnIK1oGjnCjpx5xRMCWV9AbHkIwRKw2zUeoZB/zLa6772qyL/GlcgHtVITf7bl7p
                                                                  • API String ID: 768647712-1029917157
                                                                  • Opcode ID: 24e45345eb78b0cdfb857703469c2a2dd7f8eb227787145657ae0892112cb907
                                                                  • Instruction ID: 7615c5342dca9bedb1c822860aab7b42974ca2061a4e06b72631d2063651ba8a
                                                                  • Opcode Fuzzy Hash: 24e45345eb78b0cdfb857703469c2a2dd7f8eb227787145657ae0892112cb907
                                                                  • Instruction Fuzzy Hash: B24175749182988BCB148F79A4492EA3FF2FB55300F64C5ACEC8C9B341CA745949CFA1
                                                                  APIs
                                                                  • GetWindowTextLengthW.USER32 ref: 05350BEA
                                                                  • GetUserDefaultLangID.KERNEL32(00000000,?,?,00000000,?,05347B52), ref: 05350C2E
                                                                  • GetTopWindow.USER32 ref: 05350C6A
                                                                  • GetLastActivePopup.USER32 ref: 05350C9C
                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,?,00000000,?,05347B52), ref: 05350CF3
                                                                  • GetDesktopWindow.USER32 ref: 05350D04
                                                                  Strings
                                                                  • A context is already defined for this object., xrefs: 05350CD8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$ActiveDefaultDesktopHandleLangLastLengthModulePopupTextUser
                                                                  • String ID: A context is already defined for this object.
                                                                  • API String ID: 284326558-2900652361
                                                                  • Opcode ID: 83b1a6253cb7fd2b70f50f67c83097871aebce016f1e97ece9a9c7de0058c711
                                                                  • Instruction ID: a4731d95093724f9ca3d62034be40eb1f0566491790172c1e74270ef1a2dc314
                                                                  • Opcode Fuzzy Hash: 83b1a6253cb7fd2b70f50f67c83097871aebce016f1e97ece9a9c7de0058c711
                                                                  • Instruction Fuzzy Hash: DA415AB49202028BC704DF69E68AA653FE9F748318FA0D66EF852CF240EB399441CF55
                                                                  APIs
                                                                  • FormatMessageW.KERNEL32(00001300,00000000,?,00000400,?), ref: 005F1DF1
                                                                  • LocalAlloc.KERNEL32(00000000,00000040,?,00000400,?), ref: 005F1E42
                                                                  • MessageBoxW.USER32(00000000,grepWinNP3,00000000,00000010), ref: 005F1E98
                                                                  • LocalFree.KERNEL32(00000000,?,00000400,?), ref: 005F1EC1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: LocalMessage$AllocFormatFree
                                                                  • String ID: IDispatch error #%d$Unknown error 0x%0lX$grepWinNP3
                                                                  • API String ID: 59769524-447017682
                                                                  • Opcode ID: b655f1a5bc64b386b28decaae559a90d5ec3c77d55207bb1a3873389eec41fc6
                                                                  • Instruction ID: eda88b70f837994080476d25583e5e4e848be93c2ddddc300035757a18e7b757
                                                                  • Opcode Fuzzy Hash: b655f1a5bc64b386b28decaae559a90d5ec3c77d55207bb1a3873389eec41fc6
                                                                  • Instruction Fuzzy Hash: 2B31C074A0070ADBEB14DF54C84ABBFBBB9FF44704F10855DEE16A7280D7B969008A98
                                                                  APIs
                                                                  • GetDialogBaseUnits.USER32 ref: 053506A5
                                                                  • SetLastError.KERNEL32(?,?,?,?,05349A03), ref: 053506DF
                                                                  • GetThreadUILanguage.KERNEL32(00000000,?,?,?,?,05349A03), ref: 05350734
                                                                  • GetLastError.KERNEL32(?,?,?,?,05349A03), ref: 0535077C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$BaseDialogLanguageThreadUnits
                                                                  • String ID: /WhitePointY$Luminance$windows seven
                                                                  • API String ID: 3268890622-1929846185
                                                                  • Opcode ID: 425eaaffb4401c3e41b4fe275f57288d00809c3b135d951afd45af425f0f620e
                                                                  • Instruction ID: f2243ba61cb9da25f387d6b948306fe95fc4a996eed81194ab4062607b1d2c35
                                                                  • Opcode Fuzzy Hash: 425eaaffb4401c3e41b4fe275f57288d00809c3b135d951afd45af425f0f620e
                                                                  • Instruction Fuzzy Hash: 06318DB8A242418FC708DF69E69A9157FFAFB84348B94C46EF8068F744EFB594058B50
                                                                  APIs
                                                                  • SetLastError.KERNEL32(00000003,?,?,0534B508), ref: 0534F4B6
                                                                  • GetTickCount.KERNEL32 ref: 0534F4DB
                                                                  • GetLastError.KERNEL32(?,?,?,0534B508), ref: 0534F534
                                                                  • GetLastActivePopup.USER32 ref: 0534F5BB
                                                                  Strings
                                                                  • The type UUID has already been registered., xrefs: 0534F588
                                                                  • There is not enough power to complete the requested operation., xrefs: 0534F4E6
                                                                  • The Directory Service is shutting down., xrefs: 0534F53A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Last$Error$ActiveCountPopupTick
                                                                  • String ID: The Directory Service is shutting down.$The type UUID has already been registered.$There is not enough power to complete the requested operation.
                                                                  • API String ID: 815136527-3840197208
                                                                  • Opcode ID: 85e543b4b20c2fed00d503c71191d4896da4c2e26271a2e90dc270339981dd3e
                                                                  • Instruction ID: de8197647ee348dd5812b249c5aaf4f3a66174dc51b916c7dcc77fa5bb4844ab
                                                                  • Opcode Fuzzy Hash: 85e543b4b20c2fed00d503c71191d4896da4c2e26271a2e90dc270339981dd3e
                                                                  • Instruction Fuzzy Hash: D831BCB59352528FD304CFA8E5AA5517FEDF789348FA480AFF9958F340EB7850058B80
                                                                  APIs
                                                                  Strings
                                                                  • ,fiWymsJEXztn8kHA9xx5OCWQKcoq4y+YMm7zZyi7gEU=0Z, xrefs: 0534FB6D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$DefaultErrorForegroundLangLastLengthShellTextUserlstrlen
                                                                  • String ID: ,fiWymsJEXztn8kHA9xx5OCWQKcoq4y+YMm7zZyi7gEU=0Z
                                                                  • API String ID: 4116212751-1031629053
                                                                  • Opcode ID: 3f0f14ecb6344425644355b68248b7ffa5507902b750342d0ffac8efa186db80
                                                                  • Instruction ID: 8c26a36057c2d9c7cf1d754018552b64a3d53f3da7bc76364be9cb0da4ff41ed
                                                                  • Opcode Fuzzy Hash: 3f0f14ecb6344425644355b68248b7ffa5507902b750342d0ffac8efa186db80
                                                                  • Instruction Fuzzy Hash: E0310FB5A242428FC709DF68E88B61A7FADF794308B90C66EF405CF258EB3490458B90
                                                                  APIs
                                                                  Strings
                                                                  • AslpFileQuery16BitModuleName, xrefs: 05352053
                                                                  • AslFileMappingGetImageTypeEx failed [%x], xrefs: 05352012
                                                                  • This stream is not DAX mappable., xrefs: 05352037
                                                                  • Driver %2 has been blocked from loading., xrefs: 05351FE5, 05351FFB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: BaseDefaultDialogLangSystemUnits
                                                                  • String ID: AslFileMappingGetImageTypeEx failed [%x]$AslpFileQuery16BitModuleName$Driver %2 has been blocked from loading.$This stream is not DAX mappable.
                                                                  • API String ID: 3966756997-4087607733
                                                                  • Opcode ID: 57cf9feeab295cd02d6352cce33d6e6f7dcce9a6a886ba763c648d310710971c
                                                                  • Instruction ID: a00aa8b57aa3a1684f5a27987fa55fdd5ab1d9bf220fa9b60c0ebf82df139f0e
                                                                  • Opcode Fuzzy Hash: 57cf9feeab295cd02d6352cce33d6e6f7dcce9a6a886ba763c648d310710971c
                                                                  • Instruction Fuzzy Hash: 2A01242C6050864BDB141A24C074A7BBB67FB95361F94E169FE878F788E964C883D361
                                                                  APIs
                                                                  • GetShellWindow.USER32 ref: 0534F12D
                                                                  • GetTickCount.KERNEL32 ref: 0534F133
                                                                  • lstrlenW.KERNEL32(?,?,?,?,?,05346694,?,?,?,?,?,?,?,?,0534B8C7), ref: 0534F16D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountShellTickWindowlstrlen
                                                                  • String ID: /chrominance$A consistency check failed.$Error reading tag${Kernel Debugger Awakened}
                                                                  • API String ID: 2562418233-4088426988
                                                                  • Opcode ID: 23131de0892d99e7cde81203a8a1e24468c44cbcb82651e4294624847c2b804c
                                                                  • Instruction ID: 62e4d131af883ebe74fc70e7ea6a6e0836123b379de565c93889ebc08f53a0ff
                                                                  • Opcode Fuzzy Hash: 23131de0892d99e7cde81203a8a1e24468c44cbcb82651e4294624847c2b804c
                                                                  • Instruction Fuzzy Hash: 08F02B6C6040568BD7105F25C46923A7BE5FB46700F88C058E4C38F388EA709846CF52
                                                                  APIs
                                                                  Strings
                                                                  • Indicates that the specified image is already loaded., xrefs: 05352625
                                                                  • WER/CrashAPI:%u: ERROR NtQueryInformationProcess failed 0x%x, xrefs: 05352606
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentDefaultLangLengthMessageSystemTextThreadTimeWindowlstrlen
                                                                  • String ID: Indicates that the specified image is already loaded.$WER/CrashAPI:%u: ERROR NtQueryInformationProcess failed 0x%x
                                                                  • API String ID: 3973347586-578630763
                                                                  • Opcode ID: 0ee49e0abfeb9e48b538ece9748f6722acdff2cb4f5cc0530acbcb3f1b06dcdc
                                                                  • Instruction ID: 9a304824dc50759f48413492dda9813f7f26606efc7233d338a8c4058a3df397
                                                                  • Opcode Fuzzy Hash: 0ee49e0abfeb9e48b538ece9748f6722acdff2cb4f5cc0530acbcb3f1b06dcdc
                                                                  • Instruction Fuzzy Hash: 30E0397C8182168BD7002FA5D85E52A3FBCBB45305F81C81CF9CA8B284DE78884D9B61
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d62b65871c8a8d6ecf518f0fbbce8e7992b657092244c5a54bb64806a31c1f49
                                                                  • Instruction ID: 1b46f98169c2256231b3d193b2ad56f63998f2bbb4174c8f38567e65aa17fdef
                                                                  • Opcode Fuzzy Hash: d62b65871c8a8d6ecf518f0fbbce8e7992b657092244c5a54bb64806a31c1f49
                                                                  • Instruction Fuzzy Hash: 0F61D571600215ABCB14EF64DC96FAE7BA9FF44300F044569FD06EB292DB35AD10CBA4
                                                                  APIs
                                                                  • #412.COMCTL32(?,006245E0,000004D2), ref: 00624610
                                                                  • #413.COMCTL32(?,?,?,?), ref: 0062461E
                                                                  • SendMessageW.USER32(?,00001073,?,?), ref: 00624676
                                                                  • SetBkColor.GDI32(?,00202020), ref: 0062468F
                                                                  • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 006246A7
                                                                  • SetTextColor.GDI32(?,00DDDDDD), ref: 006246B5
                                                                  • SetBkMode.GDI32(?,00000001), ref: 006246BE
                                                                  • DrawTextW.USER32(?,?,000000FF,?,00008824), ref: 006246D6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Text$Color$#412#413DrawMessageModeSend
                                                                  • String ID:
                                                                  • API String ID: 1438310018-0
                                                                  • Opcode ID: 996aec572c765f2308ca187e436005bf55563bdf739a4f9a6227b7df418759d2
                                                                  • Instruction ID: de96a0dda80ba92e489040022713d25c74933c08585a6d3ddc9a7985fe31224f
                                                                  • Opcode Fuzzy Hash: 996aec572c765f2308ca187e436005bf55563bdf739a4f9a6227b7df418759d2
                                                                  • Instruction Fuzzy Hash: 43316B32204715EBD710CF64EC49F9ABBAAFF49711F00061AF950A26D0D7B0A958CBE6
                                                                  APIs
                                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00623579
                                                                  • GetObjectW.GDI32(00000000,?,?), ref: 00623580
                                                                  • lstrcpynW.KERNEL32 ref: 006235A1
                                                                  • CreateFontIndirectW.GDI32(?), ref: 006235AC
                                                                  • GetDC.USER32(?), ref: 006235B5
                                                                  • SetBkMode.GDI32(00000000,00000002), ref: 006235C0
                                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 006235CC
                                                                  • ReleaseDC.USER32(?,00000000), ref: 006235D4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$CreateFontIndirectModeObjectReleaselstrcpyn
                                                                  • String ID:
                                                                  • API String ID: 3096525694-0
                                                                  • Opcode ID: e92979676d07262712528e0bfdba3434d62d64ae5798eaf1778af48650817134
                                                                  • Instruction ID: 34be929ec9f2ad7318b7b70c41c7c4e69957c392485d6f1ab6d1a43a6912dd23
                                                                  • Opcode Fuzzy Hash: e92979676d07262712528e0bfdba3434d62d64ae5798eaf1778af48650817134
                                                                  • Instruction Fuzzy Hash: BE011731144304FBE720EB60AC4DF9B7BEDEB88B62F041919F705961E1D674AA088B76
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: _strrchr
                                                                  • String ID:
                                                                  • API String ID: 3213747228-0
                                                                  • Opcode ID: 418969ae6e46c0b55661fc9f540cf272c5e0b5a421fbc640b1c478988cf86484
                                                                  • Instruction ID: 5d8248e52ff8d1ea105e8c3f2b1d7ef3c4d512fc97adc50c89cdef89ec17b96a
                                                                  • Opcode Fuzzy Hash: 418969ae6e46c0b55661fc9f540cf272c5e0b5a421fbc640b1c478988cf86484
                                                                  • Instruction Fuzzy Hash: 9DB14572A00356AFDB228F64CCA2BEE7BA7EF15310F644155FD44AB382D3749941C7A4
                                                                  APIs
                                                                  • GetMenuItemCount.USER32(?), ref: 005A8B1A
                                                                  • GetMenuItemInfoW.USER32(?,00000000,00000400,?), ref: 005A8B9B
                                                                  • GetMenuItemInfoW.USER32(?,00000000,00000400,00000030), ref: 005A8C0D
                                                                    • Part of subcall function 005A8AF0: SetMenuItemInfoW.USER32(?,?,00000400,00000030), ref: 005A8D32
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ItemMenu$Info$Count
                                                                  • String ID: 0$@
                                                                  • API String ID: 4286743509-1545510068
                                                                  • Opcode ID: 190ae65d6761a524f64e97c714d999d9a4051b6d986fdbb88537d3bb349796c1
                                                                  • Instruction ID: e339300eb7bac5417d1155c32b81471303709321f551218e2c513e5f0848bdc8
                                                                  • Opcode Fuzzy Hash: 190ae65d6761a524f64e97c714d999d9a4051b6d986fdbb88537d3bb349796c1
                                                                  • Instruction Fuzzy Hash: BC716AB1D00219ABDB10DF98D988BAEBBF9FF05310F244159E519AB281DB346A05CFA0
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005A7518
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 005A7564
                                                                  • __Getctype.LIBCPMT ref: 005A757A
                                                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 005A75A6
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005A763B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                  • String ID: bad locale name
                                                                  • API String ID: 1840309910-1405518554
                                                                  • Opcode ID: 7da29a8f4b3f093ebfe1056ef62749dc31761c0cc730dede91b9da72bc575ffb
                                                                  • Instruction ID: 826d730443d44f55ff0c057e339a10974be2f32ab71205871c214c3c218a5d52
                                                                  • Opcode Fuzzy Hash: 7da29a8f4b3f093ebfe1056ef62749dc31761c0cc730dede91b9da72bc575ffb
                                                                  • Instruction Fuzzy Hash: 975170B1D042189BDF50DF99D845B9EBBF9BF19300F188069E909AB341E734DA08CB95
                                                                  APIs
                                                                  • GetDialogBaseUnits.USER32 ref: 053527C3
                                                                  • GetTickCount.KERNEL32 ref: 0535284C
                                                                  • GetLastError.KERNEL32(?,?,?,05349C2F), ref: 053528AA
                                                                  • GetLastActivePopup.USER32 ref: 05352941
                                                                  Strings
                                                                  • AslFileMappingEnsureMappedAs failed [%x], xrefs: 053527D8
                                                                  • WER/CrashAPI:%u: ERROR Final gather block size exceeds limit, xrefs: 05352858, 053528B0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Last$ActiveBaseCountDialogErrorPopupTickUnits
                                                                  • String ID: AslFileMappingEnsureMappedAs failed [%x]$WER/CrashAPI:%u: ERROR Final gather block size exceeds limit
                                                                  • API String ID: 3113536026-921639215
                                                                  • Opcode ID: 890476a3687a482ee00cd650dfdd13c1af5b612f2817ec0b7770a73cc7dda808
                                                                  • Instruction ID: 9a31dee7fbd9006dc64761909d2a45301774d51519e199c27c80bb780ce197cb
                                                                  • Opcode Fuzzy Hash: 890476a3687a482ee00cd650dfdd13c1af5b612f2817ec0b7770a73cc7dda808
                                                                  • Instruction Fuzzy Hash: E451ADB89352018FC706CF78E48AA527FAAF344318F95EA9EF846CF215DB748045CB51
                                                                  APIs
                                                                  • GdipResetPath.GDIPLUS ref: 00625F38
                                                                  • GdipStartPathFigure.GDIPLUS ref: 00625F49
                                                                  • GdipAddPathArcI.GDIPLUS(?,?,?,00000005,00000005), ref: 00625F77
                                                                  • GdipAddPathArcI.GDIPLUS(?,?,?,00000005,00000005,00000005,00000005), ref: 00625FBD
                                                                  • GdipAddPathArcI.GDIPLUS(?,?,?,00000005,00000005,00000005,00000005,00000005,00000005), ref: 00625FF8
                                                                  • GdipAddPathArcI.GDIPLUS(?,?,?,00000005,00000005,00000005,00000005,00000005,00000005,00000005,00000005), ref: 00626027
                                                                  • GdipClosePathFigure.GDIPLUS(?,?,?,?,00000005,00000005,00000005,00000005,00000005,00000005,00000005,00000005), ref: 00626035
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: GdipPath$Figure$CloseResetStart
                                                                  • String ID:
                                                                  • API String ID: 2226062657-0
                                                                  • Opcode ID: 61129bd583e9a830da4d432a45bc68504dc46f0c17125d48671058c38ec4c9fc
                                                                  • Instruction ID: 43985a5befe7a67b45afd0341382619209c71fbb8978de4b34e4bbab9a8ec0c2
                                                                  • Opcode Fuzzy Hash: 61129bd583e9a830da4d432a45bc68504dc46f0c17125d48671058c38ec4c9fc
                                                                  • Instruction Fuzzy Hash: D0412831204601EFCB219F29EE4896ABFF6FB85701F04896DF895D6264E731C924DF62
                                                                  APIs
                                                                  • GetUserDefaultLangID.KERNEL32(?,?,?,05348DEC,00000000), ref: 0534F71A
                                                                  • GetLargePageMinimum.KERNEL32(?,?,?,05348DEC,00000000), ref: 0534F731
                                                                  • GetTopWindow.USER32 ref: 0534F7B3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLangLargeMinimumPageUserWindow
                                                                  • String ID: No security context is available to allow impersonation.$The object does not exist.$Xbox One X
                                                                  • API String ID: 330300774-3044702618
                                                                  • Opcode ID: 56baa20c2ab6919b382a4f4facd1d851bc905f893ba87e62978a965d1cd0652e
                                                                  • Instruction ID: c6831bce8fe2cfefd711d0aa9944628e18318eb3770d6cab7792120a5c02d076
                                                                  • Opcode Fuzzy Hash: 56baa20c2ab6919b382a4f4facd1d851bc905f893ba87e62978a965d1cd0652e
                                                                  • Instruction Fuzzy Hash: A541A0799201428FD754CF29D86616A3FE9F756388BD8C61EF492CF744EA78D4828F10
                                                                  APIs
                                                                  Strings
                                                                  • Calling KernelbasePostInit failed with status 0x%08lx, xrefs: 0534F02E, 0534F0A6
                                                                  • The system file %1 has become corrupt and has been replaced., xrefs: 0534EFEB
                                                                  • Failed to get the string from the database, xrefs: 0534F07B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LargeMinimumPageParent
                                                                  • String ID: Calling KernelbasePostInit failed with status 0x%08lx$Failed to get the string from the database$The system file %1 has become corrupt and has been replaced.
                                                                  • API String ID: 1858583498-2516440567
                                                                  • Opcode ID: 66f9e8671b6cf2af1b56e78d17e5b48bdc636ca2a674374ff2caee64414224f3
                                                                  • Instruction ID: 0e73e744f58a33fddd493d1b96d742a851bd370e7c8d44f3b172accb1bf4cc9c
                                                                  • Opcode Fuzzy Hash: 66f9e8671b6cf2af1b56e78d17e5b48bdc636ca2a674374ff2caee64414224f3
                                                                  • Instruction Fuzzy Hash: E7417C749222428FD714CF38E6566367FEEEB84308F98C49EF4468F345EE7594458B90
                                                                  APIs
                                                                  Strings
                                                                  • Extended error information is available., xrefs: 0534D4C5
                                                                  • NtQueryInformationFile failed [%x], xrefs: 0534D5E8
                                                                  • OptionValue, xrefs: 0534D53C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLangUser
                                                                  • String ID: Extended error information is available.$NtQueryInformationFile failed [%x]$OptionValue
                                                                  • API String ID: 768647712-457629104
                                                                  • Opcode ID: bf187b41569b91a197f06d99ac1d56342495e8eef6a066cc62203550a2f68bc5
                                                                  • Instruction ID: 2b03d0d1d6eefb17a33305470f3a83946ed7b864338b479e4f4e88796b79f986
                                                                  • Opcode Fuzzy Hash: bf187b41569b91a197f06d99ac1d56342495e8eef6a066cc62203550a2f68bc5
                                                                  • Instruction Fuzzy Hash: 21318A709342458EDB05CF25A55A2217FEEF38A30CF94D65EE0928F2A8DF7494528F40
                                                                  APIs
                                                                  Strings
                                                                  • An invalid region for the target was specified, xrefs: 0534F9B1
                                                                  • image/x-wmf, xrefs: 0534FA0E
                                                                  • SdbUnpackQueryResult, xrefs: 0534FA90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountLengthParentTextTickWindow
                                                                  • String ID: An invalid region for the target was specified$SdbUnpackQueryResult$image/x-wmf
                                                                  • API String ID: 3915914195-847515522
                                                                  • Opcode ID: aa9e2519525b0846736800594384596d597e0ae7278cf2b2a19b0053db864e44
                                                                  • Instruction ID: f5c916f4e9ad5e755fc12c8c5038e2203ee9fe3c3b3761599c65c6d226d261f0
                                                                  • Opcode Fuzzy Hash: aa9e2519525b0846736800594384596d597e0ae7278cf2b2a19b0053db864e44
                                                                  • Instruction Fuzzy Hash: 8031C1B4A252429FC709CF28E896615BFEDF789308F98C42EE442CF354EA7494918F84
                                                                  APIs
                                                                  • GetUserDefaultLangID.KERNEL32(0000000B,00000000,?,0534A70D), ref: 0534DA12
                                                                  • GetOEMCP.KERNEL32(?,0534A70D), ref: 0534DA58
                                                                  • GetLastActivePopup.USER32 ref: 0534DA94
                                                                  • GetTopWindow.USER32 ref: 0534DABB
                                                                  Strings
                                                                  • AeGetPersistedLocation failed [%#x], xrefs: 0534DA0A
                                                                  • OnUILanguageAdd, xrefs: 0534DA5E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ActiveDefaultLangLastPopupUserWindow
                                                                  • String ID: AeGetPersistedLocation failed [%#x]$OnUILanguageAdd
                                                                  • API String ID: 2912674099-3659897179
                                                                  • Opcode ID: 3c8b799e03032ab252ccb03f2d060ca26a26873b8640f5e0a608818f730e95f3
                                                                  • Instruction ID: 6cabf5601fa2ababc1c3b657ca114cf36b69ae60143206ad2b42884eb348dbe6
                                                                  • Opcode Fuzzy Hash: 3c8b799e03032ab252ccb03f2d060ca26a26873b8640f5e0a608818f730e95f3
                                                                  • Instruction Fuzzy Hash: EF31A2B5D202019FE308DF6AE5871527FEEF748314F98C4AEF655CF244EA7094428B91
                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,713211A9,?,00646186,?,?,00000000,?), ref: 00646138
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: FreeLibrary
                                                                  • String ID: api-ms-$ext-ms-
                                                                  • API String ID: 3664257935-537541572
                                                                  • Opcode ID: b66681f758bd901fa1bc41f3ef5c5119bf2a2e214a4f288c6cb5b73ba12ade74
                                                                  • Instruction ID: b998302cb3530aa439bbe3ef49ff9e17e08bff3dd6b991e2b6f04a53822b85c5
                                                                  • Opcode Fuzzy Hash: b66681f758bd901fa1bc41f3ef5c5119bf2a2e214a4f288c6cb5b73ba12ade74
                                                                  • Instruction Fuzzy Hash: 9C212431A01311ABCB21DB28EC80ADA776BAF53775F211110F816A73D2DB30EE01C6E2
                                                                  APIs
                                                                  • GetParent.USER32 ref: 0534D6B5
                                                                  • GetUserDefaultLangID.KERNEL32(00000000), ref: 0534D6E4
                                                                  • GetForegroundWindow.USER32 ref: 0534D714
                                                                  Strings
                                                                  • The user/kernel marshalling buffer has overflowed., xrefs: 0534D71F
                                                                  • Nirmala UI, xrefs: 0534D649
                                                                  • TPM 1.2: Unacceptable encryption scheme., xrefs: 0534D670
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultForegroundLangParentUserWindow
                                                                  • String ID: Nirmala UI$TPM 1.2: Unacceptable encryption scheme.$The user/kernel marshalling buffer has overflowed.
                                                                  • API String ID: 2007750773-339840602
                                                                  • Opcode ID: 630ddb319a1af20d5ed73e8ed2bce56506a53df1c1e9ff06a5ca988a3d23e0fd
                                                                  • Instruction ID: d2b142089f3615cfd8c32397c27ef4f41df6f09fe4eda5478e3b055f5714dfdc
                                                                  • Opcode Fuzzy Hash: 630ddb319a1af20d5ed73e8ed2bce56506a53df1c1e9ff06a5ca988a3d23e0fd
                                                                  • Instruction Fuzzy Hash: 0D21E1A5E242508BD3148F74E89A6263FA9F751308F84C86EE606CF394EB79D8408F90
                                                                  APIs
                                                                  Strings
                                                                  • The TDI indication has completed successfully., xrefs: 0535225D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ActiveBaseCurrentDialogLastLengthMessagePopupTextThreadTimeUnitsWindow
                                                                  • String ID: The TDI indication has completed successfully.
                                                                  • API String ID: 206609152-2274360702
                                                                  • Opcode ID: 8f66afa59945de3ec6884aba3a3d1c91ae8c79df53b633127fe5d0f00456dcea
                                                                  • Instruction ID: 2647e73b9a7506050eab5782632239b11a98a0855a96bdd1bf819b5d0507ff4f
                                                                  • Opcode Fuzzy Hash: 8f66afa59945de3ec6884aba3a3d1c91ae8c79df53b633127fe5d0f00456dcea
                                                                  • Instruction Fuzzy Hash: 663112B89242018FC750DF6AE88A5027FEDF748308B94DA6EF549CF214EB7490568FA0
                                                                  APIs
                                                                  Strings
                                                                  • AslEnvGetSysNativeDirPathForGuestBuf, xrefs: 053520CB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ActiveBaseDialogHandleLastLengthModulePopupTextUnitsWindow
                                                                  • String ID: AslEnvGetSysNativeDirPathForGuestBuf
                                                                  • API String ID: 1122648610-2648611450
                                                                  • Opcode ID: 9e9d9550bc92d9f722ae027ca451e434de48432238079225d624b6c50e709207
                                                                  • Instruction ID: e6752c10320ad22340ee6186bd28c5ab971fdb46414230ef49baf3f9ea918a8e
                                                                  • Opcode Fuzzy Hash: 9e9d9550bc92d9f722ae027ca451e434de48432238079225d624b6c50e709207
                                                                  • Instruction Fuzzy Hash: 9721F578A141819BCB009F69D88DA6B7FBEFB45754F14802AF9828F340DA798846CB61
                                                                  APIs
                                                                  • GetWindowTextLengthA.USER32 ref: 0534DC0B
                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0534DC19
                                                                  Strings
                                                                  • The RPC call completed before all pipes were processed., xrefs: 0534DB3D
                                                                  • AslPathIsTemporaryDirectory, xrefs: 0534DC12
                                                                  • 0123456789abcdef, xrefs: 0534DBCB
                                                                  • {Verifying Disk}, xrefs: 0534DB64
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: HandleLengthModuleTextWindow
                                                                  • String ID: 0123456789abcdef$AslPathIsTemporaryDirectory$The RPC call completed before all pipes were processed.${Verifying Disk}
                                                                  • API String ID: 3424440608-2488994354
                                                                  • Opcode ID: 62823ca0657621a289f8ae4e9b980334c83aa6718c22b823c4b708a2cb06292c
                                                                  • Instruction ID: 51b78092d3f796db97ef9de4a8d96589683954b1b417d0c09195f69509142c26
                                                                  • Opcode Fuzzy Hash: 62823ca0657621a289f8ae4e9b980334c83aa6718c22b823c4b708a2cb06292c
                                                                  • Instruction Fuzzy Hash: A8215B74A202418BC715CF79D4D92267FEEF796308F54C46ED142CF38AEA71A4858B91
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000004,00000080,00000000), ref: 005B5747
                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 005B5769
                                                                  • SetEndOfFile.KERNEL32(?), ref: 005B5772
                                                                  • FlushFileBuffers.KERNEL32(?, )f,?), ref: 005B5799
                                                                  • CloseHandle.KERNEL32(00000000), ref: 005B57A0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: File$BuffersCloseCreateFlushHandlePointer
                                                                  • String ID: )f
                                                                  • API String ID: 3397818590-664519796
                                                                  • Opcode ID: 69ab14aa108f250d5d200bc173f62dfb88195f7fe30551a727772545a7d3ec65
                                                                  • Instruction ID: 60bdb474c73fa924a607288f8df2445bf740caf15e16c635e326ae35262db6d4
                                                                  • Opcode Fuzzy Hash: 69ab14aa108f250d5d200bc173f62dfb88195f7fe30551a727772545a7d3ec65
                                                                  • Instruction Fuzzy Hash: A221B471A40B15EBDB21DF58DC05FAEBBB9FB45B21F10421AF911A73D0DBB4690087A0
                                                                  APIs
                                                                  • GetDC.USER32 ref: 005DC263
                                                                  • GetDCEx.USER32(?,?,00000081), ref: 005DC272
                                                                  • GetWindowRect.USER32(?,?), ref: 005DC292
                                                                  • MapWindowPoints.USER32(00000000,?,00000081,00000002), ref: 005DC2A2
                                                                  • SetBkColor.GDI32(00000000,000000FF), ref: 005DC2AE
                                                                  • ExtTextOutW.GDI32(00000000,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 005DC2C6
                                                                  • ReleaseDC.USER32(?,00000000), ref: 005DC2CE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ColorPointsRectReleaseText
                                                                  • String ID:
                                                                  • API String ID: 288212811-0
                                                                  • Opcode ID: cdd7a2021cc3e88a03639213cb982c4aed34438b2e291f789e791e2b7f5b01d6
                                                                  • Instruction ID: 827535fd25e578805bc7f7725eb7f06745080c5ee988b8b848db6e9c0f178bd9
                                                                  • Opcode Fuzzy Hash: cdd7a2021cc3e88a03639213cb982c4aed34438b2e291f789e791e2b7f5b01d6
                                                                  • Instruction Fuzzy Hash: 71018031544301BBE310DB649C0AFAB3BECEB89B12F00852AF645D51C0DBB0590287B6
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32 ref: 053502B1
                                                                  • GetLastActivePopup.USER32(00000000), ref: 053502CC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ActiveHandleLastModulePopup
                                                                  • String ID: Windows$Checking file system on %wZ$The log file has changed between reads.$TimeZoneKeyName
                                                                  • API String ID: 4230660008-443829936
                                                                  • Opcode ID: aae719fe242e586da623845c11a70b154438ca9c7d3368b74d105c6fff7af215
                                                                  • Instruction ID: ee40c9f2f5c1b46c6b92d69de6b79818aa97d9cdd2fd2c5abc755f945fcf664c
                                                                  • Opcode Fuzzy Hash: aae719fe242e586da623845c11a70b154438ca9c7d3368b74d105c6fff7af215
                                                                  • Instruction Fuzzy Hash: 4801F9B8A142458BCB159F68C09D9A9BFF9FB45304F9484ADE987CF344EB75D8028710
                                                                  APIs
                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,713211A9,00000101,?,00000000,0065809B,000000FF,?,0063C825,?,?,0063C7F9,00000101), ref: 0063C87E
                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0063C890
                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,0065809B,000000FF,?,0063C825,?,?,0063C7F9,00000101), ref: 0063C8B2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                  • String ID: 09Z$CorExitProcess$mscoree.dll
                                                                  • API String ID: 4061214504-1248854793
                                                                  • Opcode ID: a4f2fd5c958800f291facdd4a5d11636388888ade1559081788b86eea08a6a14
                                                                  • Instruction ID: c292f5cc74351fc65b20f4570611df1fefa31e6adc4ef0b9bf308db81f2826ea
                                                                  • Opcode Fuzzy Hash: a4f2fd5c958800f291facdd4a5d11636388888ade1559081788b86eea08a6a14
                                                                  • Instruction Fuzzy Hash: FC01A235954725EFDB018F54CC49BEEBBBAFB44B22F000625F812A26E0DB759A04CB90
                                                                  APIs
                                                                  • GetUserDefaultLangID.KERNEL32 ref: 05350361
                                                                  • GetOEMCP.KERNEL32 ref: 0535036F
                                                                  • GetForegroundWindow.USER32 ref: 0535037B
                                                                  • GetSystemDefaultLangID.KERNEL32 ref: 05350394
                                                                  • GetUserDefaultLangID.KERNEL32 ref: 053503AB
                                                                  • GetTopWindow.USER32 ref: 053503B4
                                                                  • GetForegroundWindow.USER32(00000000), ref: 053503C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLangWindow$ForegroundUser$System
                                                                  • String ID:
                                                                  • API String ID: 3104731404-0
                                                                  • Opcode ID: 10c16ff7031b4ab5fa36ffb4de25b6bfd906242386d4978fafc7a348eab4d242
                                                                  • Instruction ID: 1f540bdf81d96487677a358504310277db45b18d4e99b29405c83459dbc576ab
                                                                  • Opcode Fuzzy Hash: 10c16ff7031b4ab5fa36ffb4de25b6bfd906242386d4978fafc7a348eab4d242
                                                                  • Instruction Fuzzy Hash: 21012C759202099BCB00AF69FD8A4467FBCEB55318B80846EF904DB200EE75990A8FA1
                                                                  APIs
                                                                  • GetDialogBaseUnits.USER32 ref: 0535051F
                                                                  • GetCurrentThreadId.KERNEL32 ref: 05350531
                                                                  • GetDesktopWindow.USER32 ref: 0535055D
                                                                  • GetLastError.KERNEL32(?,053473AB), ref: 05350574
                                                                  Strings
                                                                  • The validation process needs to continue on to the next step., xrefs: 05350563
                                                                  • The cluster node is already down., xrefs: 05350537
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: BaseCurrentDesktopDialogErrorLastThreadUnitsWindow
                                                                  • String ID: The cluster node is already down.$The validation process needs to continue on to the next step.
                                                                  • API String ID: 504704107-3347549321
                                                                  • Opcode ID: 447ac476318a5031e96a544eedcb3de07d22391afbe6de0b33a12f204e1b4f76
                                                                  • Instruction ID: 8d7de18a7d32662ad9cd97bfdf28eaeb2d0365043aa0232596182be352b7230f
                                                                  • Opcode Fuzzy Hash: 447ac476318a5031e96a544eedcb3de07d22391afbe6de0b33a12f204e1b4f76
                                                                  • Instruction Fuzzy Hash: B3F02DB4514205CFD7158FB9D8D96567F6CEB01358B60D42EE8458F305D97184498790
                                                                  APIs
                                                                  • __allrem.LIBCMT ref: 0063C137
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0063C153
                                                                  • __allrem.LIBCMT ref: 0063C16A
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0063C188
                                                                  • __allrem.LIBCMT ref: 0063C19F
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0063C1BD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                  • String ID:
                                                                  • API String ID: 1992179935-0
                                                                  • Opcode ID: ed0b14b891f1ca67b06fcb8e2644b0cd8ea197fc79ddaf6f00705ef0a89ee138
                                                                  • Instruction ID: 9416a9a7cbaaff27524384329d3936720916851420240a8584d0e4d9e74655b8
                                                                  • Opcode Fuzzy Hash: ed0b14b891f1ca67b06fcb8e2644b0cd8ea197fc79ddaf6f00705ef0a89ee138
                                                                  • Instruction Fuzzy Hash: 8781E372A007069BE724AE68DC41BABB3EBAF45774F24412EF411E7781E770DA049BD4
                                                                  APIs
                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 005A24E4
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005A255B
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 005A25AA
                                                                  • __Getctype.LIBCPMT ref: 005A25C0
                                                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 005A260A
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005A26A2
                                                                  • __Getwctype.LIBCPMT ref: 005A26D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Locinfo::_Lockit$Concurrency::cancel_current_taskGetctypeGetwctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                  • String ID:
                                                                  • API String ID: 606201873-0
                                                                  • Opcode ID: 973d37ccb8a547f72706dfa7ea7c9b82e33bb266ed7b9d5bbea4513076f8dfe4
                                                                  • Instruction ID: 118b8f94b3f8b27f132ceac957ad4f354bfbf88e8d6f9aa606dd251ac2ad1196
                                                                  • Opcode Fuzzy Hash: 973d37ccb8a547f72706dfa7ea7c9b82e33bb266ed7b9d5bbea4513076f8dfe4
                                                                  • Instruction Fuzzy Hash: 597181B19003199BEB50DFA8D845B9EBBF9BF05304F14416DE9089B341EB75D908CB92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: %s%d$%s\%s%d
                                                                  • API String ID: 0-3353845208
                                                                  • Opcode ID: b55674494c71ac029d1363086ef4c7fdcc70c2a4ec0ad2192b29b95c2851572d
                                                                  • Instruction ID: 1653247752789e861424ef4fe63d876b509fb65c809c03b5eda3021795df701b
                                                                  • Opcode Fuzzy Hash: b55674494c71ac029d1363086ef4c7fdcc70c2a4ec0ad2192b29b95c2851572d
                                                                  • Instruction Fuzzy Hash: E5126C71800219EFDF24DF64C956BEDBBB9FF15304F404559E90A97681E730AA98CFA0
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001,00000000,?,00662189,?,?,bad locale name), ref: 006286FE
                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000), ref: 00628769
                                                                  • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00628786
                                                                  • LCMapStringEx.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,00000000), ref: 006287C5
                                                                  • LCMapStringEx.KERNEL32(00000000,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00628824
                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00628847
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiStringWide
                                                                  • String ID:
                                                                  • API String ID: 2829165498-0
                                                                  • Opcode ID: 5d6083a1f41669bc6826d90c87f16aecb543f48fca4f2a7f7f1d8deb3211ce0d
                                                                  • Instruction ID: 5c424992df4e10ef296ee2d2f1a4b6c3a0b71b80941d34157050f8ea8df0e267
                                                                  • Opcode Fuzzy Hash: 5d6083a1f41669bc6826d90c87f16aecb543f48fca4f2a7f7f1d8deb3211ce0d
                                                                  • Instruction Fuzzy Hash: 4F51AF72911626EFEB209F50EC45FEA7BABEF40740F154428F915A7290DB388D00CFA0
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: _swprintf
                                                                  • String ID: %$+
                                                                  • API String ID: 589789837-2626897407
                                                                  • Opcode ID: bb41a848879b0a8e82e484df7bab555037f35bbec5a168ea261bb95119a5d1f0
                                                                  • Instruction ID: 12aedc3d88048cf9724531ccf3dac46f94ebd2b944f67d2320025c33235eb2a4
                                                                  • Opcode Fuzzy Hash: bb41a848879b0a8e82e484df7bab555037f35bbec5a168ea261bb95119a5d1f0
                                                                  • Instruction Fuzzy Hash: EFD1EE71E001199BDF18DF98DC45BAEBFBAFF8A300F044529F815A7281E7749D548BA1
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(-00000002,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,?,00000000,-00000002), ref: 005B5602
                                                                  • GetFileSize.KERNEL32(00000000,?), ref: 005B5629
                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,-00000002), ref: 005B5660
                                                                  • ReadFile.KERNEL32 ref: 005B5688
                                                                  • CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,-00000002), ref: 005B56AF
                                                                  • CloseHandle.KERNEL32(00000000), ref: 005B56D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CloseFileHandle$CreateReadSize
                                                                  • String ID:
                                                                  • API String ID: 1620663982-0
                                                                  • Opcode ID: ecd109aa791f265848859af6abec1c1650f10314a08697c0db2ca0481df334a5
                                                                  • Instruction ID: f9e7c8074dbd306fe3b2b820df04c2cbdd30cacd179ee8d651981bc59b4ee9b2
                                                                  • Opcode Fuzzy Hash: ecd109aa791f265848859af6abec1c1650f10314a08697c0db2ca0481df334a5
                                                                  • Instruction Fuzzy Hash: FE2126723017016BD720AA28BC49F9BB799EB90732F540636FE10D22D0EB75A90D87B5
                                                                  APIs
                                                                  • GetFileTime.KERNEL32(00000000,?,00000000,00000000), ref: 005B1568
                                                                  • CloseHandle.KERNEL32(00000000), ref: 005B156F
                                                                  • WriteFile.KERNEL32(00000000,?,?,00000000,00000000), ref: 005B15A3
                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000), ref: 005B15AE
                                                                  • SetFileTime.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,00000000), ref: 005B15D1
                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000), ref: 005B15D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CloseFileHandle$Time$Write
                                                                  • String ID:
                                                                  • API String ID: 1785683994-0
                                                                  • Opcode ID: 44a61dfa31e2349650c93508694d38745c0a5849ea0ec26a39f0b901ee4455be
                                                                  • Instruction ID: 955fe3ce138f63167555a55bd0dab8df8f05b4f94a1bb5b4c862784bfb880fce
                                                                  • Opcode Fuzzy Hash: 44a61dfa31e2349650c93508694d38745c0a5849ea0ec26a39f0b901ee4455be
                                                                  • Instruction Fuzzy Hash: 3931E472104711ABE320DF18DC89FDBBBECBB89324F100619FA55961D0D774AA08CBA9
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(?,?,?,071C71C7), ref: 005F5517
                                                                  • LoadStringA.USER32(?,?,?,00000100), ref: 005F55DA
                                                                  • GetStringTypeExA.KERNEL32(?,00000001,00603B05,00000001,?,?,?,071C71C7), ref: 005F570B
                                                                  • LCMapStringA.KERNEL32(?,00000100,?,00000100,?,00000100,?,?,071C71C7), ref: 005F5781
                                                                  Strings
                                                                  • Unable to open message catalog: , xrefs: 005F5838
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: String$Load$LibraryType
                                                                  • String ID: Unable to open message catalog:
                                                                  • API String ID: 2888867733-3361316291
                                                                  • Opcode ID: b978ae4a3dc294db2d61938672d0a54bed83ec642a8816efcc6713e8671cd6d6
                                                                  • Instruction ID: c45abb29eb00da6bc43f9e0dc392ae5a196c649001b09ee7898c643fe228e37e
                                                                  • Opcode Fuzzy Hash: b978ae4a3dc294db2d61938672d0a54bed83ec642a8816efcc6713e8671cd6d6
                                                                  • Instruction Fuzzy Hash: 91C1DF70D016489FCB14CFA8C884BEDBFB9BF45300F548169E655EB292EB799A44CB60
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,?,0062D65F,0062B1D4,0062842D,713211A9,?,?,?,?,00658218,000000FF), ref: 0062D676
                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0062D684
                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0062D69D
                                                                  • SetLastError.KERNEL32(00000000,?,0062D65F,0062B1D4,0062842D,713211A9,?,?,?,?,00658218,000000FF), ref: 0062D6EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastValue___vcrt_
                                                                  • String ID:
                                                                  • API String ID: 3852720340-0
                                                                  • Opcode ID: 67a08072cf3c0b873d4e4aed6e83c38e6c553565431c8ccbe1902ca343b24974
                                                                  • Instruction ID: 99b2a08b1c7d65b3fd8dc4d261a239b9282a124f48e2a94e4734a97b84f1458e
                                                                  • Opcode Fuzzy Hash: 67a08072cf3c0b873d4e4aed6e83c38e6c553565431c8ccbe1902ca343b24974
                                                                  • Instruction Fuzzy Hash: 93018832109F316EE7A426B4BC859663747DB41775F20023EF128451E3FE524E815998
                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(00000000,00000000,00007FFF), ref: 005B3AFE
                                                                  • SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,00000000), ref: 005B3C2B
                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 005B3C67
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectoryFileFolderModuleNamePath
                                                                  • String ID: \bookmarks$\grepWinNP3
                                                                  • API String ID: 486951923-2245591162
                                                                  • Opcode ID: 3650b5ba69aeb597095533dff40e91f2145448e3fc5640ba116215f854a3b415
                                                                  • Instruction ID: eac16793014deaaac586a49ca575dabf0b2991b35f51dd3ce9d707ef3d173ee6
                                                                  • Opcode Fuzzy Hash: 3650b5ba69aeb597095533dff40e91f2145448e3fc5640ba116215f854a3b415
                                                                  • Instruction Fuzzy Hash: 0561D170A006159BCB28DF68D845BAEBFF5FF84710F204A2DE416B7681D770BA44CBA4
                                                                  APIs
                                                                  • CoCreateInstance.OLE32(00659720,00000000,00000001,006597D0,00000000), ref: 005A1234
                                                                  • CoCreateInstance.OLE32(00659720,00000000,00000001,00659780,00000000), ref: 005A1253
                                                                  • GetCursorPos.USER32(00000000), ref: 005A126B
                                                                  • DoDragDrop.OLE32(00000000,00000000,00000003,00000000), ref: 005A12C3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CreateInstance$CursorDragDrop
                                                                  • String ID: T f
                                                                  • API String ID: 1547148105-2778841009
                                                                  • Opcode ID: 1502b08f39e885b99089eb8a60c431e5de476defa69a76d6138410c7f94f9ad3
                                                                  • Instruction ID: ca7797e7fe96b6461dd127d67cb9035eb25a68af07143b730ff5e8f5cfd454bc
                                                                  • Opcode Fuzzy Hash: 1502b08f39e885b99089eb8a60c431e5de476defa69a76d6138410c7f94f9ad3
                                                                  • Instruction Fuzzy Hash: 1F71A974A01A06EFDB10CF95C988BAEBFF5FF4A314F108518E415AB680C7B5E944CBA4
                                                                  APIs
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006451AF
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006452B6
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006452C9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                  • String ID: Pd$Pd
                                                                  • API String ID: 885266447-2097763959
                                                                  • Opcode ID: 6b844ddbba440a3e8d4d75d5f9720e7d55365f42ab0f14bf6c2199260df4a333
                                                                  • Instruction ID: d3b905510c29bde79d8675da7895ad24903515a3883532779acd7c97ac5d9e8e
                                                                  • Opcode Fuzzy Hash: 6b844ddbba440a3e8d4d75d5f9720e7d55365f42ab0f14bf6c2199260df4a333
                                                                  • Instruction Fuzzy Hash: 2D517075A00509EFCF14DF98C841AEFBBB7EF89350F14815AE956A7352D270AE42CB60
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: AdjustPointer
                                                                  • String ID: 09Z
                                                                  • API String ID: 1740715915-1578109394
                                                                  • Opcode ID: 27d921bff46cb73e13a27e09c027c86d80b287d324d08a458e4a1c005c14c27f
                                                                  • Instruction ID: 8df2896adc7fe34bd424d761cb4abc3ed6258f010a349445e8f23771bf949a51
                                                                  • Opcode Fuzzy Hash: 27d921bff46cb73e13a27e09c027c86d80b287d324d08a458e4a1c005c14c27f
                                                                  • Instruction Fuzzy Hash: F851C171A01B26AFEB289F10E841BBA77A6EF50310F14402DE845973D1D739EC81CF90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: f
                                                                  • API String ID: 0-4115541692
                                                                  • Opcode ID: b1864c9927b6de2854fd44747c74e0882fb8765dc026f88a1db7302df20c4fe4
                                                                  • Instruction ID: 0b5f299c51ba0ee0f77e0d73976fd79bcced500e86b5b04b5978ad89bfa61481
                                                                  • Opcode Fuzzy Hash: b1864c9927b6de2854fd44747c74e0882fb8765dc026f88a1db7302df20c4fe4
                                                                  • Instruction Fuzzy Hash: 7A4117B2B00704AFE765AF78DC02B9ABBABEB85710F10852EF551DB381D371A9448780
                                                                  APIs
                                                                  • CreateFileMappingA.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 0062AB65
                                                                  • MapViewOfFileEx.KERNEL32(00000000,?,?,?,00000007,?), ref: 0062ABC8
                                                                    • Part of subcall function 0062B679: RaiseException.KERNEL32(E06D7363,00000001,00000003,006294C0,?,?,?,?,006294C0,?,0067371C), ref: 0062B6D9
                                                                    • Part of subcall function 0062A190: GetLastError.KERNEL32(?,00000001,0062AC22,failed create mapping), ref: 0062A194
                                                                    • Part of subcall function 0062A190: CloseHandle.KERNEL32(00000000,?,00000001,0062AC22,failed create mapping), ref: 0062A1A4
                                                                    • Part of subcall function 0062A190: CloseHandle.KERNEL32(?,?,00000001,0062AC22,failed create mapping), ref: 0062A1B3
                                                                    • Part of subcall function 0062A190: SetLastError.KERNEL32(00000000,?,00000001,0062AC22,failed create mapping), ref: 0062A1BA
                                                                  Strings
                                                                  • failed create mapping, xrefs: 0062AC16
                                                                  • bad numeric conversion: overflow, xrefs: 0062AC60
                                                                  • failed mapping view, xrefs: 0062AC47
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CloseErrorFileHandleLast$CreateExceptionMappingRaiseView
                                                                  • String ID: bad numeric conversion: overflow$failed create mapping$failed mapping view
                                                                  • API String ID: 2473760820-1174817036
                                                                  • Opcode ID: 32bee2568713561a99e97d46acd31833c97f2a950a68c49b1ce63b28032a8366
                                                                  • Instruction ID: 320207e7dc2736205ada2121dc0529025fdea3a0fce6d5eeb706e9920cc13743
                                                                  • Opcode Fuzzy Hash: 32bee2568713561a99e97d46acd31833c97f2a950a68c49b1ce63b28032a8366
                                                                  • Instruction Fuzzy Hash: 80311531A40B199BDB10DFE4EC41BEEB7A7FF48711F14461AF901E2280D7B1A944CEA5
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$Desktop
                                                                  • String ID: AslEnvExpandStrings2$ScriptBreak
                                                                  • API String ID: 2849500299-2721211007
                                                                  • Opcode ID: 5716f55693d047261d92aac3272d57f637e17cd9d2687ca341f1e35410edf8e7
                                                                  • Instruction ID: 87fe2d8ae81dbc9e16d1d3e5815e2fbc84f3d12b696fcbc0244c7d7d9b82cbe5
                                                                  • Opcode Fuzzy Hash: 5716f55693d047261d92aac3272d57f637e17cd9d2687ca341f1e35410edf8e7
                                                                  • Instruction Fuzzy Hash: 50416BB1E202008FDB15CF29EA9A6117FEEF798348F84D12EE4458F359EB75D8218B44
                                                                  APIs
                                                                  Strings
                                                                  • The server received the messages but did not send a reply., xrefs: 0534EAD6
                                                                  • The specified pack is offline., xrefs: 0534EAC9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: BaseCurrentDialogThreadUnitslstrlen
                                                                  • String ID: The server received the messages but did not send a reply.$The specified pack is offline.
                                                                  • API String ID: 1613970765-1132203946
                                                                  • Opcode ID: 5c80dfc6f5167df626f74bf5c03fe4d80e00aaa35283e7189ad04302bc6288d6
                                                                  • Instruction ID: 78bcf04b65ccc0fce8ffc02fb89a6c63680bcd42ba7f774d718cecbfa432d25e
                                                                  • Opcode Fuzzy Hash: 5c80dfc6f5167df626f74bf5c03fe4d80e00aaa35283e7189ad04302bc6288d6
                                                                  • Instruction Fuzzy Hash: F621FD7CE041158BDB205F64C454276BBEEFB44341F84C46AE886CF748EA74A882EB53
                                                                  APIs
                                                                  • GetForegroundWindow.USER32(75BF7910,?,05348D02,00000000), ref: 0534ECB8
                                                                  • GetParent.USER32 ref: 0534ED08
                                                                  • GetLastActivePopup.USER32 ref: 0534ED86
                                                                  Strings
                                                                  • Enclosure awareness is not supported for this virtual disk., xrefs: 0534ED57
                                                                  • AslPathToSystemPathBuf, xrefs: 0534ED0E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ActiveForegroundLastParentPopupWindow
                                                                  • String ID: AslPathToSystemPathBuf$Enclosure awareness is not supported for this virtual disk.
                                                                  • API String ID: 880296319-2013822429
                                                                  • Opcode ID: 28298e6fb55cb984f50361dd68b84b705032fcdecfd10857dcf8936976fc6951
                                                                  • Instruction ID: 6f6323e9ceb11199188b47fc95347544e728b18f0faf23530b97345ba7212aac
                                                                  • Opcode Fuzzy Hash: 28298e6fb55cb984f50361dd68b84b705032fcdecfd10857dcf8936976fc6951
                                                                  • Instruction Fuzzy Hash: 213179B4A312418FD704CF2AE88A2157FEEFB49308B84C96EE459CF344EA749515DF42
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentDesktopErrorLastParentThreadWindow
                                                                  • String ID: vK
                                                                  • API String ID: 3735582752-3317896225
                                                                  • Opcode ID: 8c0a8d808962d6120539e3b4ce94ed12df947890b19d8a06dea62d6b7349e95e
                                                                  • Instruction ID: 3182e528a92aed1c9f318d6e72bfd0338ea5686c614a049283e895e16c5ecd92
                                                                  • Opcode Fuzzy Hash: 8c0a8d808962d6120539e3b4ce94ed12df947890b19d8a06dea62d6b7349e95e
                                                                  • Instruction Fuzzy Hash: 1331C2B5A242018BD750DF69E84A6A67FF9E748328F54D46AEC81CF300DA389480CB91
                                                                  APIs
                                                                  • GetLastActivePopup.USER32 ref: 0534F3C6
                                                                  • GetSystemDefaultLangID.KERNEL32 ref: 0534F45C
                                                                  Strings
                                                                  • GCInterval, xrefs: 0534F3D7
                                                                  • windows blue, xrefs: 0534F41C
                                                                  • WER/Heap:%u: ERROR Arithmetic overflow when aligning block size, xrefs: 0534F361
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ActiveDefaultLangLastPopupSystem
                                                                  • String ID: GCInterval$WER/Heap:%u: ERROR Arithmetic overflow when aligning block size$windows blue
                                                                  • API String ID: 3479583571-1642325539
                                                                  • Opcode ID: ca71850450ed8209ab397e33e3ff468fbaaddbf5fab9dce0a620e74c169a1f31
                                                                  • Instruction ID: fefab9f5aead185f7ee9540a10f5cbb61dd0e1cfeeaeeeccbe949016a8521351
                                                                  • Opcode Fuzzy Hash: ca71850450ed8209ab397e33e3ff468fbaaddbf5fab9dce0a620e74c169a1f31
                                                                  • Instruction Fuzzy Hash: 1E3148B6D312058FD714DF28E8D22613FEDF788308F49C16EE8168F309EA7994008B92
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentThread$MessagePopupTime
                                                                  • String ID: VirtualMemoryThreshold
                                                                  • API String ID: 1332121241-3178925693
                                                                  • Opcode ID: 2ece2d16105f45e5538b9ae4d114b94f347f7f8a4f090143d0f3f8b31f1b88a9
                                                                  • Instruction ID: 47cead4b25504dad6659e6b8bfca9fbcee738aed2b4b50e33e551fdbc9f6507f
                                                                  • Opcode Fuzzy Hash: 2ece2d16105f45e5538b9ae4d114b94f347f7f8a4f090143d0f3f8b31f1b88a9
                                                                  • Instruction Fuzzy Hash: 2D3112B4A202008FCB04CF6AE98A9517FEDFB88708B94C62EF416CF354EAB49455DF41
                                                                  APIs
                                                                  • GetUserDefaultLangID.KERNEL32(?,?,?,0534BD67), ref: 0534E207
                                                                  • GetMessageTime.USER32 ref: 0534E26B
                                                                  Strings
                                                                  • The validation was not successful., xrefs: 0534E2AD
                                                                  • MajorVersion mismatch, MajorVersion 0x%lx Expected 0x%lx, xrefs: 0534E1CF
                                                                  • STATUS_SUCCESS, xrefs: 0534E21F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLangMessageTimeUser
                                                                  • String ID: MajorVersion mismatch, MajorVersion 0x%lx Expected 0x%lx$STATUS_SUCCESS$The validation was not successful.
                                                                  • API String ID: 1049946065-3575248791
                                                                  • Opcode ID: 0e70d63f92ed9222b2bc4dcc2d34a6ba10a4fcee3f6943bedfc391895376b6f3
                                                                  • Instruction ID: c42db193f199925ae213b5e2ddc70f82abc51e61e55e3b25f55360524c54d546
                                                                  • Opcode Fuzzy Hash: 0e70d63f92ed9222b2bc4dcc2d34a6ba10a4fcee3f6943bedfc391895376b6f3
                                                                  • Instruction Fuzzy Hash: 872101B59202418FD344CF69E5961213FEEF799308F98C0AEE465CF246DABE98049B49
                                                                  APIs
                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 005A2B8D
                                                                    • Part of subcall function 0062B679: RaiseException.KERNEL32(E06D7363,00000001,00000003,006294C0,?,?,?,?,006294C0,?,0067371C), ref: 0062B6D9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionRaise___std_exception_copy
                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set$|7g
                                                                  • API String ID: 3109751735-2160263992
                                                                  • Opcode ID: 19d3277679a50dbbfcb5474b684e5a2525becf49f9138a5f74115d310b137aca
                                                                  • Instruction ID: 5060dce7651163cc299506e2ffcf7e6e394c2a1694dab82e10a270c5e3e0af4e
                                                                  • Opcode Fuzzy Hash: 19d3277679a50dbbfcb5474b684e5a2525becf49f9138a5f74115d310b137aca
                                                                  • Instruction Fuzzy Hash: D5110AB29047096FC714DF5CD802B99BBE9FF56310F04852EFA5887681E770E914CBA5
                                                                  APIs
                                                                  • GetLastActivePopup.USER32 ref: 053529EA
                                                                  • GetThreadUILanguage.KERNEL32 ref: 05352A2C
                                                                  Strings
                                                                  • LdrResSearchResource Exit, xrefs: 05352975
                                                                  • SdbpGetProcessHostGuestArchitectures failed [%x], xrefs: 0535299F
                                                                  • The binding handle is invalid., xrefs: 05352A32
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ActiveLanguageLastPopupThread
                                                                  • String ID: LdrResSearchResource Exit$SdbpGetProcessHostGuestArchitectures failed [%x]$The binding handle is invalid.
                                                                  • API String ID: 2119500835-3222778300
                                                                  • Opcode ID: 5792b5ddda2afc7c64c14764f76da158023edf043e6bbf5ebe680cf23a91b5af
                                                                  • Instruction ID: cde82e8393bbc1c6efb7d6010c169de52e89a56d0f048b040df48bb25837f5b1
                                                                  • Opcode Fuzzy Hash: 5792b5ddda2afc7c64c14764f76da158023edf043e6bbf5ebe680cf23a91b5af
                                                                  • Instruction Fuzzy Hash: E12105BCA241404BC7208F28D59662B7FEAE781348B84E56DF886CF348EA748002EB51
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentThreadWindowlstrlen
                                                                  • String ID: The supplied device ID is invalid.$function
                                                                  • API String ID: 582314876-3737079412
                                                                  • Opcode ID: a76497203884fa7100005e34d308ee624f5074f882e9a9599ed97dc51deaff35
                                                                  • Instruction ID: 76431706a1d831184a7510cbc6685942edab7ea33cf3dad2d60b1e5bb8faecf6
                                                                  • Opcode Fuzzy Hash: a76497203884fa7100005e34d308ee624f5074f882e9a9599ed97dc51deaff35
                                                                  • Instruction Fuzzy Hash: C6218EB99202028FC300DF29A8569667FAAF750328FD5E25DF592CF25ADB748046CB52
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(?,?,00000000,?,05349B45), ref: 05352FEC
                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 05353027
                                                                  Strings
                                                                  • Directory Service cannot start., xrefs: 05352FAA
                                                                  • A mapped section could not be extended., xrefs: 05352FC3
                                                                  • The specified volume is offline., xrefs: 05352F71
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LengthTextWindowlstrlen
                                                                  • String ID: A mapped section could not be extended.$Directory Service cannot start.$The specified volume is offline.
                                                                  • API String ID: 3761700447-438102289
                                                                  • Opcode ID: c2ef91320ff220327b30e0ad4a1a2ddf614bef49a1d3a1fcd6b3aabcdf8a02d5
                                                                  • Instruction ID: ff70d409fc85e7a05f134583ababb74c3593d8cccda03e2bb6b33dd3103968a3
                                                                  • Opcode Fuzzy Hash: c2ef91320ff220327b30e0ad4a1a2ddf614bef49a1d3a1fcd6b3aabcdf8a02d5
                                                                  • Instruction Fuzzy Hash: 802159B5A302018BC704DF79E896516BFEEF759318F84C66EF8468F349EB7084008B61
                                                                  APIs
                                                                  Strings
                                                                  • The proximity domain information is invalid., xrefs: 05351E9A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Thread$CurrentLanguageLengthTextWindowlstrlen
                                                                  • String ID: The proximity domain information is invalid.
                                                                  • API String ID: 1355267480-2565701227
                                                                  • Opcode ID: 94f0a52fce94cf4c9acadf4722bde81b8460a11fece67f6405f492e87fef28c5
                                                                  • Instruction ID: 4f24e22f2bfc67d9ac301c7726ab6eb110e16c1ff1646643ed2edc5218decea7
                                                                  • Opcode Fuzzy Hash: 94f0a52fce94cf4c9acadf4722bde81b8460a11fece67f6405f492e87fef28c5
                                                                  • Instruction Fuzzy Hash: 8C01A77C6041028BDB206F6AC485A6BFB7AFB49751B44C139EDC28F748EA744882D726
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 006268C7
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 006268D2
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00626940
                                                                    • Part of subcall function 00626A23: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00626A3B
                                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 006268ED
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                                  • String ID: 09Z
                                                                  • API String ID: 677527491-1578109394
                                                                  • Opcode ID: 15ed965ce7516ae188e255c1c3b363f26af885397ce048b962f4e6f2eed09306
                                                                  • Instruction ID: d8b9c1be6fa80f4a6c62ac2b3448a8b16ce92856d43c16aca0277e5c98d8b76d
                                                                  • Opcode Fuzzy Hash: 15ed965ce7516ae188e255c1c3b363f26af885397ce048b962f4e6f2eed09306
                                                                  • Instruction Fuzzy Hash: 420148B5A009219BDB0AEB20E8555BD7BB3EF85340B24400DF80167391DF786A46CFA9
                                                                  APIs
                                                                  • GetOEMCP.KERNEL32(?,?,0000000B,?,0534A7B3), ref: 0534F30D
                                                                  • GetOEMCP.KERNEL32(?,?,0000000B,?,0534A7B3), ref: 0534F30F
                                                                  • GetOEMCP.KERNEL32(?,?,0000000B,?,0534A7B3), ref: 0534F32D
                                                                  • GetParent.USER32 ref: 0534F349
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Parent
                                                                  • String ID: GlobalFlag
                                                                  • API String ID: 975332729-4289803471
                                                                  • Opcode ID: cba0d5557ae9a48056a90bd475d4c5c25097d7fdfa59b26ff32dd2a6e767665f
                                                                  • Instruction ID: dc61b08b4f25be23a8634e4659ea52732ab0beb8ad3086d3b104cee778cc18cc
                                                                  • Opcode Fuzzy Hash: cba0d5557ae9a48056a90bd475d4c5c25097d7fdfa59b26ff32dd2a6e767665f
                                                                  • Instruction Fuzzy Hash: B3F05CA15041429FCB00FBB5C88963D7BE8BB04300F4C8468E083CB3C2D538E8418F21
                                                                  APIs
                                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 005B26A2
                                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,000A00BC,00000007,00000000,00000000), ref: 005B2726
                                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 005B274D
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000), ref: 005B27E4
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000007,00000000,00000000), ref: 005B2848
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide
                                                                  • String ID:
                                                                  • API String ID: 626452242-0
                                                                  • Opcode ID: e693d9f71bb1152be36973af4318e53df4419fa438590360e0cade2118f18e00
                                                                  • Instruction ID: b7ac26acc6ec147490466032bd16560350a7805236bfc8cec2533230e340bec0
                                                                  • Opcode Fuzzy Hash: e693d9f71bb1152be36973af4318e53df4419fa438590360e0cade2118f18e00
                                                                  • Instruction Fuzzy Hash: BCF173B1A01616AFDB24DF54DC42BAA7BA5FF44700F240529F911EB285EB30F914CBB5
                                                                  APIs
                                                                  • IsDlgButtonChecked.USER32(?,00000426), ref: 005BF043
                                                                  • EndDialog.USER32(?,?), ref: 005BF06F
                                                                  • SetDlgItemTextW.USER32(?,0000040D,?), ref: 005BF145
                                                                  • GetDlgItem.USER32(?,0000040D), ref: 005BF151
                                                                  • SetFocus.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,00653795,000000FF), ref: 005BF158
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Item$ButtonCheckedDialogFocusText
                                                                  • String ID:
                                                                  • API String ID: 3578702649-0
                                                                  • Opcode ID: 064d35bf1517e03d8726d20bb84e026190a2a2012466ae002adddfb34fe009fc
                                                                  • Instruction ID: eaa1c8ebc8e3b32774d521338d6e3628481861ff30190ad17aed1b2d7592298f
                                                                  • Opcode Fuzzy Hash: 064d35bf1517e03d8726d20bb84e026190a2a2012466ae002adddfb34fe009fc
                                                                  • Instruction Fuzzy Hash: 8D51F77190061ABBCB14EF68DC49BAEBBA6FF44310F004629F80697791DB35BD11CBA4
                                                                  APIs
                                                                  • GetCurrentThreadId.KERNEL32 ref: 006273D5
                                                                  • AcquireSRWLockExclusive.KERNEL32(0067B2C0), ref: 006273F4
                                                                  • AcquireSRWLockExclusive.KERNEL32(0067B2C0,00000000,00000000), ref: 00627422
                                                                  • TryAcquireSRWLockExclusive.KERNEL32(0067B2C0,00000000,00000000), ref: 0062747D
                                                                  • TryAcquireSRWLockExclusive.KERNEL32(0067B2C0,00000000,00000000), ref: 00627494
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: AcquireExclusiveLock$CurrentThread
                                                                  • String ID:
                                                                  • API String ID: 66001078-0
                                                                  • Opcode ID: b5ab3ae1b3248be82f3bb84c61788c5e357e5faabf44f51a604f8281e389ae72
                                                                  • Instruction ID: 986e786ed4cf0348ebd4394002e1779e9fc113bf6d7903bb91ecfa765647e279
                                                                  • Opcode Fuzzy Hash: b5ab3ae1b3248be82f3bb84c61788c5e357e5faabf44f51a604f8281e389ae72
                                                                  • Instruction Fuzzy Hash: 91416C31508E2ADBCB20EF64E580DAABBF6FF04311B204529D44AC7A40D730F985CFA4
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005ABA83
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005ABAA6
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005ABAC6
                                                                  • std::_Facet_Register.LIBCPMT ref: 005ABB3B
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005ABB53
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                  • String ID:
                                                                  • API String ID: 459529453-0
                                                                  • Opcode ID: f199b7f50dc79f9d1da19d2bce2bd34d92639aebee7185c4047dfc98c68f0bb1
                                                                  • Instruction ID: 7be80f327d6fae0908e631cc42251698038ada1c722688f0e98c633563a75cae
                                                                  • Opcode Fuzzy Hash: f199b7f50dc79f9d1da19d2bce2bd34d92639aebee7185c4047dfc98c68f0bb1
                                                                  • Instruction Fuzzy Hash: 6831B27590062ACFDB25DF58E880BAEBBB6FF45720F144659E80967352DB30AD40CBE1
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005A5E83
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005A5EA6
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005A5EC6
                                                                  • std::_Facet_Register.LIBCPMT ref: 005A5F3B
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005A5F53
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                  • String ID:
                                                                  • API String ID: 459529453-0
                                                                  • Opcode ID: 4ad269f89eef5a96d133272f9ad4d632f66774dd82507da709bc00d20af8da16
                                                                  • Instruction ID: 3baa3579203f0ca71d81a7cbf45da5a6132ca87f036867f276b5d6a07bb93171
                                                                  • Opcode Fuzzy Hash: 4ad269f89eef5a96d133272f9ad4d632f66774dd82507da709bc00d20af8da16
                                                                  • Instruction Fuzzy Hash: DF31CFB5900A25CFCB15CF54E880BAEBBB5FB45720F144659E80967391EB30AE84CFD0
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005A5FA3
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005A5FC6
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005A5FE6
                                                                  • std::_Facet_Register.LIBCPMT ref: 005A605B
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005A6073
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                  • String ID:
                                                                  • API String ID: 459529453-0
                                                                  • Opcode ID: 94fdeeda621ecd044afb4a1a25d3be833122318bb0bdf1b3bbb3f049e07a60d2
                                                                  • Instruction ID: 992a7bd573f7e96262725e574aaf528a664330631a50dfa70ca3bf0e4995a4b9
                                                                  • Opcode Fuzzy Hash: 94fdeeda621ecd044afb4a1a25d3be833122318bb0bdf1b3bbb3f049e07a60d2
                                                                  • Instruction Fuzzy Hash: FE31AD71800616CFCB25CF54E889BAEBBB2FF45324F18465AE815A7251D730AD81CFE1
                                                                  APIs
                                                                  • SendMessageW.USER32(?,00008003,?,FFFFFFFF), ref: 005EDA7B
                                                                  • SendMessageW.USER32(?,00008004,00000000,00000000), ref: 005EDAD0
                                                                  • GetCursorPos.USER32(?), ref: 005EDAD7
                                                                  • SetCursorPos.USER32(?,?), ref: 005EDAE5
                                                                  • PostMessageW.USER32(?,00008005,00000000,00000000), ref: 005EDB05
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Message$CursorSend$Post
                                                                  • String ID:
                                                                  • API String ID: 1374786658-0
                                                                  • Opcode ID: d3c8e847336cac4c696e735d342bb9d95e7f56409ce29e7799a197216d28deb2
                                                                  • Instruction ID: 55b5ef42ac50201d1ff2e605e12754a62776eb817611c75269e779330bbc07ec
                                                                  • Opcode Fuzzy Hash: d3c8e847336cac4c696e735d342bb9d95e7f56409ce29e7799a197216d28deb2
                                                                  • Instruction Fuzzy Hash: 2B31F731604341EBDB24DF26DC0AF1ABBA6BF41721F10862DF5A8971E0EB709915CF66
                                                                  APIs
                                                                  • PathIsRootW.SHLWAPI ref: 005AD7C3
                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 005AD7DF
                                                                  • GetLastError.KERNEL32(?,00000000), ref: 005AD7EB
                                                                  • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000000), ref: 005AD82D
                                                                  • Sleep.KERNEL32(00000032,?,00000000,?,?,00000000), ref: 005AD83B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectory$ErrorLastPathRootSleep
                                                                  • String ID:
                                                                  • API String ID: 1188401217-0
                                                                  • Opcode ID: 49d7f9aa34df141e0a34f4b1983ba96f12d7abae2a0f0b34f8911b05c2520b65
                                                                  • Instruction ID: 357db01a1309fa23fe7067dc12548a17c74101800cad01113004f0ee54b5b7e9
                                                                  • Opcode Fuzzy Hash: 49d7f9aa34df141e0a34f4b1983ba96f12d7abae2a0f0b34f8911b05c2520b65
                                                                  • Instruction Fuzzy Hash: 4721C471A40706DBCB21EF589849B6DB7F9FB86B11F10051DE85687B80DB349D04CBB0
                                                                  APIs
                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 005F0E2D
                                                                  • GetTimeZoneInformation.KERNEL32(00676D38), ref: 005F0E41
                                                                  • SystemTimeToTzSpecificLocalTime.KERNEL32(00676D38,?,?), ref: 005F0E56
                                                                  • GetDateFormatW.KERNEL32(00000400,00000001,?,00000000,?,00000064), ref: 005F0E99
                                                                  • GetTimeFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000064), ref: 005F0EB7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Time$FormatSystem$DateFileInformationLocalSpecificZone
                                                                  • String ID:
                                                                  • API String ID: 2901416390-0
                                                                  • Opcode ID: d0843d67abe59d52c4ed05ac600d74008de835a30f00670b2491d6769f9ace8c
                                                                  • Instruction ID: c2f13d46f3b7a5bda88616f9cdbf63cf29e9f90f4f4e1c40bdb48374ae9a766c
                                                                  • Opcode Fuzzy Hash: d0843d67abe59d52c4ed05ac600d74008de835a30f00670b2491d6769f9ace8c
                                                                  • Instruction Fuzzy Hash: DD218171284719BBE320DB60DC06FEA779E9F44B10F004915BB54A60D0EBB1951887A6
                                                                  APIs
                                                                    • Part of subcall function 05350008: GetCurrentThreadId.KERNEL32 ref: 05350064
                                                                    • Part of subcall function 05350008: GetLastError.KERNEL32(?,00000000,?,0534AE8A), ref: 0535007E
                                                                    • Part of subcall function 05350008: GetLastActivePopup.USER32 ref: 053500F6
                                                                    • Part of subcall function 05350008: GetModuleHandleW.KERNEL32(00000000,?,0534AE8A), ref: 05350134
                                                                    • Part of subcall function 05350008: GetLargePageMinimum.KERNEL32(?,?,0534AE8A), ref: 05350177
                                                                  • GetThreadUILanguage.KERNEL32 ref: 0534AE8A
                                                                  • GetDialogBaseUnits.USER32 ref: 0534AEA5
                                                                    • Part of subcall function 0534FC94: AnyPopup.USER32 ref: 0534FCEE
                                                                    • Part of subcall function 0534FC94: GetSystemDefaultLangID.KERNEL32(?,0534AEB0), ref: 0534FD25
                                                                    • Part of subcall function 0534FC94: GetTopWindow.USER32 ref: 0534FD53
                                                                  • GetLastActivePopup.USER32 ref: 0534AF0C
                                                                  • GetDesktopWindow.USER32 ref: 0534AF1D
                                                                  • GetOEMCP.KERNEL32 ref: 0534AF23
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LastPopup$ActiveThreadWindow$BaseCurrentDefaultDesktopDialogErrorHandleLangLanguageLargeMinimumModulePageSystemUnits
                                                                  • String ID:
                                                                  • API String ID: 1843500158-0
                                                                  • Opcode ID: df11a738403c00f17cbb17020de0f796114aaf747bc3d487c1a7d1eaae6ec627
                                                                  • Instruction ID: 76bed4fce881547bf8789015e9100588e221269e12d661dcc2acb50a8b09c2c7
                                                                  • Opcode Fuzzy Hash: df11a738403c00f17cbb17020de0f796114aaf747bc3d487c1a7d1eaae6ec627
                                                                  • Instruction Fuzzy Hash: 5A217C719B12048BD710DF69E88A65A7FEEFB44314F44C16AF9498B240EB349844CF91
                                                                  APIs
                                                                    • Part of subcall function 005F54B0: LoadLibraryA.KERNEL32(?,?,?,071C71C7), ref: 005F5517
                                                                    • Part of subcall function 005F54B0: LoadStringA.USER32(?,?,?,00000100), ref: 005F55DA
                                                                  • LoadLibraryA.KERNEL32(?,?,?,071C71C7), ref: 00603BCC
                                                                  • LoadStringA.USER32(?,000000C8,?,00000100), ref: 00603CA1
                                                                  • LoadStringA.USER32(?,0000012C,?,00000100), ref: 00603E88
                                                                    • Part of subcall function 00628A29: AcquireSRWLockExclusive.KERNEL32(0067A12C,00000000,?,?,005AFA33,0067B250,0067B1DC,?,00000003,005F50B5,?,?), ref: 00628A34
                                                                    • Part of subcall function 00628A29: ReleaseSRWLockExclusive.KERNEL32(0067A12C,?,005AFA33,0067B250,0067B1DC,?,00000003,005F50B5,?,?), ref: 00628A6E
                                                                    • Part of subcall function 006289D8: AcquireSRWLockExclusive.KERNEL32(0067A12C,?,?,005AFA49,0067B250,00000003), ref: 006289E2
                                                                    • Part of subcall function 006289D8: ReleaseSRWLockExclusive.KERNEL32(0067A12C,?,005AFA49,0067B250,00000003), ref: 00628A15
                                                                    • Part of subcall function 006289D8: WakeAllConditionVariable.KERNEL32(0067A128,?,005AFA49,0067B250,00000003), ref: 00628A20
                                                                  Strings
                                                                  • Unable to open message catalog: , xrefs: 00603FD3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Load$ExclusiveLock$String$AcquireLibraryRelease$ConditionVariableWake
                                                                  • String ID: Unable to open message catalog:
                                                                  • API String ID: 941639143-3361316291
                                                                  • Opcode ID: f793142ca1e0725ccc0588a799e098c76520213c009dc4901b6666f3bc8913f2
                                                                  • Instruction ID: f30ca9e3a3af74fe415d90326432ab217e735a3289f14c190d5e005c15bb9391
                                                                  • Opcode Fuzzy Hash: f793142ca1e0725ccc0588a799e098c76520213c009dc4901b6666f3bc8913f2
                                                                  • Instruction Fuzzy Hash: C802B0B1900258DFCB18CF68C8847DEBBEABF09304F14816AF9599B392D7759A44CF91
                                                                  APIs
                                                                    • Part of subcall function 005D1A20: LoadLibraryA.KERNEL32(-000000CA), ref: 005D1AB7
                                                                  • LoadLibraryA.KERNEL32(-00000024), ref: 005CB9D5
                                                                    • Part of subcall function 006289D8: AcquireSRWLockExclusive.KERNEL32(0067A12C,?,?,005AFA49,0067B250,00000003), ref: 006289E2
                                                                    • Part of subcall function 006289D8: ReleaseSRWLockExclusive.KERNEL32(0067A12C,?,005AFA49,0067B250,00000003), ref: 00628A15
                                                                    • Part of subcall function 006289D8: WakeAllConditionVariable.KERNEL32(0067A128,?,005AFA49,0067B250,00000003), ref: 00628A20
                                                                  • LoadStringW.USER32(?,000000C8,-0000023C,00000100), ref: 005CBAE2
                                                                  • LoadStringW.USER32(?,0000012C,-0000023C,00000100), ref: 005CBC76
                                                                    • Part of subcall function 005A1E40: ___std_exception_copy.LIBVCRUNTIME ref: 005A1E71
                                                                  Strings
                                                                  • Unable to open message catalog: , xrefs: 005CBD97
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Load$ExclusiveLibraryLockString$AcquireConditionReleaseVariableWake___std_exception_copy
                                                                  • String ID: Unable to open message catalog:
                                                                  • API String ID: 783877595-3361316291
                                                                  • Opcode ID: 7c6887245e5479c5825cbc05ddfc996cc8135dcbaa7a8fa91734c086330cb5ac
                                                                  • Instruction ID: 68bcb6bf370518e064c9f13e2638ae2eef6eba76ba377b573a6bf6376a97c1fe
                                                                  • Opcode Fuzzy Hash: 7c6887245e5479c5825cbc05ddfc996cc8135dcbaa7a8fa91734c086330cb5ac
                                                                  • Instruction Fuzzy Hash: 49F18771900248DFDB14DFA8C885BDE7FE5BF08304F14816EE9199B292EB759A44CF91
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: __freea
                                                                  • String ID: a/p$am/pm
                                                                  • API String ID: 240046367-3206640213
                                                                  • Opcode ID: eb9c49b6d488e6469df1eb86edbba10d9452b54521d62f4e7b1fce55700bdd90
                                                                  • Instruction ID: e583ff43b5580633331aea21db911513ad358c0afb6fb6b364363d803990f416
                                                                  • Opcode Fuzzy Hash: eb9c49b6d488e6469df1eb86edbba10d9452b54521d62f4e7b1fce55700bdd90
                                                                  • Instruction Fuzzy Hash: B6C1FF74A04216DBCB249F68EA95BFAB7B3FF46300F144159E802AB390D3319E42CBD5
                                                                  APIs
                                                                  • GetTopWindow.USER32 ref: 053466A6
                                                                  • GetOEMCP.KERNEL32(?,?,?,?,?,?,?,?,0534B8C7), ref: 053466BC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window
                                                                  • String ID: An invalid volume label has been specified.$Specified gamma ramp is invalid.
                                                                  • API String ID: 2353593579-1471136984
                                                                  • Opcode ID: 1dc04799c7ae8e143ed31f5b865cecfa8f92a4cba4cec0d6ba7a1239abb89bce
                                                                  • Instruction ID: 94113a7326629a4c60eb630486a240f6b3b6e45924b6ea5a57723ca5d8909e41
                                                                  • Opcode Fuzzy Hash: 1dc04799c7ae8e143ed31f5b865cecfa8f92a4cba4cec0d6ba7a1239abb89bce
                                                                  • Instruction Fuzzy Hash: 1A51AEB4A283428FD741CF38D587216BFEAFB4A318F90C51EE4958F214EB3894518F56
                                                                  APIs
                                                                  • EncodePointer.KERNEL32(00000000,?), ref: 0062DDA0
                                                                  • CatchIt.LIBVCRUNTIME ref: 0062DE86
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CatchEncodePointer
                                                                  • String ID: MOC$RCC
                                                                  • API String ID: 1435073870-2084237596
                                                                  • Opcode ID: 003c3696d79e2bfd643d0d9d2bd7d4fa0d6fe27571647d52942544293a352667
                                                                  • Instruction ID: 95860b9abbb5fe477f4e1110148025a7ab9e34706a0b41b463e340379be96088
                                                                  • Opcode Fuzzy Hash: 003c3696d79e2bfd643d0d9d2bd7d4fa0d6fe27571647d52942544293a352667
                                                                  • Instruction Fuzzy Hash: AF418A71900619AFCF15DF94DD81AEEBBB6FF48304F158059F9186B211D3359950CF51
                                                                  APIs
                                                                  Strings
                                                                  • The cluster node has been poisoned., xrefs: 05351E0D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$ErrorLast
                                                                  • String ID: The cluster node has been poisoned.
                                                                  • API String ID: 531141135-1625712938
                                                                  • Opcode ID: 3b75e1fcb7961082df789bf0deb45ecef25f2f31d0d9b9a6857fe772f688e6e2
                                                                  • Instruction ID: dcdaad710cd3e60e097b9c2ba976c0b4b0c5ae5218701d5737a7688bf72b594d
                                                                  • Opcode Fuzzy Hash: 3b75e1fcb7961082df789bf0deb45ecef25f2f31d0d9b9a6857fe772f688e6e2
                                                                  • Instruction Fuzzy Hash: 2E31D0B69312048ECB15DF38DA4A6557FEDF788318F94C62EE844CF265EB78C4509B90
                                                                  APIs
                                                                  • GetDialogBaseUnits.USER32 ref: 0534F194
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0534F1B3
                                                                  Strings
                                                                  • A device was removed so enumeration must be restarted., xrefs: 0534F1F0
                                                                  • TPM 1.2: Authentication failed., xrefs: 0534F23B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: BaseCurrentDialogThreadUnits
                                                                  • String ID: A device was removed so enumeration must be restarted.$TPM 1.2: Authentication failed.
                                                                  • API String ID: 4123241832-380985876
                                                                  • Opcode ID: 369bf93eea17dc3a61ea2ebda9ac34e65f04064eaba23b16bc1d93e86dc95b1f
                                                                  • Instruction ID: 04f62b5a17e00be65710f9ce6ad585a8fcee50733e80c01e3b536562ca87eaf2
                                                                  • Opcode Fuzzy Hash: 369bf93eea17dc3a61ea2ebda9ac34e65f04064eaba23b16bc1d93e86dc95b1f
                                                                  • Instruction Fuzzy Hash: 9F21D2799352028FD705CF39EA8A6513FEEF764308B88C0AEE4458F718EBB99445CB51
                                                                  APIs
                                                                  • AnyPopup.USER32 ref: 0534FCEE
                                                                  • GetSystemDefaultLangID.KERNEL32(?,0534AEB0), ref: 0534FD25
                                                                  • GetTopWindow.USER32 ref: 0534FD53
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLangPopupSystemWindow
                                                                  • String ID: Stick PC
                                                                  • API String ID: 2971084555-3603036135
                                                                  • Opcode ID: b7eda424d009f20b9fbdd086ab6b713b287019ea7d13b0fc926734d681e4de7a
                                                                  • Instruction ID: d520d8459065bfe2520e4dd056fca7139543951e8d92ec8269e1c6044f6c7049
                                                                  • Opcode Fuzzy Hash: b7eda424d009f20b9fbdd086ab6b713b287019ea7d13b0fc926734d681e4de7a
                                                                  • Instruction Fuzzy Hash: 2B217AB59311008BCB058F39E88A1953FEEF74831CFC4C66EE949CE254EB3584158F81
                                                                  APIs
                                                                  • GetLargePageMinimum.KERNEL32(00001103,00000001,?,0534CEDD,?,?,?,0534B33B), ref: 0534E936
                                                                  • GetSystemDefaultLangID.KERNEL32(00001103,00000001,?,0534CEDD,?,?,?,0534B33B), ref: 0534E99C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLangLargeMinimumPageSystem
                                                                  • String ID: The Platform Manifest file was not authorized on this machine.$The volume must undergo garbage collection.
                                                                  • API String ID: 3676040673-3218441631
                                                                  • Opcode ID: 96b080c743f78cd4364d71c8afd738ae4cd89d231b09f6f1a493ae249c6cffc3
                                                                  • Instruction ID: e97b8bc648d9d0ac55e547e4c2ca04a8c36ff3c32d4a2cf8b0a583852f4d4db5
                                                                  • Opcode Fuzzy Hash: 96b080c743f78cd4364d71c8afd738ae4cd89d231b09f6f1a493ae249c6cffc3
                                                                  • Instruction Fuzzy Hash: 54213B399342428FDF82CF28D0996367FEEF79230CB94C08ED0964F65AD6796416DB81
                                                                  APIs
                                                                  • GetOEMCP.KERNEL32(00000032,?,?,053492A9), ref: 0534C05B
                                                                  Strings
                                                                  • SdbpGetProcessHostGuestArchitectures failed [%x], xrefs: 0534C090
                                                                  • Maker Board, xrefs: 0534C088
                                                                  • Can't get the name string, xrefs: 0534C009
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Can't get the name string$Maker Board$SdbpGetProcessHostGuestArchitectures failed [%x]
                                                                  • API String ID: 0-4055452779
                                                                  • Opcode ID: d0c438a0f0d7ea5590d61e90d28d2c5680cf565c66cbf4a34af429b0b4cfe792
                                                                  • Instruction ID: e6550b7beb3c396f86ed3042b525b25568d62fc846d0000c703793b8913c662b
                                                                  • Opcode Fuzzy Hash: d0c438a0f0d7ea5590d61e90d28d2c5680cf565c66cbf4a34af429b0b4cfe792
                                                                  • Instruction Fuzzy Hash: A1219AB59292068FC700DF38D487626BFE9FB40358F44A42EE589CF255E775E8008F56
                                                                  APIs
                                                                  • GetOEMCP.KERNEL32(?,?,?,0534B04D), ref: 0534E0DE
                                                                  • GetTickCount.KERNEL32 ref: 0534E102
                                                                  • GetDesktopWindow.USER32 ref: 0534E108
                                                                  Strings
                                                                  • TermsrvUpdateAllUserMenu, xrefs: 0534E0EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountDesktopTickWindow
                                                                  • String ID: TermsrvUpdateAllUserMenu
                                                                  • API String ID: 1610731074-1499210260
                                                                  • Opcode ID: 2bcabbe9706788dfd34992dfa9a1ea862a993186f69313bc170c13feb589df1e
                                                                  • Instruction ID: 4dea72ecc540f76f3b4a8b3435085e4bbc80d52de7a2459c57d3d9a769528cef
                                                                  • Opcode Fuzzy Hash: 2bcabbe9706788dfd34992dfa9a1ea862a993186f69313bc170c13feb589df1e
                                                                  • Instruction Fuzzy Hash: 710126395041018BDB309F2AD4842B7BFEEFB45351B448056F8A68F704EA70A482EE13
                                                                  APIs
                                                                  • SetLastError.KERNEL32(80040007,00000000,0059BD0C), ref: 0059A4F0
                                                                  • SystemParametersInfoW.USER32(00000042,0000000C,?,00000000), ref: 0059A519
                                                                  • GetProcAddress.KERNEL32(0000000C,DwmIsCompositionEnabled), ref: 0059A526
                                                                  Strings
                                                                  • DwmIsCompositionEnabled, xrefs: 0059A51F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: AddressErrorInfoLastParametersProcSystem
                                                                  • String ID: DwmIsCompositionEnabled
                                                                  • API String ID: 32703461-3099646739
                                                                  • Opcode ID: 046a4cd6326990c3c2be8928b587d63d80da64c890ce8fac9d87fb5db3960360
                                                                  • Instruction ID: e0571ad67ff38e42a66fc6a5608e146d00ea193615001dbfed71685ea007fa5d
                                                                  • Opcode Fuzzy Hash: 046a4cd6326990c3c2be8928b587d63d80da64c890ce8fac9d87fb5db3960360
                                                                  • Instruction Fuzzy Hash: 60018F70514302ABEF20AF28DD08BA7BFD4BF44304F44992DB88C95191E7B9C984C6A3
                                                                  APIs
                                                                  • UnmapViewOfFile.KERNEL32(00000000,?,00000000,00000000), ref: 0062A35C
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0062A36A
                                                                  • CloseHandle.KERNEL32(?), ref: 0062A384
                                                                  Strings
                                                                  • failed closing mapped file, xrefs: 0062A3A7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$FileUnmapView
                                                                  • String ID: failed closing mapped file
                                                                  • API String ID: 260491571-752119354
                                                                  • Opcode ID: 6ccd8b8f90d7411ab64f29347ed1e2bd9d777f4f04e755e4b61df885cf3f9da0
                                                                  • Instruction ID: a18b26770fc2338b2ff44601d91191f10d6165fdafbe68124ecda8ec8e4b4189
                                                                  • Opcode Fuzzy Hash: 6ccd8b8f90d7411ab64f29347ed1e2bd9d777f4f04e755e4b61df885cf3f9da0
                                                                  • Instruction Fuzzy Hash: 62E06D30340B21DBDB61ABB0AE0979A3ADB6F00B42F04550CF906C62E0CBA4E8008B26
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,0062E6F8,?,?,00000000,?,?,?,0062E822,00000002,FlsGetValue,0065B668,FlsGetValue), ref: 0062E754
                                                                  • GetLastError.KERNEL32(?,0062E6F8,?,?,00000000,?,?,?,0062E822,00000002,FlsGetValue,0065B668,FlsGetValue,?,?,0062D689), ref: 0062E75E
                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 0062E786
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad$ErrorLast
                                                                  • String ID: api-ms-
                                                                  • API String ID: 3177248105-2084034818
                                                                  • Opcode ID: 8d1d2d13ee988b9a59e380df1e1271594a8b5f8d09afff23c12f21acc4494686
                                                                  • Instruction ID: 43dc6aca68c312a1b6f1a07eb4c20be1bb1eadc249054d61d880a5a160b9676b
                                                                  • Opcode Fuzzy Hash: 8d1d2d13ee988b9a59e380df1e1271594a8b5f8d09afff23c12f21acc4494686
                                                                  • Instruction Fuzzy Hash: 5DE0483064071DF7DB205B50FC46B983F579F10B5AF105030F90DE81E1DB769990D955
                                                                  APIs
                                                                  • GetConsoleOutputCP.KERNEL32(713211A9,00000000,00000000,?), ref: 0064419B
                                                                    • Part of subcall function 00646DB3: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00646C89,?,00000000,-00000008), ref: 00646E14
                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 006443ED
                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00644433
                                                                  • GetLastError.KERNEL32 ref: 006444D6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                  • String ID:
                                                                  • API String ID: 2112829910-0
                                                                  • Opcode ID: adac5b7ffbc5ab758bb91d58a74c942919139ba326b18a8759fd0792fa7e539a
                                                                  • Instruction ID: 60972b38620da315442e4dae02107a8673d5bbd9ff56d8ffb050028dd25087fb
                                                                  • Opcode Fuzzy Hash: adac5b7ffbc5ab758bb91d58a74c942919139ba326b18a8759fd0792fa7e539a
                                                                  • Instruction Fuzzy Hash: 92D17BB5D006589FCF15CFA8C881AEDBBF6FF48314F24416AE556EB351DA30A942CB50
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Task$Free$AllocDesktopFolder
                                                                  • String ID:
                                                                  • API String ID: 1141445250-0
                                                                  • Opcode ID: 78e069d2e63fea419bd99208d275e7356c47c7f1d1f8c0079b44af97286a8f71
                                                                  • Instruction ID: 67153898b771f8ff4570fc9694e4c97530cd3d9c598f05b7eeb63495dc4f2d07
                                                                  • Opcode Fuzzy Hash: 78e069d2e63fea419bd99208d275e7356c47c7f1d1f8c0079b44af97286a8f71
                                                                  • Instruction Fuzzy Hash: E8A19EB5A006269FCB14DF68D995AAEBBB6FF49300F048169E915AF341D731ED01CFA0
                                                                  APIs
                                                                  • SetLastError.KERNEL32 ref: 053480AE
                                                                    • Part of subcall function 0534DA00: GetUserDefaultLangID.KERNEL32(0000000B,00000000,?,0534A70D), ref: 0534DA12
                                                                    • Part of subcall function 0534DA00: GetOEMCP.KERNEL32(?,0534A70D), ref: 0534DA58
                                                                    • Part of subcall function 0534DA00: GetLastActivePopup.USER32 ref: 0534DA94
                                                                    • Part of subcall function 0534DA00: GetTopWindow.USER32 ref: 0534DABB
                                                                  Strings
                                                                  • QoZYLJECoSANG9LKyFMwEKYh0Q/roiGXvMuN5tmTrwsxnTqcC6pOtcAqwstU1ZU44MzYvTUqgXsKdmRAZdGj19WaYYkz6H1J87nQJTG60X2vY29CMEoYO+9N32IS6/XdAR5UH61VsFsvjGfewxiOgtUOkPwJnmHn+Hs5QG1DDnddkjJ6013s7ZloCkhkyERpSGMVjh+pMDMnLUmQiL0ag4tzdzTDrbUomRmtKFvcgqp71Jdv1LsJl5FnnBGc5NEpLB1u, xrefs: 053481A8
                                                                  • AslFileMappingEnsureMappedAs, xrefs: 05347FAA
                                                                  • The specified address range is already committed., xrefs: 05347FC5, 05348110, 05348161
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Last$ActiveDefaultErrorLangPopupUserWindow
                                                                  • String ID: AslFileMappingEnsureMappedAs$QoZYLJECoSANG9LKyFMwEKYh0Q/roiGXvMuN5tmTrwsxnTqcC6pOtcAqwstU1ZU44MzYvTUqgXsKdmRAZdGj19WaYYkz6H1J87nQJTG60X2vY29CMEoYO+9N32IS6/XdAR5UH61VsFsvjGfewxiOgtUOkPwJnmHn+Hs5QG1DDnddkjJ6013s7ZloCkhkyERpSGMVjh+pMDMnLUmQiL0ag4tzdzTDrbUomRmtKFvcgqp71Jdv1LsJl5FnnBGc5NEpLB1u$The specified address range is already committed.
                                                                  • API String ID: 1206660600-3279949425
                                                                  • Opcode ID: ca4c516a8003d11d3e4126509ca152a865bb950be5b565d82d2cce327d102ad3
                                                                  • Instruction ID: 5c617c386efb5a64249f35dd4aab66d5a744b635136b99981d720687620a3045
                                                                  • Opcode Fuzzy Hash: ca4c516a8003d11d3e4126509ca152a865bb950be5b565d82d2cce327d102ad3
                                                                  • Instruction Fuzzy Hash: 515177759242AC8FCB44CF68E4863E97FE5EB45304F5480FDE9888B341CA34A58ADF91
                                                                  APIs
                                                                  • GetFileTime.KERNEL32(00000000,?,00000000,00000000), ref: 005B1568
                                                                  • CloseHandle.KERNEL32(00000000), ref: 005B156F
                                                                  • WriteFile.KERNEL32(00000000,?,?,00000000,00000000), ref: 005B15A3
                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000), ref: 005B15AE
                                                                  • SetFileTime.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,00000000), ref: 005B15D1
                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000), ref: 005B15D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CloseFileHandle$Time$Write
                                                                  • String ID:
                                                                  • API String ID: 1785683994-0
                                                                  • Opcode ID: 9ad8bd78702d20eb48e9571acf98ab39c5ea8172bbbf3870253624090ee9a0b9
                                                                  • Instruction ID: 32f2860a9f56264c89323d03b75d5d8d69dc091a318d338cc053f1363b7a070d
                                                                  • Opcode Fuzzy Hash: 9ad8bd78702d20eb48e9571acf98ab39c5ea8172bbbf3870253624090ee9a0b9
                                                                  • Instruction Fuzzy Hash: 8241F571100701ABE720DF28DC59B9BBBD9BF44314F140A1CF995972D0E774E944CBA9
                                                                  APIs
                                                                    • Part of subcall function 006275A9: QueryPerformanceFrequency.KERNEL32(?,?,?,?,005D9522,?,?,?,?,?,?,?,?,005F8B9C), ref: 006275C7
                                                                    • Part of subcall function 00627592: QueryPerformanceCounter.KERNEL32(?,?,?,?,005D9531,?,?,?,?,?,?,?,?,005F8B9C), ref: 0062759B
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005D9573
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005D95A5
                                                                  • __alldvrm.LIBCMT ref: 005D95C8
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005D95EC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$PerformanceQuery$CounterFrequency__alldvrm
                                                                  • String ID:
                                                                  • API String ID: 2057067329-0
                                                                  • Opcode ID: 85e12fba6b8acb37627b600c50b54ad45a2044a855940a57d984c9f8cbb6f4f6
                                                                  • Instruction ID: a29347647a6dcb6e7fa817104d68881049b48be7bb56e275244e8f2182188126
                                                                  • Opcode Fuzzy Hash: 85e12fba6b8acb37627b600c50b54ad45a2044a855940a57d984c9f8cbb6f4f6
                                                                  • Instruction Fuzzy Hash: 3F21B1713043182FD754EE2D6C42B3BBADEDBC8790F01843EF90ADB351E564AC0846A9
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$CurrentLengthParentShellTextThread
                                                                  • String ID:
                                                                  • API String ID: 2226962073-0
                                                                  • Opcode ID: 7c0df7e6edc45b7e2b159629438645f1c613711b640ec8c4555f192b4711277a
                                                                  • Instruction ID: 21ccf23c4759c087d932a8788256bd70a867b3d406168417bdf072b3297547f3
                                                                  • Opcode Fuzzy Hash: 7c0df7e6edc45b7e2b159629438645f1c613711b640ec8c4555f192b4711277a
                                                                  • Instruction Fuzzy Hash: 9721B875E102108BCB019F69D88E6A5BFACF748385F80C56EFC928F340EE789568CB50
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,?), ref: 0059F6B2
                                                                  • GetWindowRect.USER32(00000000,?), ref: 0059F6D1
                                                                  • OffsetRect.USER32(?,?,?), ref: 0059F6EA
                                                                  • MapWindowPoints.USER32(?,?,?,00000002), ref: 0059F6FE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: RectWindow$ItemOffsetPoints
                                                                  • String ID:
                                                                  • API String ID: 2681051736-0
                                                                  • Opcode ID: 51960848f92a9f98740586be179f82eedfca4e808536bf15c1cc8b76c5f5ea4d
                                                                  • Instruction ID: 390c8511800857bfdadd90b7ac4c4b25943eb1911dbc94681f36b30ffcb401cc
                                                                  • Opcode Fuzzy Hash: 51960848f92a9f98740586be179f82eedfca4e808536bf15c1cc8b76c5f5ea4d
                                                                  • Instruction Fuzzy Hash: 092108B5504306EFC700DF58D8459ABBBE9FB88311F10891EF899C7251E731E955CBA2
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentErrorLastMessagePopupThreadTime
                                                                  • String ID:
                                                                  • API String ID: 3839394117-0
                                                                  • Opcode ID: f2d36be031ce61906450f97e2d39190503f2a2d8407645f873e506e65c0f0d25
                                                                  • Instruction ID: fcd76ffa0a3bf1a985fde0d469434219404eea99c9e9c88bfa5fccdc805c4042
                                                                  • Opcode Fuzzy Hash: f2d36be031ce61906450f97e2d39190503f2a2d8407645f873e506e65c0f0d25
                                                                  • Instruction Fuzzy Hash: EE01FE7DE000518BDB201F6AD84566BBB6AEB84362B448076FCD54B708FE704986C662
                                                                  APIs
                                                                  • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,00000000), ref: 0059A498
                                                                  • VerSetConditionMask.KERNEL32(00000000), ref: 0059A49C
                                                                  • VerSetConditionMask.KERNEL32(00000000), ref: 0059A4A0
                                                                  • VerifyVersionInfoW.KERNEL32(00000023), ref: 0059A4C5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ConditionMask$InfoVerifyVersion
                                                                  • String ID:
                                                                  • API String ID: 2793162063-0
                                                                  • Opcode ID: 1546324be19c1d18ba552c91f530240cc9169aaef21505ec3e445a0fb6aad5a2
                                                                  • Instruction ID: ddb4be1f094a2bfe3f33bc0a7a4334c89cd6868e9bcd2719f6e76a91ac9694b0
                                                                  • Opcode Fuzzy Hash: 1546324be19c1d18ba552c91f530240cc9169aaef21505ec3e445a0fb6aad5a2
                                                                  • Instruction Fuzzy Hash: 2301ECB0644305BAF760DF21DC4AFAB7AECEF84710F00481DB588E61D1D7B896188BA6
                                                                  APIs
                                                                  • GetCurrentDirectoryW.KERNEL32(?,?,?,0063BD34,?), ref: 0063BC50
                                                                  • GetLastError.KERNEL32(?,0063BD34,?), ref: 0063BC5A
                                                                  • __dosmaperr.LIBCMT ref: 0063BC61
                                                                  • GetCurrentDirectoryW.KERNEL32(?,?,?,?,0063BD34,?), ref: 0063BC88
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentDirectory$ErrorLast__dosmaperr
                                                                  • String ID:
                                                                  • API String ID: 1554857224-0
                                                                  • Opcode ID: f92ffb2acbe418a2c0eac2b6285e4dcd3fb22568640244252800b00a1dc78e7f
                                                                  • Instruction ID: 14508dc552e7bdd43b334aa965ba822e1323089b88edd890b23205e2a24b94ca
                                                                  • Opcode Fuzzy Hash: f92ffb2acbe418a2c0eac2b6285e4dcd3fb22568640244252800b00a1dc78e7f
                                                                  • Instruction Fuzzy Hash: C5F0FE31600711DFAB70AB72DC089577BABAF40311B10A91EE696C6660DB70D80187A4
                                                                  APIs
                                                                  • WriteConsoleW.KERNEL32(00000000,00000000,006356DA,00000000,00000000,?,0064E752,00000000,00000001,?,?,?,0064452A,?,00000000,00000000), ref: 006509E0
                                                                  • GetLastError.KERNEL32(?,0064E752,00000000,00000001,?,?,?,0064452A,?,00000000,00000000,?,?,?,00644B04,00000000), ref: 006509EC
                                                                    • Part of subcall function 006509B2: CloseHandle.KERNEL32(FFFFFFFE,006509FC,?,0064E752,00000000,00000001,?,?,?,0064452A,?,00000000,00000000,?,?), ref: 006509C2
                                                                  • ___initconout.LIBCMT ref: 006509FC
                                                                    • Part of subcall function 00650974: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,006509A3,0064E73F,?,?,0064452A,?,00000000,00000000,?), ref: 00650987
                                                                  • WriteConsoleW.KERNEL32(00000000,00000000,006356DA,00000000,?,0064E752,00000000,00000001,?,?,?,0064452A,?,00000000,00000000,?), ref: 00650A11
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                  • String ID:
                                                                  • API String ID: 2744216297-0
                                                                  • Opcode ID: 8ad3862caecec550ef5c031a70499267021155be9ae7c2faa6d97051b8cf290e
                                                                  • Instruction ID: 11bc6374d5726d4a2d31aaa9b02bae3d8abf14d74e99df90902751de7c07c576
                                                                  • Opcode Fuzzy Hash: 8ad3862caecec550ef5c031a70499267021155be9ae7c2faa6d97051b8cf290e
                                                                  • Instruction Fuzzy Hash: DAF09836500219BBEF225F95DC049993E67FB093A6F045454FE1895271CB32C960EBA0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: xbg$xbg
                                                                  • API String ID: 0-3714758753
                                                                  • Opcode ID: 36bbe8065888e3daf91f9a7924c9e34cbb46ed9c7e374dc55fec229b86b68e97
                                                                  • Instruction ID: 1227040cb22c3b2b8937ece3c4a28078defa21263c6064b8ddd70c762591def1
                                                                  • Opcode Fuzzy Hash: 36bbe8065888e3daf91f9a7924c9e34cbb46ed9c7e374dc55fec229b86b68e97
                                                                  • Instruction Fuzzy Hash: C2B141B2D40205BFDB60DFA4CC82FEB77FDAB08700F154559BA15EB282EA70E9448B55
                                                                  APIs
                                                                    • Part of subcall function 0064261C: HeapFree.KERNEL32(00000000,00000000,?,0064AE0A,?,00000000,?,?,0064B0AB,?,00000007,?,?,0064B405,?,?), ref: 00642632
                                                                    • Part of subcall function 0064261C: GetLastError.KERNEL32(?,?,0064AE0A,?,00000000,?,?,0064B0AB,?,00000007,?,?,0064B405,?,?), ref: 0064263D
                                                                  • ___free_lconv_mon.LIBCMT ref: 0064B2B2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFreeHeapLast___free_lconv_mon
                                                                  • String ID: hdg$xbg
                                                                  • API String ID: 4068849827-1827522482
                                                                  • Opcode ID: 4356ab61e5bba3685b9c7d529952679288c92a7bb86033f240265b9f0088d66b
                                                                  • Instruction ID: fb926498dad4eb2ce06884bd76e526a512f8465cfe844b939f17473a1396b809
                                                                  • Opcode Fuzzy Hash: 4356ab61e5bba3685b9c7d529952679288c92a7bb86033f240265b9f0088d66b
                                                                  • Instruction Fuzzy Hash: BB3148716002019FEB61AE79D845BAB7BEAAF10310F65582DF449D7262DF70E9808B29
                                                                  APIs
                                                                  • LCMapStringW.KERNEL32(?,00000100,IV\,00000001,00000000,00000001,?,?,?,?,005C5649,?,?,?,00000000,?), ref: 005C98C0
                                                                  • LCMapStringW.KERNEL32(?,00000100,IV\,00000001,?,00000001,00000002,0000000E,?,?,?,?,005C5649,?,?,?), ref: 005C9940
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: String
                                                                  • String ID: IV\
                                                                  • API String ID: 2568140703-238454864
                                                                  • Opcode ID: d7faf9cf82f0bf1bb7ef8ba5430b7e837225631568b129c1a0f407f108092171
                                                                  • Instruction ID: b04b3b5b6bc29600b3a89e74e5e4b21befac1d52b6fbee585bf6c1aed4d286c5
                                                                  • Opcode Fuzzy Hash: d7faf9cf82f0bf1bb7ef8ba5430b7e837225631568b129c1a0f407f108092171
                                                                  • Instruction Fuzzy Hash: C2415876200611AFD310CF5AD884BB6B7E4FB88725F14856EF689C7290D774E894CB61
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(?,05348E7A,00000000), ref: 0534E30C
                                                                  Strings
                                                                  • DefaultBrowser_NOPUBLISHERID, xrefs: 0534E2E7
                                                                  • The file designated by DCERPCCHARTRANS cannot be opened., xrefs: 0534E305
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID: DefaultBrowser_NOPUBLISHERID$The file designated by DCERPCCHARTRANS cannot be opened.
                                                                  • API String ID: 4139908857-370230117
                                                                  • Opcode ID: cb7544943f54a8ba006d48a959d2574322985ccb3015d0e0c8ab2621781cf86d
                                                                  • Instruction ID: 023f30fa9e52502b4228a8a1ed86d3cdb0708cbf33a844777167a660bd977bd0
                                                                  • Opcode Fuzzy Hash: cb7544943f54a8ba006d48a959d2574322985ccb3015d0e0c8ab2621781cf86d
                                                                  • Instruction Fuzzy Hash: A7213A25B040528BDB229EE880641BEB7DFFB41741B588496D4D38F748E6B1B883EF43
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentHandleModuleThread
                                                                  • String ID: {Filemark Found}
                                                                  • API String ID: 2752942033-1305916082
                                                                  • Opcode ID: e2d7b748b49efb2ff4efbb5bf2d64e239201df2158ed2a508f93b23afaa15b8f
                                                                  • Instruction ID: 1a0e7db0905285c89253b15b095faae8ca100be29e09173d5a8e5892bb3905b3
                                                                  • Opcode Fuzzy Hash: e2d7b748b49efb2ff4efbb5bf2d64e239201df2158ed2a508f93b23afaa15b8f
                                                                  • Instruction Fuzzy Hash: 54310AB19342069BC718DF64E64E9A67FB9F744758F90802EF8068F340EBB85450CB90
                                                                  APIs
                                                                  • GetWindowTextLengthW.USER32 ref: 05350B24
                                                                  • GetSystemDefaultLangID.KERNEL32(00000000,?,?,00000000,?,053484F8), ref: 05350B6C
                                                                  Strings
                                                                  • The callback function must be invoked inline., xrefs: 05350A71
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLangLengthSystemTextWindow
                                                                  • String ID: The callback function must be invoked inline.
                                                                  • API String ID: 3266653797-1109098526
                                                                  • Opcode ID: 90fb8161dd17044a080dbc85f326fb391a95943c3a77d5e5edb956342e653819
                                                                  • Instruction ID: 66ee15121cbd14ffa9ff534f713b4c098335c3363c0af4a15fd5ae5dd9057169
                                                                  • Opcode Fuzzy Hash: 90fb8161dd17044a080dbc85f326fb391a95943c3a77d5e5edb956342e653819
                                                                  • Instruction Fuzzy Hash: 073150B0A212018FD714CF69E5966257FEAF78830CF98D96EF805CF244EB748101DBA2
                                                                  APIs
                                                                  • GetLargePageMinimum.KERNEL32 ref: 053533E1
                                                                  • GetWindowTextLengthW.USER32 ref: 05353448
                                                                  Strings
                                                                  • A write operation failed while converting the volume., xrefs: 0535336E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LargeLengthMinimumPageTextWindow
                                                                  • String ID: A write operation failed while converting the volume.
                                                                  • API String ID: 3158731419-61448210
                                                                  • Opcode ID: eb3de9c4f0d1ceb60318176470aa24c5046b87fd045689953e6f58c075b9c133
                                                                  • Instruction ID: e0ecf10f582739249ad926ed7c0ad85e9813e6c9f16cfb804f4a7b60b342d1eb
                                                                  • Opcode Fuzzy Hash: eb3de9c4f0d1ceb60318176470aa24c5046b87fd045689953e6f58c075b9c133
                                                                  • Instruction Fuzzy Hash: B8218DA6A341008BD3148F7CD8C75167FAAF754368B88EA2AE941CE691EBB4D448C681
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentShellThreadWindow
                                                                  • String ID: setmiterlimit
                                                                  • API String ID: 262587986-743676673
                                                                  • Opcode ID: e60b74cd7c9eeb3eb4cc56edd0086817cdc095951ddb26e066bca8e332bc1e6a
                                                                  • Instruction ID: cddbf6b65c7d2d1dd626780f2ab34623d5148c79e228f3d8b9af6ccf141f41f9
                                                                  • Opcode Fuzzy Hash: e60b74cd7c9eeb3eb4cc56edd0086817cdc095951ddb26e066bca8e332bc1e6a
                                                                  • Instruction Fuzzy Hash: B92135719242098FC700CF68E49A66A7FF8FB45319F94846DF8858F200DB31A845CFD5
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: _swprintf
                                                                  • String ID: %$+
                                                                  • API String ID: 589789837-2626897407
                                                                  • Opcode ID: fc1dafd169ab910db28b66a04fa97e48f06b952931c2034271e33f729ffc7716
                                                                  • Instruction ID: dac90b24f1735ab3b94bb040bf58b48a8d2603084badd9ac4bb27a3df8419490
                                                                  • Opcode Fuzzy Hash: fc1dafd169ab910db28b66a04fa97e48f06b952931c2034271e33f729ffc7716
                                                                  • Instruction Fuzzy Hash: AC1136725043449FDB11CE48D889BDF7FD9AF9A304F088019F98847292D7B5D918CBA3
                                                                  APIs
                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,`][ )f,005B6CB6,`][ )f,?,?,?,00662920), ref: 005B6326
                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,00662920,00000000,00000000,`][ )f,?,?,00662920,005B5D60,00662920,00000000,00000000), ref: 005B638A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide
                                                                  • String ID: `][ )f
                                                                  • API String ID: 626452242-3177394246
                                                                  • Opcode ID: df834464c05d72d7940250afaa77200722df712daa3ec1360450a48240913c26
                                                                  • Instruction ID: a89831df813b95a7f2831c620f22cc1fb9b949195f63b76c11678519e8a205e1
                                                                  • Opcode Fuzzy Hash: df834464c05d72d7940250afaa77200722df712daa3ec1360450a48240913c26
                                                                  • Instruction Fuzzy Hash: 5D11E331204711BBE7308E549C89F9A7BA6FB45721F300B2DF1229B1D0C7A5BC51CA65
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: _swprintf
                                                                  • String ID: %$+
                                                                  • API String ID: 589789837-2626897407
                                                                  • Opcode ID: a3b72f0b22335ff30c80bbcba514fa06435b1ede7dd33deeb7e530f75ec359d3
                                                                  • Instruction ID: 8e92249bcc2d39a136a86deb1ae3de5c880cb95d7df415fd34d039568da9e95c
                                                                  • Opcode Fuzzy Hash: a3b72f0b22335ff30c80bbcba514fa06435b1ede7dd33deeb7e530f75ec359d3
                                                                  • Instruction Fuzzy Hash: D6113832104345AEDB118D98CC04BDFBFA8AF97314F048519F99857281D3B4A8159BF2
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: _swprintf
                                                                  • String ID: %$+
                                                                  • API String ID: 589789837-2626897407
                                                                  • Opcode ID: 75545949910e4368b5cf1099c73b23fb14ecee2b1ffe9e188ec4ad00851b3ef2
                                                                  • Instruction ID: 607350653033a1e2aaae883a43b06de4b42dcdcfcb6788027ee1a9267737e493
                                                                  • Opcode Fuzzy Hash: 75545949910e4368b5cf1099c73b23fb14ecee2b1ffe9e188ec4ad00851b3ef2
                                                                  • Instruction Fuzzy Hash: A8113836108384AEDB11CD98DC44BDFBFD8EF97354F048519F98457281D3B4A4169BE2
                                                                  APIs
                                                                  • GetWindowTextLengthA.USER32 ref: 0534DF6A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LengthTextWindow
                                                                  • String ID: 2147483647${Network Request Timeout}
                                                                  • API String ID: 298885082-3867047420
                                                                  • Opcode ID: 80e204b142a629670d17d063e10a445e382454ce66df5834ea3931017f34f8f3
                                                                  • Instruction ID: 555eb3f9a6d732a762e440ccdfa798079c08f32d0db2c012bcb2b23c495a3190
                                                                  • Opcode Fuzzy Hash: 80e204b142a629670d17d063e10a445e382454ce66df5834ea3931017f34f8f3
                                                                  • Instruction Fuzzy Hash: 771101B59242418BDB11DF31D88A2A17FF9F719308F94CA5DE4628F244DA74E528CF68
                                                                  APIs
                                                                  • GetThreadUILanguage.KERNEL32(05008D72,?,?,0534741F), ref: 0534E71D
                                                                  Strings
                                                                  • The operation failed because the log is a dedicated log., xrefs: 0534E6DE
                                                                  • heap_failure_listentry_corruption, xrefs: 0534E728
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LanguageThread
                                                                  • String ID: The operation failed because the log is a dedicated log.$heap_failure_listentry_corruption
                                                                  • API String ID: 243849632-2863350049
                                                                  • Opcode ID: d4760338bf72cff6376622e4ab11b413099f59b091aa83e939df6693c71f7b61
                                                                  • Instruction ID: 2ed79ad79ef964bd25030b07b550a4b003359743680848ef3c0aea16158f5018
                                                                  • Opcode Fuzzy Hash: d4760338bf72cff6376622e4ab11b413099f59b091aa83e939df6693c71f7b61
                                                                  • Instruction Fuzzy Hash: 5511CEB6E342008BDB40CE6DD89A6217FF9F754318B848C29F4A5CF350EBB5D5108A41
                                                                  APIs
                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 005C4616
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_copy
                                                                  • String ID: PMf$XMf
                                                                  • API String ID: 2659868963-3086229458
                                                                  • Opcode ID: 884f54ce9a8b8c9db3334819ae02d694cb05411b7c054e28ac4bbcd143fa55b0
                                                                  • Instruction ID: a3b840f2616c744e1fa2b2afb80668ead8241d5c318308873dc4e35189932481
                                                                  • Opcode Fuzzy Hash: 884f54ce9a8b8c9db3334819ae02d694cb05411b7c054e28ac4bbcd143fa55b0
                                                                  • Instruction Fuzzy Hash: F52103B5900B45EFC724CF19C544A56BBF9FF09710F008A2EE8AA87B40D7B0A958CB90
                                                                  APIs
                                                                  • GetUserDefaultLangID.KERNEL32(?,0000022C,?,05341276), ref: 0534E078
                                                                  Strings
                                                                  • Failed to read text to match, xrefs: 0534E030
                                                                  • The attribute cannot be written., xrefs: 0534E001
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLangUser
                                                                  • String ID: Failed to read text to match$The attribute cannot be written.
                                                                  • API String ID: 768647712-3297483619
                                                                  • Opcode ID: e1874e3a5e920d4e28dd777235eafe4cc02fb05144ee0b59355a768fe96ffb88
                                                                  • Instruction ID: a460564f26b4186fffa9f40e651b13ac80994dc01fca6d87a0b97cb7c10164a9
                                                                  • Opcode Fuzzy Hash: e1874e3a5e920d4e28dd777235eafe4cc02fb05144ee0b59355a768fe96ffb88
                                                                  • Instruction Fuzzy Hash: 0E11C2749251028FD301CF6AE986122BFEEF785318BE4C05EF4558F308DA31A802AFA1
                                                                  APIs
                                                                  Strings
                                                                  • The specified disk is not empty., xrefs: 05351F78
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentPopupThread
                                                                  • String ID: The specified disk is not empty.
                                                                  • API String ID: 2908149267-2386209912
                                                                  • Opcode ID: e0604f9e13bc68f3a18f7dc0e05bfa334fc0554fa9a9ef1f6def3889e54e0de3
                                                                  • Instruction ID: 5b20e3e6b021b486433095d762f8bdc5c86a6cef3aa9f6f15b4c5484d1a4ed69
                                                                  • Opcode Fuzzy Hash: e0604f9e13bc68f3a18f7dc0e05bfa334fc0554fa9a9ef1f6def3889e54e0de3
                                                                  • Instruction Fuzzy Hash: CD1191796212414FD318CF28EA876613FEDE748318F94D96EF806CF261DB748540CB51
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00626959
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 006269B5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                  • String ID: 09Z
                                                                  • API String ID: 593203224-1578109394
                                                                  • Opcode ID: 44ac8ac85b823b436cc35911e9c3570e990df3922dfc8e7c0e2a931f91ec2b09
                                                                  • Instruction ID: 759f6aa44f1aed99eeb36fb8ad94884d59afe26c12bef757a79505ed109d8b2c
                                                                  • Opcode Fuzzy Hash: 44ac8ac85b823b436cc35911e9c3570e990df3922dfc8e7c0e2a931f91ec2b09
                                                                  • Instruction Fuzzy Hash: 0A01A934A00A25EFDB00DB14E894A9D77BAEF81310B04009AE8019B360DF30AE45CB61
                                                                  APIs
                                                                  • GetMessageTime.USER32 ref: 0535135E
                                                                  • GetSystemDefaultLangID.KERNEL32(?,?,?,0534BCC7), ref: 053513BC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DefaultLangMessageSystemTime
                                                                  • String ID: /iCCP/ProfileName
                                                                  • API String ID: 1876246435-2957417691
                                                                  • Opcode ID: a9441dc6cd6954d19079dae1c21e2e80c9cf6d64cf28aaac26017f2ff1983666
                                                                  • Instruction ID: 182fc12710bbf08f6dc58cbef06caa1368c425feddf0bbcf00850c45908ec43f
                                                                  • Opcode Fuzzy Hash: a9441dc6cd6954d19079dae1c21e2e80c9cf6d64cf28aaac26017f2ff1983666
                                                                  • Instruction Fuzzy Hash: A3118EB69342808FE304CE79E496A157FEEF75435CF84C56EF289CA614EB38C401C690
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32 ref: 05351286
                                                                  • GetOEMCP.KERNEL32(00000000), ref: 0535129A
                                                                  Strings
                                                                  • RR.Raphael.Install.Builder, xrefs: 0535127F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID: RR.Raphael.Install.Builder
                                                                  • API String ID: 4139908857-540015930
                                                                  • Opcode ID: 4cacc424dbdaacb7d368cc5c131245f3f8aa50f8a35f8b7fab8920c4d96ffb29
                                                                  • Instruction ID: 33f070a50681660b12fe143316b3eb4174a55158733be2dfaf958993bd833c66
                                                                  • Opcode Fuzzy Hash: 4cacc424dbdaacb7d368cc5c131245f3f8aa50f8a35f8b7fab8920c4d96ffb29
                                                                  • Instruction Fuzzy Hash: 430124759141559BCF008FA8C4A5BAABBA9FB09324F4480A9FDE5CF280EA349401CB86
                                                                  APIs
                                                                  Strings
                                                                  • Print or disk redirection is temporarily paused., xrefs: 0535171A
                                                                  • The IPsec cipher transform is not compatible with the policy., xrefs: 05351743
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1857654055.0000000005340000.00000040.00001000.00020000.00000000.sdmp, Offset: 05340000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5340000_iQPxJrxxaj.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID: Print or disk redirection is temporarily paused.$The IPsec cipher transform is not compatible with the policy.
                                                                  • API String ID: 4139908857-1868017272
                                                                  • Opcode ID: cf151a2edb03ac93667b8f037c429ab12aa59b979805a293849b88a3016d7a10
                                                                  • Instruction ID: 385682e8574705d77d2ee9fa1cfdbffbd04b9183fd6d2f1fda20dcbb0c208fa3
                                                                  • Opcode Fuzzy Hash: cf151a2edb03ac93667b8f037c429ab12aa59b979805a293849b88a3016d7a10
                                                                  • Instruction Fuzzy Hash: 5AF0D1729212519FC704DB28E882A967FECFB4A304F80C5AEE569CF204E62199408B81
                                                                  APIs
                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 005C3574
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_copy
                                                                  • String ID: (Of$C'\
                                                                  • API String ID: 2659868963-1825978011
                                                                  • Opcode ID: a33d2f9ef8576d9d5912ae66b05bd75d3a8b670e7e9896a9cd0e38ef46031784
                                                                  • Instruction ID: e8d34763771f434a531505a2a3870a965d720427ceb639c1ac91ccc428d75c52
                                                                  • Opcode Fuzzy Hash: a33d2f9ef8576d9d5912ae66b05bd75d3a8b670e7e9896a9cd0e38ef46031784
                                                                  • Instruction Fuzzy Hash: 0201C0F1500A02AFC314CF19D548642FBF5BF49320B01871EE4698BB80D7B0A568CB94
                                                                  APIs
                                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(00000FA0,-00000020,00646AC8,-00000020,00000FA0,00000000,00000000,00000000,00000000,?), ref: 0064652D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: CountCriticalInitializeSectionSpin
                                                                  • String ID: 09Z$InitializeCriticalSectionEx
                                                                  • API String ID: 2593887523-281017962
                                                                  • Opcode ID: 84a27c4a5de7fab4c3c694783c8a7547d32e19cf3e19d4b9bfbdf6ea0a886cc8
                                                                  • Instruction ID: f2e94afbd00704efaec9030cbd50d658946d20a381fa153b6615f04a97842f3c
                                                                  • Opcode Fuzzy Hash: 84a27c4a5de7fab4c3c694783c8a7547d32e19cf3e19d4b9bfbdf6ea0a886cc8
                                                                  • Instruction Fuzzy Hash: 70E01236581318B7CF216F51DC06D9E7F17EB55BA2F018010FD18191A1DA714A61EAD5
                                                                  APIs
                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 005C4E03
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_copy
                                                                  • String ID: PMf$XMf
                                                                  • API String ID: 2659868963-3086229458
                                                                  • Opcode ID: eebc8b8bfa3a652cac560cee5a25c8496f954168d366e8ae6c89eab10222daae
                                                                  • Instruction ID: 0edae767f582aefbd09671806a77881bb569d387100a3b13bda7fb8a9e452ad4
                                                                  • Opcode Fuzzy Hash: eebc8b8bfa3a652cac560cee5a25c8496f954168d366e8ae6c89eab10222daae
                                                                  • Instruction Fuzzy Hash: 1DF0B2B1405B518FC334CF18D818646BFF5AF05728F018B1EE0AA9BB91D7B0A548CB98
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Alloc
                                                                  • String ID: 09Z$FlsAlloc
                                                                  • API String ID: 2773662609-13803204
                                                                  • Opcode ID: 983864d06a42b7728fa708946dd614ad23c3dd33645099e1e7595644e3b3572c
                                                                  • Instruction ID: d05364ec9318e1fa7adb8efee42e1909adc4648be8621e3c46d82c3be656d313
                                                                  • Opcode Fuzzy Hash: 983864d06a42b7728fa708946dd614ad23c3dd33645099e1e7595644e3b3572c
                                                                  • Instruction Fuzzy Hash: BCE02B32680364B787223791DC1BDDF7E17CB52B73F011030FD05562D28AA50C4591EB
                                                                  APIs
                                                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,00627672,00000000,00000000,00000000,?,006275F1,?,0067B2B8,00000000,?,0062744B,?,00000000,00000000), ref: 0062893A
                                                                  • GetSystemTimeAsFileTime.KERNEL32(00000000,0067B2B8,?,00627672,00000000,00000000,00000000,?,006275F1,?,0067B2B8,00000000,?,0062744B,?,00000000), ref: 0062893E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1856705125.0000000000561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00560000, based on PE: true
                                                                  • Associated: 00000000.00000002.1856688052.0000000000560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856778475.0000000000659000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856800684.0000000000676000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856817216.0000000000677000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856835588.0000000000679000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1856851640.000000000067C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_560000_iQPxJrxxaj.jbxd
                                                                  Similarity
                                                                  • API ID: Time$FileSystem$Precise
                                                                  • String ID: 09Z
                                                                  • API String ID: 743729956-1578109394
                                                                  • Opcode ID: dd947c912eb62b697032fdbb5d1383de60b8fc2afa3815139196d849c9e22119
                                                                  • Instruction ID: 4ae9c7c9990fc900345718413b0820ba2a3b9dacfff795e38567e546315b1875
                                                                  • Opcode Fuzzy Hash: dd947c912eb62b697032fdbb5d1383de60b8fc2afa3815139196d849c9e22119
                                                                  • Instruction Fuzzy Hash: 52D02232902638EF8B012B88FC044FC7B1FEA45B62B040011E80D43220CF201C819FE3

                                                                  Execution Graph

                                                                  Execution Coverage:39.2%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:19.2%
                                                                  Total number of Nodes:543
                                                                  Total number of Limit Nodes:2
                                                                  execution_graph 4710 782bb8 4712 782bf2 4710->4712 4714 7895d8 4712->4714 4713 782df6 4715 789200 2 API calls 4714->4715 4716 789607 4715->4716 4717 788ea4 LocalReAlloc 4716->4717 4718 78962d 4717->4718 4719 789649 4718->4719 4721 788e3c 2 API calls 4718->4721 4720 7894b4 4 API calls 4719->4720 4722 78965f 4720->4722 4721->4719 4722->4713 4723 782088 4724 7820af 4723->4724 4725 7823be 4724->4725 4726 78239e 4724->4726 4729 7823bc 4725->4729 4747 78b4e0 4725->4747 4732 78b280 4726->4732 4730 7895d8 6 API calls 4729->4730 4731 7824f2 4730->4731 4759 7835ac 4732->4759 4735 78b4d5 4735->4729 4736 781083 2 API calls 4737 78b328 4736->4737 4766 7810d3 4737->4766 4748 78b53a 4747->4748 4814 78108d 4748->4814 4760 7835bd 4759->4760 4761 7837b3 4760->4761 4763 78383d 4760->4763 4764 78373c 4760->4764 4761->4764 4779 781065 4761->4779 4763->4764 4765 781065 2 API calls 4763->4765 4764->4735 4764->4736 4765->4764 4767 781000 2 API calls 4766->4767 4768 7810dd 4767->4768 4769 781000 2 API calls 4768->4769 4770 7810e7 4769->4770 4771 781000 2 API calls 4770->4771 4772 7810f1 4771->4772 4773 781000 2 API calls 4772->4773 4774 7810fb 4773->4774 4775 781000 2 API calls 4774->4775 4776 781105 4775->4776 4777 781000 2 API calls 4776->4777 4778 78110f 4777->4778 4780 781000 2 API calls 4779->4780 4781 78106f 4780->4781 4782 781000 2 API calls 4781->4782 4783 781079 4782->4783 4784 781000 2 API calls 4783->4784 4785 781083 4784->4785 4786 781000 2 API calls 4785->4786 4787 78108d 4786->4787 4788 781000 2 API calls 4787->4788 4789 781097 4788->4789 4790 781000 2 API calls 4789->4790 4791 7810a1 4790->4791 4792 781000 2 API calls 4791->4792 4793 7810ab 4792->4793 4794 781000 2 API calls 4793->4794 4795 7810b5 4794->4795 4796 781000 2 API calls 4795->4796 4797 7810bf 4796->4797 4798 781000 2 API calls 4797->4798 4799 7810c9 4798->4799 4800 781000 2 API calls 4799->4800 4801 7810d3 4800->4801 4802 781000 2 API calls 4801->4802 4803 7810dd 4802->4803 4804 781000 2 API calls 4803->4804 4805 7810e7 4804->4805 4806 781000 2 API calls 4805->4806 4807 7810f1 4806->4807 4808 781000 2 API calls 4807->4808 4809 7810fb 4808->4809 4810 781000 2 API calls 4809->4810 4811 781105 4810->4811 4812 781000 2 API calls 4811->4812 4813 78110f 4812->4813 4815 781000 2 API calls 4814->4815 4816 781097 4815->4816 4817 781000 2 API calls 4816->4817 4818 7810a1 4817->4818 4819 781000 2 API calls 4818->4819 4820 7810ab 4819->4820 4821 781000 2 API calls 4820->4821 4822 7810b5 4821->4822 4823 781000 2 API calls 4822->4823 4824 7810bf 4823->4824 4825 781000 2 API calls 4824->4825 4826 7810c9 4825->4826 4827 781000 2 API calls 4826->4827 4828 7810d3 4827->4828 4829 781000 2 API calls 4828->4829 4830 7810dd 4829->4830 4831 781000 2 API calls 4830->4831 4832 7810e7 4831->4832 4833 781000 2 API calls 4832->4833 4834 7810f1 4833->4834 4835 781000 2 API calls 4834->4835 4836 7810fb 4835->4836 4837 781000 2 API calls 4836->4837 4838 781105 4837->4838 4839 781000 2 API calls 4838->4839 4840 78110f 4839->4840 4284 78ee7c 4287 788d4c 4284->4287 4288 788d76 4287->4288 4295 786740 4288->4295 4290 788da7 4291 788df4 4290->4291 4403 7880cc 4290->4403 4293 788db7 4293->4291 4474 788e00 4293->4474 4296 78676c 4295->4296 4397 78807b 4296->4397 4478 785098 4296->4478 4299 785098 LdrGetProcedureAddress 4300 787339 4299->4300 4301 785098 LdrGetProcedureAddress 4300->4301 4302 787359 4301->4302 4303 785098 LdrGetProcedureAddress 4302->4303 4304 787379 4303->4304 4305 785098 LdrGetProcedureAddress 4304->4305 4306 787399 4305->4306 4307 785098 LdrGetProcedureAddress 4306->4307 4308 7873c9 4307->4308 4309 785098 LdrGetProcedureAddress 4308->4309 4310 7873e9 4309->4310 4311 785098 LdrGetProcedureAddress 4310->4311 4312 787409 4311->4312 4313 785098 LdrGetProcedureAddress 4312->4313 4314 787429 4313->4314 4315 785098 LdrGetProcedureAddress 4314->4315 4316 787449 4315->4316 4317 785098 LdrGetProcedureAddress 4316->4317 4316->4397 4318 787493 4317->4318 4319 785098 LdrGetProcedureAddress 4318->4319 4320 7874b3 4319->4320 4321 785098 LdrGetProcedureAddress 4320->4321 4322 7874d3 4321->4322 4323 785098 LdrGetProcedureAddress 4322->4323 4324 7874f3 4323->4324 4325 785098 LdrGetProcedureAddress 4324->4325 4326 787513 4325->4326 4327 785098 LdrGetProcedureAddress 4326->4327 4328 787533 4327->4328 4329 785098 LdrGetProcedureAddress 4328->4329 4330 787553 4329->4330 4331 785098 LdrGetProcedureAddress 4330->4331 4332 787573 4331->4332 4333 785098 LdrGetProcedureAddress 4332->4333 4334 7875a3 4333->4334 4335 785098 LdrGetProcedureAddress 4334->4335 4336 7875c3 4335->4336 4337 785098 LdrGetProcedureAddress 4336->4337 4338 7875f1 4337->4338 4339 785098 LdrGetProcedureAddress 4338->4339 4340 787611 4339->4340 4341 785098 LdrGetProcedureAddress 4340->4341 4342 7876fa 4341->4342 4343 785098 LdrGetProcedureAddress 4342->4343 4344 78772d 4343->4344 4345 785098 LdrGetProcedureAddress 4344->4345 4346 787750 4345->4346 4347 785098 LdrGetProcedureAddress 4346->4347 4348 78777e 4347->4348 4349 785098 LdrGetProcedureAddress 4348->4349 4350 7877b6 4349->4350 4351 785098 LdrGetProcedureAddress 4350->4351 4352 7877d9 4351->4352 4353 785098 LdrGetProcedureAddress 4352->4353 4354 7877fc 4353->4354 4355 785098 LdrGetProcedureAddress 4354->4355 4356 78781f 4355->4356 4357 785098 LdrGetProcedureAddress 4356->4357 4358 787842 4357->4358 4359 785098 LdrGetProcedureAddress 4358->4359 4360 787865 4359->4360 4361 785098 LdrGetProcedureAddress 4360->4361 4362 787888 4361->4362 4363 785098 LdrGetProcedureAddress 4362->4363 4364 7878ab 4363->4364 4365 785098 LdrGetProcedureAddress 4364->4365 4366 7878ce 4365->4366 4367 785098 LdrGetProcedureAddress 4366->4367 4368 7878f1 4367->4368 4369 785098 LdrGetProcedureAddress 4368->4369 4371 787914 4369->4371 4370 785098 LdrGetProcedureAddress 4372 78797b 4370->4372 4371->4370 4373 785098 LdrGetProcedureAddress 4372->4373 4374 78799e 4373->4374 4375 785098 LdrGetProcedureAddress 4374->4375 4376 7879d1 4375->4376 4377 785098 LdrGetProcedureAddress 4376->4377 4378 787a01 4377->4378 4379 785098 LdrGetProcedureAddress 4378->4379 4380 787a21 4379->4380 4381 785098 LdrGetProcedureAddress 4380->4381 4382 787a41 4381->4382 4383 785098 LdrGetProcedureAddress 4382->4383 4384 787a61 4383->4384 4385 785098 LdrGetProcedureAddress 4384->4385 4386 787a81 4385->4386 4387 787a9d CreateMutexW 4386->4387 4386->4397 4388 787ad6 4387->4388 4388->4397 4482 785928 4388->4482 4390 787ae6 4391 787b5a 4390->4391 4390->4397 4490 78a234 4390->4490 4496 789e94 4390->4496 4512 78a7f4 4390->4512 4536 78a4c4 4390->4536 4552 789b30 4391->4552 4393 787bb3 GetUserNameW 4395 787cad 4393->4395 4393->4397 4396 787fda LocalAlloc 4395->4396 4395->4397 4398 788005 4396->4398 4397->4290 4398->4397 4406 7880e8 4403->4406 4617 789250 4406->4617 4407 788a92 4407->4293 4410 789094 2 API calls 4411 788308 4410->4411 4635 789068 4411->4635 4414 789094 2 API calls 4415 78837b 4414->4415 4415->4407 4416 788415 4415->4416 4420 7883ba 4415->4420 4417 789094 2 API calls 4416->4417 4419 788423 4417->4419 4418 788ea4 LocalReAlloc 4421 788403 4418->4421 4419->4421 4423 78845b 4419->4423 4420->4418 4422 788ea4 LocalReAlloc 4421->4422 4424 7884a1 4422->4424 4425 789094 2 API calls 4423->4425 4426 788ea4 LocalReAlloc 4424->4426 4427 788471 4425->4427 4428 7884b8 GlobalMemoryStatusEx 4426->4428 4429 789094 2 API calls 4427->4429 4428->4407 4430 7884d5 4428->4430 4431 78848d 4429->4431 4639 788ea4 4430->4639 4431->4428 4433 7884f8 4434 78850d 4433->4434 4435 788534 4433->4435 4436 788ea4 LocalReAlloc 4434->4436 4438 788ea4 LocalReAlloc 4435->4438 4437 78851d 4436->4437 4439 788ea4 LocalReAlloc 4437->4439 4438->4437 4441 78857b 4439->4441 4440 788ea4 LocalReAlloc 4442 788662 4440->4442 4441->4440 4443 788ea4 LocalReAlloc 4442->4443 4444 78867b 4443->4444 4445 788ea4 LocalReAlloc 4444->4445 4446 7886cf 4445->4446 4447 788ea4 LocalReAlloc 4446->4447 4448 7886e9 4447->4448 4449 788ea4 LocalReAlloc 4448->4449 4450 788758 4449->4450 4451 788ea4 LocalReAlloc 4450->4451 4452 7887d6 4451->4452 4642 78eb74 4452->4642 4455 788ea4 LocalReAlloc 4456 7887ee 4455->4456 4457 788ea4 LocalReAlloc 4456->4457 4458 788816 4457->4458 4459 788ea4 LocalReAlloc 4458->4459 4460 788866 4459->4460 4461 789094 2 API calls 4460->4461 4462 7888c7 4461->4462 4463 789094 2 API calls 4462->4463 4467 7888e0 4463->4467 4464 788a41 CreateToolhelp32Snapshot 4464->4407 4465 788a66 Process32FirstW 4464->4465 4465->4407 4466 788ab5 4465->4466 4468 788c9d 4466->4468 4471 788ea4 LocalReAlloc 4466->4471 4472 789094 2 API calls 4466->4472 4467->4464 4469 788cbe IsWow64Process 4468->4469 4470 788cde CloseHandle 4469->4470 4470->4407 4471->4466 4473 788c52 Process32NextW 4472->4473 4473->4466 4473->4470 4477 788e06 4474->4477 4669 78177c 4477->4669 4676 78ec20 4477->4676 4480 7850b3 4478->4480 4479 78515d 4479->4299 4480->4479 4481 7852b2 LdrGetProcedureAddress 4480->4481 4481->4479 4483 785961 4482->4483 4556 789a6c 4483->4556 4485 7859fa 4559 78ee94 4485->4559 4488 789a6c LocalAlloc 4489 785b08 4488->4489 4489->4390 4491 78a255 4490->4491 4613 7852f8 4491->4613 4493 78a45f 4493->4390 4494 78a3c2 4494->4493 4495 785098 LdrGetProcedureAddress 4494->4495 4495->4493 4497 789ec7 4496->4497 4498 7852f8 LdrLoadDll 4497->4498 4499 78a0b7 4498->4499 4500 78a1ee 4499->4500 4501 785098 LdrGetProcedureAddress 4499->4501 4500->4390 4502 78a0f6 4501->4502 4503 785098 LdrGetProcedureAddress 4502->4503 4504 78a129 4503->4504 4505 785098 LdrGetProcedureAddress 4504->4505 4506 78a185 4505->4506 4507 785098 LdrGetProcedureAddress 4506->4507 4508 78a1a8 4507->4508 4509 785098 LdrGetProcedureAddress 4508->4509 4510 78a1cb 4509->4510 4511 785098 LdrGetProcedureAddress 4510->4511 4511->4500 4513 78a817 4512->4513 4514 7852f8 LdrLoadDll 4513->4514 4516 78a9cc 4514->4516 4515 78ac83 4515->4390 4516->4515 4517 785098 LdrGetProcedureAddress 4516->4517 4518 78aab8 4517->4518 4519 785098 LdrGetProcedureAddress 4518->4519 4520 78ab06 4519->4520 4521 785098 LdrGetProcedureAddress 4520->4521 4522 78ab39 4521->4522 4523 785098 LdrGetProcedureAddress 4522->4523 4524 78ab5c 4523->4524 4525 785098 LdrGetProcedureAddress 4524->4525 4526 78abc0 4525->4526 4527 785098 LdrGetProcedureAddress 4526->4527 4528 78abe3 4527->4528 4529 785098 LdrGetProcedureAddress 4528->4529 4530 78ac10 4529->4530 4531 785098 LdrGetProcedureAddress 4530->4531 4532 78ac33 4531->4532 4533 785098 LdrGetProcedureAddress 4532->4533 4534 78ac60 4533->4534 4535 785098 LdrGetProcedureAddress 4534->4535 4535->4515 4537 78a4e7 4536->4537 4538 7852f8 LdrLoadDll 4537->4538 4539 78a63f 4538->4539 4540 785098 LdrGetProcedureAddress 4539->4540 4551 78a747 4539->4551 4541 78a67e 4540->4541 4542 785098 LdrGetProcedureAddress 4541->4542 4543 78a6a1 4542->4543 4544 785098 LdrGetProcedureAddress 4543->4544 4545 78a6c4 4544->4545 4546 785098 LdrGetProcedureAddress 4545->4546 4547 78a6e7 4546->4547 4548 785098 LdrGetProcedureAddress 4547->4548 4549 78a70a 4548->4549 4550 785098 LdrGetProcedureAddress 4549->4550 4550->4551 4551->4390 4553 789b42 4552->4553 4555 789b52 4552->4555 4554 781083 2 API calls 4553->4554 4553->4555 4554->4555 4555->4393 4557 789a7e 4556->4557 4558 789a92 LocalAlloc 4556->4558 4557->4485 4558->4557 4562 78eea2 4559->4562 4560 785ad5 4560->4488 4562->4560 4563 781468 4562->4563 4564 78149f 4563->4564 4565 7814c0 GetPEB 4564->4565 4566 7814e4 4565->4566 4573 781083 4566->4573 4568 78155d 4569 781083 NtAcquireCrossVmMutant GetPEB 4568->4569 4572 781567 4568->4572 4570 7815ba 4569->4570 4571 7815d5 CheckRemoteDebuggerPresent 4570->4571 4570->4572 4571->4572 4572->4562 4602 781000 4573->4602 4575 78108d 4576 781000 2 API calls 4575->4576 4577 781097 4576->4577 4578 781000 2 API calls 4577->4578 4579 7810a1 4578->4579 4580 781000 2 API calls 4579->4580 4581 7810ab 4580->4581 4582 781000 2 API calls 4581->4582 4583 7810b5 4582->4583 4584 781000 2 API calls 4583->4584 4585 7810bf 4584->4585 4586 781000 2 API calls 4585->4586 4587 7810c9 4586->4587 4588 781000 2 API calls 4587->4588 4589 7810d3 4588->4589 4590 781000 2 API calls 4589->4590 4591 7810dd 4590->4591 4592 781000 2 API calls 4591->4592 4593 7810e7 4592->4593 4594 781000 2 API calls 4593->4594 4595 7810f1 4594->4595 4596 781000 2 API calls 4595->4596 4597 7810fb 4596->4597 4598 781000 2 API calls 4597->4598 4599 781105 4598->4599 4600 781000 2 API calls 4599->4600 4601 78110f 4600->4601 4606 78ad8c 4602->4606 4604 781022 4605 781042 NtAcquireCrossVmMutant 4604->4605 4605->4575 4609 78ae50 4606->4609 4608 78ad97 4608->4604 4610 78ae9a GetPEB 4609->4610 4611 78ae59 4609->4611 4612 78aeb1 4610->4612 4611->4608 4612->4608 4614 785446 4613->4614 4615 785343 4613->4615 4614->4494 4615->4614 4616 785417 LdrLoadDll 4615->4616 4616->4614 4618 789262 4617->4618 4619 788ea4 LocalReAlloc 4618->4619 4620 789272 4619->4620 4621 788ea4 LocalReAlloc 4620->4621 4622 789280 4621->4622 4623 788ea4 LocalReAlloc 4622->4623 4624 789290 4623->4624 4625 788ea4 LocalReAlloc 4624->4625 4626 7892b8 4625->4626 4627 789094 2 API calls 4626->4627 4628 7892f8 4627->4628 4629 789094 2 API calls 4628->4629 4630 788298 4629->4630 4630->4407 4631 789094 4630->4631 4632 7890a6 4631->4632 4646 788e3c 4632->4646 4634 7882cf 4634->4407 4634->4410 4636 78907a 4635->4636 4637 788e3c 2 API calls 4636->4637 4638 788339 4637->4638 4638->4414 4640 788eea 4639->4640 4641 788eb2 LocalReAlloc 4639->4641 4640->4433 4641->4640 4643 78ebb2 4642->4643 4652 7810bf 4643->4652 4645 7887db 4645->4455 4647 788e4e 4646->4647 4651 788e99 4646->4651 4648 788ea4 LocalReAlloc 4647->4648 4649 788e5a 4648->4649 4650 788e5e LocalReAlloc 4649->4650 4649->4651 4650->4651 4651->4634 4653 781000 2 API calls 4652->4653 4654 7810c9 4653->4654 4655 781000 2 API calls 4654->4655 4656 7810d3 4655->4656 4657 781000 2 API calls 4656->4657 4658 7810dd 4657->4658 4659 781000 2 API calls 4658->4659 4660 7810e7 4659->4660 4661 781000 2 API calls 4660->4661 4662 7810f1 4661->4662 4663 781000 2 API calls 4662->4663 4664 7810fb 4663->4664 4665 781000 2 API calls 4664->4665 4666 781105 4665->4666 4667 781000 2 API calls 4666->4667 4668 78110f 4667->4668 4674 7817e8 4669->4674 4670 781a02 4670->4477 4672 781468 4 API calls 4672->4674 4673 789a6c LocalAlloc 4673->4674 4674->4670 4674->4672 4674->4673 4680 789458 4674->4680 4685 789768 4674->4685 4677 78ec31 4676->4677 4678 7894b4 4 API calls 4677->4678 4679 78ecd1 4678->4679 4679->4477 4689 789200 4680->4689 4682 78946b 4697 7894b4 4682->4697 4684 7894ae 4684->4674 4686 7897a7 4685->4686 4687 789776 4685->4687 4686->4674 4688 78ee94 4 API calls 4687->4688 4688->4686 4690 789212 4689->4690 4691 788ea4 LocalReAlloc 4690->4691 4692 789222 4691->4692 4693 788ea4 LocalReAlloc 4692->4693 4694 789230 4693->4694 4695 789094 2 API calls 4694->4695 4696 789247 4695->4696 4696->4682 4698 7894d5 4697->4698 4700 7894ce 4697->4700 4698->4700 4701 789388 4698->4701 4700->4684 4703 7893a4 4701->4703 4704 789398 4701->4704 4702 78944b 4702->4700 4703->4702 4706 78ef88 4703->4706 4704->4700 4709 78efa0 4706->4709 4707 78efe5 4707->4702 4708 781468 4 API calls 4708->4709 4709->4707 4709->4708 4845 781130 4846 781147 4845->4846 4847 7895d8 6 API calls 4846->4847 4848 78130c 4847->4848 4849 782610 4853 78262a 4849->4853 4850 7895d8 6 API calls 4851 782b8d 4850->4851 4852 7826d9 4852->4850 4853->4852 4854 788ea4 LocalReAlloc 4853->4854 4855 789094 2 API calls 4853->4855 4854->4853 4855->4853 4856 781a24 4860 781a3f 4856->4860 4857 781edd 4859 7895d8 6 API calls 4857->4859 4861 781efa 4859->4861 4860->4857 4862 7861a0 4860->4862 4863 7861ae 4862->4863 4864 7835ac 2 API calls 4863->4864 4865 786297 4864->4865 4866 781083 2 API calls 4865->4866 4874 7862a3 4865->4874 4867 786361 4866->4867 4868 7810d3 2 API calls 4867->4868 4869 7863af 4868->4869 4870 7863e9 4869->4870 4871 7863c2 4869->4871 4907 7810dd 4870->4907 4892 7810c9 4871->4892 4874->4857 4893 781000 2 API calls 4892->4893 4894 7810d3 4893->4894 4895 781000 2 API calls 4894->4895 4896 7810dd 4895->4896 4897 781000 2 API calls 4896->4897 4898 7810e7 4897->4898 4899 781000 2 API calls 4898->4899 4900 7810f1 4899->4900 4901 781000 2 API calls 4900->4901 4902 7810fb 4901->4902 4903 781000 2 API calls 4902->4903 4904 781105 4903->4904 4905 781000 2 API calls 4904->4905 4906 78110f 4905->4906 4908 781000 2 API calls 4907->4908 4909 7810e7 4908->4909 4910 781000 2 API calls 4909->4910 4911 7810f1 4910->4911 4912 781000 2 API calls 4911->4912 4913 7810fb 4912->4913 4914 781000 2 API calls 4913->4914 4915 781105 4914->4915 4916 781000 2 API calls 4915->4916 4917 78110f 4916->4917
                                                                  APIs
                                                                    • Part of subcall function 00785098: LdrGetProcedureAddress.NTDLL ref: 007852C9
                                                                  • CreateMutexW.KERNELBASE ref: 00787AC8
                                                                  • GetUserNameW.ADVAPI32 ref: 00787C9D
                                                                  • LocalAlloc.KERNEL32 ref: 00787FF8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3073858624.0000000000781000.00000020.00000400.00020000.00000000.sdmp, Offset: 00780000, based on PE: true
                                                                  • Associated: 00000001.00000002.3073844183.0000000000780000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3073877642.000000000078F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3073892660.0000000000792000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3073907473.0000000000796000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_780000_ctfmon.jbxd
                                                                  Similarity
                                                                  • API ID: AddressAllocCreateLocalMutexNameProcedureUser
                                                                  • String ID: $$$y$:$SECURITY$`$y$address_family_not_supported$ca-ES$chr-Cher-US$failureId$failureType$onecoreuap\base\appmodel\search\common\utils\regredirect.cxx$or-IN$resu$sq-AL$threadId$ult$|$y$|$y$=y$=y
                                                                  • API String ID: 664105279-99074842
                                                                  • Opcode ID: 1e378aec4e67495fa407fe41ed79426ef827b7c5165fb21ccce98882f070c283
                                                                  • Instruction ID: 9968f8eacb932f3d91c67fc728a007067304b5c0ad1e5b224b1b5b82c3914800
                                                                  • Opcode Fuzzy Hash: 1e378aec4e67495fa407fe41ed79426ef827b7c5165fb21ccce98882f070c283
                                                                  • Instruction Fuzzy Hash: 86E259B0955704DFC714EF68D98869ABBE0FF49300F5589BEE4888B322D7388946CF95

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 705 781468-781499 706 78149f-7814a6 705->706 707 7814a8-7814ae 706->707 708 7814c0-7814dd GetPEB 706->708 707->706 709 7814b0-7814bb call 78e4f4 707->709 710 7814e4-7814e8 708->710 709->708 712 7814ea-7814ef 710->712 713 781502-78155f call 78e4f4 call 781083 710->713 715 7814ff-781500 712->715 716 7814f1-7814fd 712->716 720 781561-781565 713->720 721 781573-7815bd call 78d1f8 call 781083 713->721 715->710 716->713 720->721 722 781567-781571 720->722 729 7815bf-7815c9 721->729 730 7815d5-7815f1 CheckRemoteDebuggerPresent 721->730 724 7815ce-7815d3 722->724 727 781634-78163b 724->727 729->724 730->724 731 7815f3-7815f7 730->731 731->724 732 7815f9-78162e call 78d1f8 731->732 732->727
                                                                  APIs
                                                                  • CheckRemoteDebuggerPresent.KERNELBASE ref: 007815E8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3073858624.0000000000781000.00000020.00000400.00020000.00000000.sdmp, Offset: 00780000, based on PE: true
                                                                  • Associated: 00000001.00000002.3073844183.0000000000780000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3073877642.000000000078F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3073892660.0000000000792000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3073907473.0000000000796000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_780000_ctfmon.jbxd
                                                                  Similarity
                                                                  • API ID: CheckDebuggerPresentRemote
                                                                  • String ID: host unreachable$originatingContextId$+y
                                                                  • API String ID: 3662101638-107514122
                                                                  • Opcode ID: 4b4111e38db9f8a313162adff02f0ec463f767d9fb1e1cdd18d1423866c65f0b
                                                                  • Instruction ID: 5d2f189935e4d2ce24f7bd3f120a9a251f1405607667dd3e652ff1642b85f050
                                                                  • Opcode Fuzzy Hash: 4b4111e38db9f8a313162adff02f0ec463f767d9fb1e1cdd18d1423866c65f0b
                                                                  • Instruction Fuzzy Hash: 88417BB18543448FCB10EF64DC4869ABBF9FB44324F40C96BD45A976A0D33C8946CF99

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1156 789a6c-789a7c 1157 789a7e-789a8d 1156->1157 1158 789a92-789ac1 LocalAlloc call 785834 1156->1158 1160 789b26-789b2c 1157->1160 1161 789ac6-789acd 1158->1161 1162 789acf-789aef call 78c104 1161->1162 1163 789af4-789b23 call 78d0ec call 78e194 1161->1163 1162->1163 1163->1160
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3073858624.0000000000781000.00000020.00000400.00020000.00000000.sdmp, Offset: 00780000, based on PE: true
                                                                  • Associated: 00000001.00000002.3073844183.0000000000780000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3073877642.000000000078F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3073892660.0000000000792000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3073907473.0000000000796000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_780000_ctfmon.jbxd
                                                                  Similarity
                                                                  • API ID: AllocLocal
                                                                  • String ID: p?y
                                                                  • API String ID: 3494564517-3669447398
                                                                  • Opcode ID: 6eb6016724de92750bd63dd045c24fc11e19d09cd99939a977f3ebff573caeeb
                                                                  • Instruction ID: ef0c7a09634713fb3f0f64fe54c167a5aad62eb8d5353e238943d9540a9ff832
                                                                  • Opcode Fuzzy Hash: 6eb6016724de92750bd63dd045c24fc11e19d09cd99939a977f3ebff573caeeb
                                                                  • Instruction Fuzzy Hash: EC110AB0955705DFDB00EF69E88555A7BE4FB48750F00C45AE6588B325D3389801CF96